This document contains questions about networking concepts and security. It is divided into three sections. The first section asks about network operating system functionalities, IP and MAC addresses, DHCP servers, and spoofing. The second section covers network cable uses, common cable types, wireless network components, network devices, authentication, filtering and encryption. The third section addresses security risks of storing personal data digitally, backups, online payments, internet impacts, and teleworking advantages.
This document contains questions about networking concepts and security. It is divided into three sections. The first section asks about network operating system functionalities, IP and MAC addresses, DHCP servers, and spoofing. The second section covers network cable uses, common cable types, wireless network components, network devices, authentication, filtering and encryption. The third section addresses security risks of storing personal data digitally, backups, online payments, internet impacts, and teleworking advantages.
This document contains questions about networking concepts and security. It is divided into three sections. The first section asks about network operating system functionalities, IP and MAC addresses, DHCP servers, and spoofing. The second section covers network cable uses, common cable types, wireless network components, network devices, authentication, filtering and encryption. The third section addresses security risks of storing personal data digitally, backups, online payments, internet impacts, and teleworking advantages.
1. Operating system provide many functionalities to user.
a. Write 3 functionalities of Network Operating System. [3] b. Define the term IP address. [2] c. Briefly explain the differences between IPv4 and IPv6 with examples. [6] d. Write the functionality of the DHCP Server. [2] e. Define the term MAC address. [2] f. Write 4 uses of MAC addresses. [4] g. Define the term Spoofing. [2] [21] 2. Network cables are used to connect devices in order to share data. a. Write 3 other usages of a computer network. [3] b. Write 3 types of cables used in computer network [3] c. Write 3 components that used to setup wireless network [3] d. Briefly explain the following network components. i. Hub ii. Switch iii. Router iv. Gateway v. Booster [10] e. Briefly explain Authentication Server and Print Server. [4] f. Define the functionality of filter software, Explain the 2 types of lists that used - - in filter software. [6] g. Briefly explain the term encryption and types of keys which used in encryption. [4] h. Define the term “eavesdropper”,”WEP”,”WPA”. [6] i. Define the term “geolocation rights management”. [2] [41] 3. Huge amounts of data are transmitted and stored digitally, and a lot of this data contains personal or financial information. a. Briefly explain 4 security risk for personal data that stored digitally, and explain the methods that used to overcome from the above mentioned issues. [4] b. Write the different between CAPTCHA and reCAPTCHA test. [2] c. Define the term Backup and write the differences between 3 types of backups. [8] d. Write 3 methods of online payment system. [3] e. Write 3 impact of the Internet on individuals. [8] f. State and explain staying safe on the Internet [8] g. Write 3 advantages of Teleworking to companies and customers [5] [38]
EMBEDDED SYSTEMS QUESTION PAPERS , IMPORTANT PREVIOUS QUESTION PAPERS
VERY IMPORTANT BTECH MTECH JNUTH
1. Write short note on the following parts of embedded systems:
a) Processors
b) Memory
c) Operating systems
d) Programming Languages.