Loading...
» »

WAEC 2016 COMPUTER QUESTIONS AND ANSWERS NOW AVAILABLE FOR FREE. @ Gurushood.com




WAEC 2016 COMPUTER QUESTIONS AND ANSWERS NOW AVAILABLE FOR FREE
Thursday 14th April 2016
COMPUTER STUDIES 2 (ESSAY)
COMPUTER STUDIES 1 (OBJ)
Gurushood.com
1ai )
Networking cables are networking hardware used
to connect one network device to other network
devices or to
connect two or more computers to share printer,
scanner etc .

1aii )
i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable

1b)
Very Small Aperture Terminal

1c )
-An e – mail address is used to receive e –
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain. com
-website URL is an IP address
in text resolved by your DNS server and often
has nomenclature like this:
www . nameofyourchoice. com

1cii )
i ) www . gurushood. com
ii )gurushood@ gmail. com

2ai )
A computer virus is a malware that , when
executed, replicates by inserting copies of itself
(possibly modified) into
other computer programs , data files, or the boot
sector of the hard drive; when this replication
succeeds , the affected areas are then said to be
” infected ” .

2aii )
i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses

2b)
i ) Vulnerabilities and attacks- s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerabilities and
Exposures ( CVE ) database and vulnerability
management
is the cyclical practice of identifying ,
classifying , remediating , and mitigating
vulnerabilities as they are discovered .

ii )Backdoors – in a computer system , a
cryptosystem or an algorithm, is any secret
method of bypassing normal
authentication or security controls .

iii )Denial -of- service attack- are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times to
cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .

iv )Eavesdropping- is the act of surreptitiously
listening to a private conversation,
typically between hosts on a network . For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA
to eavesdrop on the systems of internet service
providers .

v )Privilege escalation- describes a situation where
an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level.






Related Article


Posted By Examlord On 01:57 Thu, 14 Apr 2016

Comments:2 || Views:




[1]
Comment
Name






.....................

Please LOGIN or REGISTER To Gain Full Access To This Article