You are on page 1of 9

Löông Troïng Nghóa - UÙc8A1- 0511984

Assessment Task 1 – Review Question Portfolio


There is a set of review questions from Sessions 4, 5, 6, 8, 9, 12,14, & 15. These will assist
you in developing the underpinning knowledge and skills required in this subject. They can
be handed up or emailed to your lecturer weekly as you do them or as a portfolio at the
end of the last session. If you’re accessing the course online you will need to submit them
via the online environment.

Review Questions for Session 4

1.George downloads a shareware game from an Internet site. He copies it and gives it to his
friends. Has George violated copyright? Explain your answer.
 George has not violated copyright because the law is: ”A user is given the right to (and is encouraged to)
freely copy and distribute shareware software”
2. Nadine works in the Personnel Department and is in charge of the XYZ Company’s employee database. What
are Nadine’s obligations with respect to the database?
 She on whom data are kept are aware of what information is being kept and have the opportunity to correct
any inaccurate information.

3. Fred is backing up his hard drive onto a tape drive. Can he legally include the software programs as well as the
data files in this backup? Explain why or why not.
 Yes, because he owns the software on a computer?

4. List four examples of computer piracy.


 Buying one copy of a program but installing it on more than one computer.

 Copying a program and giving or selling the copy to someone else.

 Buying an upgrade to a program then selling the old version to someone else and keeping the upgrade.
(Legally the upgrade is part of the original program and cannot be separated from it.)

 Copying programming code from one piece of software and using it in another.

5. Briefly define the terms: copyright, piracy and intellectual property.


 Copyright: The right of an author or his assignee, under statute, to print and publish his literary or artistic
work, exclusively of all other persons
 Piracy: Robbery on the high seas; the taking of property from others on the open sea by open violence;
without lawful authority, and with intent to steal; -- a crime answering to
 robbery on land
 Intellectual Property: Endowed with intellect; having the power of understanding; having capacity for the
higher forms of knowledge or thought; characterized by intelligence or mental capacity; as, an intellectual

6. Jane needs the use of a word processor and a presentation program. Her friend Jim wants a spreadsheet and a
database program. They decide to purchase one copy of Microsoft Office. Jane loads Word and PowerPoint on her

1
computer and Jim does the same with Excel and Access on his computer. Is what they have done legal? Explain
your answer.
 No, the ownership of the software always belongs to the person or company who holds the copyright.
When you buy the program what you get is a license or right to use the program. You are paying for the
right to use the program not for ownership of the program.

7. List the four main categories of software available to users and briefly describe the user rights for each type.
 Commercial Software
 Shareware
 Public Domain Software
 Free Distribution Software

8. Helen works as a word processor for a legal firm. All files are kept on the firm’s network system. Helen is
cautious and saves a second file of her work on the hard drive of the machine she works on. One day the network
goes down and a piece of Helen’s work is needed desperately. April works with Helen and knows of Helen’s
saving the copy. April goes to Helen’s machine and retrieves the file. Has April acted legally? Has she acted
ethically? Explain your answer.
 April has acted illegally because: Only people authorized to access data are able to do so.
9_Explain what measures can be taken to ensure the security of data stored in a computer
system.
 It measures the number of modems available at your service provider in relation to the number of active
users that use the service

10. Is Plagiarism the same as cheating? Explain your answer.


 Yes. Plagiarism is That which is plagiarized; a work which has been plagiarized. Cheating is One who
cheats or deceives; an impostor; a deceiver; a cheater
11._Social Behaviour verses Computer Behaviour. In the space provided write an equivalent
unacceptable computer behaviour.

Unacceptable Social Behaviour Unacceptable Computer Behaviour


To enter another person’s home or Users of the system respect each
drive another person’s car without other’s right to privacy. Users should
their permission. not snoop in another’s personal files, e-
mail, electronic notes, etc. Files should
not be viewed or copied without
permission.

To rummage through another Only people authorized to access data


person’s belongings. are able to do so

To shoplift or steal something that The individuals on whom data are kept
belongs to another. are aware of what information is being
kept and have the opportunity to
correct any inaccurate information.

2
To lock another person out of his or People authorized to access data use
her own household or car. the information only for the purpose it
is intended

Review Questions for Session 5

1. What 3 things do you need to join the Internet?


• A modem
• A browser
• A personal account with an Internet Service Provider
2. What does FTP stand for?
 File Transfer Protocol. One of the main ways to retrieve files from computers on the Internet
3. List four questions you should ask an ISP before signing up with them as the preferred Internet access provider.
 Do you offer affordable high-speed access (via cable, ISDN or DSL)?
 Will I have a PPP connection
 Will I be able to browse the Web, send and receive e-mail, subscribe to Usenet newsgroups, and so on?
 Is there flat-rate access (a rate for unlimited time)?
 Is there a download limit?
4. What is the most popular DSL product available in Australia?
 It is Asymmetrical Digital Subscriber Line
5. Web pages are primarily made up of what type of files?
 Web pages are primarily made up of HTML files, which are all ASCII text, and relatively small image files,
in most cases
6. Explain Point of Presence in your own words.
 This will determine whether your service provider has a contact number within your telephone area
7. What is Usenet?
 Usenet is the Internet news service, but it is not “news” in the traditional sense of the word
8. Explain the Contention Ratio in your own words.
 This is perhaps the best way of seeing if your service provider is running under or over capacity. It
measures the number of modems available at your service provider in relation to the number of active users
that use the service
9. List 3 types of Internet Connections available.
 Dial-Up Connections
 ISDN
 DSL

Review Questions for Session 6


1. Rank the following types of information in terms of file sizes and the time it takes to load from the Internet:
video, text, image and audio.

