Thursday, November 15, 2012

Practice for Final Exam


1- Explain, for each of the following actions, using the appropriate relevant terms, how each of the following actions takes place in terms of the data transfer, software and hardware used, protocols.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
 
2. A family who plans to relocate to Argentina wants to find information about St. Andrew’s Scots School. In order to do that, it uses Google to search for the name of the school. Explain in detail:
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.

3- A small university has two different campuses. The main campus houses the central office, that has 5 computers which deal with administrative tasks and that also house the server that contains all course materials and software to manage the distance learning program that allows many students to study from home. These five computers share a colour printer. There are two classrooms, with 4 computers each, and these have access to the file server that stores all student data.The other campus, which is 20 km away, has a small office with two computers and three classrooms with one computer each, the idea is that all students in this campus should connect to the network via WiFi and be able to access their files located on the other campus file server. There is a single printer on this campus, shared by all computers.Draw a schematic diagram of the network, and write a short paragraph explaining the rationale for your design.

4- Give a short summary of the hacking techniques that you learned in Slavehack. How can a user prevent access from hackers?

5- Explain how technology has impacted one of the following areas, giving specific examples that you have researched:

-          Arts and entertainment OR

-          Health and medicine    OR

-          Politics   OR

-          Science and the environment.
6- How is a conversational robot developed? Would you say that it constitutes an expert system? Why? How is the quality of a conversational engine generally tested?

7 – Explain in detail how students may benefit from the application of technology in the classroom and why teachers may be somewhat worried about the extended use of technology in schools.


No comments: