Thursday, November 25, 2010

Final Exam

Please answer all of the following questions, and then email them to itgs.sass@gmail.com

DO NOT LEAVE THE ROOM UNTIL YOU CHECK WITH ME THAT I HAVE RECEIVED THE EXAM IN MY ACCOUNT.


1- A businessman has just launched a new online service, by which he sells school uniforms to interested families. Families can access the website, select their school and the related items of clothing and order online to be delivered to their homes.
Explain in detail:
a. How a search engine like Google gets to know of the existence of this page so that when users eventually search for school uniforms they are able to find this new service.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. How the owner of the firm can try to get his page to appear higher in the search engine rankings.
d. How, in the future, users might search for these services taking advantages of developments in search engine capabilities.

2- A school student is on the Internet in one if the school labs.
a. How can she and many other students be accessing at the same time a single cable modem connection from the school?
b. How are users prevented from accessing unauthorized web sites?
c. What technical measures could be in place for making sure that outside hackers do not get access to the network?

3- You are hired to design an access system for customers of a bank. Customers would be able to access their accounts online and also their security boxes in the bank where they store their valuables. Determine, for each of the needed accesses, what the best method would be and explain why you have chosen it. Include, within your answer, possible use of encrypted information.

4- Choose one of these topics and comment how technology can enhance activities within that sector, as well as the impact that these technological applications may have on individuals and society.
a. Health
b. Arts, Entertainment and Leisure
c. Science and the environment
d. Politics and government

5- Give an account of what specific functions are performed by the operating system from the moment in which the computer is turned on until it is ready to receive user input. How does the CPU/Operating System achieve multitasking?

6- Give three specific examples of how hackers can access computers and/or networks, and explain, for each of those examples, how they may benefit from it. How can a web site prevent a denial of service attack?

7- A multinational company has branches in Argentina and the US. The Argentina branch has 8 networked computers that are used to handle customer requests and post-sale service, whereas the US office deals with sales and production through 12 computers. Each branch has two network printers and a file server, and they must be connected to each other. Design a network that satisfies the requirements and explain which hardware and/or software solutions you need to adopt.

8- Treasure Hunt
There is a famous quote that reads “It was the best of times, it was the worst of times…”, which is the first line of a famous book. In the year that another writer was born, a close friend and influence of the author of the book where the quote can be found, a very important battle takes place in October. On the same day that the loser of that battle attempted to commit suicide, but 161 years later, an actress and singer died. Give the name of the actress.

No comments: