Thursday, December 18, 2008

December Exam

1- Explain, justifying your examples, in which circumstances you would use:
A) Biometric access systems.
B) Cryptography.
C) A Wide Area Network (WAN)

2- Explain how a teacher can use technology and the Internet to enhance his teaching. What are the drawbacks or risks involved?

3- Describe in as much detail as you can how a hacker gains access to a computer. How can users protect themselves against a hacking attack?

4- Explain how a search engine works. How can the owner of a web site secure a high ranking in Google?

5- Using the example that we observed in a video of a robotic arm that sorts out chocolates and inserts them in their correct wrappings, explain how a robot works and what its essential elements are.