1-
Explain, for each of the following actions, using the appropriate relevant
terms, how each of the following actions takes place in terms of the data
transfer, software and hardware used, protocols.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
2.
A family who plans to relocate to Argentina wants to find information about St.
Andrew’s Scots School. In order to do that, it uses Google to search for the
name of the school. Explain in detail:
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.
3-
A small university has two different campuses. The main campus houses the
central office, that has 5 computers which deal with administrative tasks and
that also house the server that contains all course materials and software to
manage the distance learning program that allows many students to study from
home. These five computers share a colour printer. There are two classrooms,
with 4 computers each, and these have access to the file server that stores all
student data.The
other campus, which is 20 km away, has a small office with two computers and
three classrooms with one computer each, the idea is that all students in this
campus should connect to the network via WiFi and be able to access their files
located on the other campus file server. There is a single printer on this
campus, shared by all computers.Draw
a schematic diagram of the network, and write a short paragraph explaining the
rationale for your design.
4- Give a short summary of the hacking techniques that you
learned in Slavehack. How can a user prevent access from hackers?
5- Explain how technology has impacted one of the following areas, giving specific examples that you have
researched:
-
Arts and entertainment OR
-
Health and medicine OR
-
Politics
OR
-
Science and the environment.
6- How is a conversational robot developed? Would you say that
it constitutes an expert system? Why? How is the quality of a conversational
engine generally tested?
7 – Explain in detail how students may benefit from the
application of technology in the classroom and why teachers may be somewhat
worried about the extended use of technology in schools.
No comments:
Post a Comment