____Slowest______________video,image,audio,text____________________Fastest_________

3
2. What is the difference between downloading and uploading?
 -downloading: you load to your computer from internet
 -uploading: you load from your computer to internet
3. What are the main software programs used with the Internet?
 -TCP/IP
4. List five important factors that should be considered when choosing an Internet Service Provider.
 Type of connection

 Modem speed

 ADSL (download limit and speed)

 Level of service
 Insurance
5. What type of Internet connections provide direct links between the Internet and your personal computer (PC).
 PPP,ADSL
6. Which one of the following hardware items will affect the performance of your Internet connection most?

 Hard disk, Monitor, Processor (CPU), Modem, RAM

7. When connecting to an overseas site on the Internet are you paying local or overseas telephone rates?
 -paying local
8. What is the Australian Call Waiting deactivation code?

9. What are the first ten characters that are common to most document locationidentifiers (URL's)?

10. What is a search engine?


 A Web Search Engine is an interactive tool to help people locate information available via the World Wide
Web.

4
Review Questions for Session 8
1. What does it mean to perform a backup? Why is it important to perform backups regularly?
 Backup contains a complete set of backup, restore, and comparison features. The backup jobs make
backing up regularly easy to do, because you can create backup jobs that describe different backup settings
and open whatever backup job you want to use
2. Identify five possible reasons why backups should be performed.
 The possibility of damage to or malfunction of disks and disk drives.

 Your expectations and if you are in business, your client's expectations that data are safe, up-to-date and
complete.

 To ensure that certain legal obligations (such as tax records, income and expense data etc) can be met if the
information is computerised.

 Your or your organisation’s reliance on computers to supply timely access to up-to-date information.

 To guard against the accidental or deliberate deletion of files.

3. List and explain the three backup types.


 Using third party backup utilities. Some of these can come in the form of shareware.

 Using special compression utilities such as Pkzip, WinZip, or Arj.

 Using the software that comes with devices such as Tape Units.

4. Briefly explain the Child-Parent-Grandparent method of backing up.


Backup Name
Type FrequencStorage Location Description
y
Child PartialDaily On Site Use four tapes labelled Monday, Tuesday, Wednesday and
Thursday. These tapes can be reused each week

Parent Full Weekly


Off Site Have five tapes labelled Fri-1, Fri-2, etc., one for each Friday
of a month. The tapes can be rotated each month.

Grand- parent Full Monthly


Off Site in a very secure, fire proof place (vault)
The monthly backup is performed on the last Friday of the
month. 12 tapes are needed and can be rotated each year.
Tapes to be labelled Jan, Feb, etc.

5. Identify different software that can be used for backups.


 Using the Copy or Xcopy commands of MS-DOS.

 Using the Copy facility of the different versions of MS-Windows.

 Using the Backup command of MS-DOS or the Backup Utility of Windows95, Windows 98, Windows Me,
Windows 2000 and Windows XP.

 Using third party backup utilities. Some of these can come in the form of shareware.

5
 Using special compression utilities such as Pkzip, WinZip, or Arj.

 Using the software that comes with devices such as Tape Units.

6. ABC Company’s data files are kept on their network drive N: in a folder named DATA. An incremental backup
is done Mondays through Thursdays with a full backup on Fridays. The backups are done to a tape drive.
Create the listings that would appear in the backup logbook for this process.

Date Directories backed up Type of backup

27/01/2003 C:\My Documents Daily incremental: floppy

28/01/2003 C:\My Documents Daily incremental: floppy

28/012003 C:\Windows\ *.dat, *.ini ,*.sys Used WinZip to create file system.zip on D:\;
C:\Msdos.sys a backup of system settings
C:\autoexec.bat
C:\config.sys

29/01/2003 C:\My Documents Monthly full : tape

Review Questions for Session 9

1. What is a computer virus? List 7 possible examples of strange behaviour on your computer that might indicate
an infection by a virus.
A virus is an irritating and/or damaging program that deliberately and unwittingly stores itself on the disks of a
computer system

 A program takes longer to load then it has previously.


 Programs run slower than usual.
 Disk access is performed at unusual times.
 The number and length of disk accesses seems excessive.
 Available disk space decreases without new files having been created.
 Unusual error messages appear on the screen.
 Programs growing greatly in size with only small modifications.

2 List 5 possible ways that a computer virus can be spread.


 Using disks that have been used on other computing systems.

 Buying software from less than reliable sources, especially if it may be pirated.

6
 Downloading files from bulletin boards or from the Internet.

 Failing to write protect original program disks.

 Connecting a computer to an unprotected network


3. What are the 8 steps a user can take to help avoid infection by a computer virus?
 Install and use anti-virus software. Set the software to run automatically at boot up. Anti-virus software is
also available for use when surfing the net.

 Upgrade your AV software regularly.

 Only buy software from reputable vendors; do not use pirated software.

 Never boot a system from a system disk from another computer system.

 Avoid using floppy diskettes that have been used on other systems. If you do make sure you scan them
first.

 Format floppies before using them for the first time.

 In a business situation develop and follow site procedures regarding the use of software and all computer
access.

 Have a recovery procedure in place in case of infection. This is particularly important in a business
situation.

4. You work as the systems administrator for a large company. Your boss is worried about the possibility of
the system being infected by a virus. You are asked to create a procedure for users to follow with respect to
virus detection and circulate it to all computer users in the company. What information needs to be given to
the users?
 Notify all users a virus has been found.
 Attempt to establish the cause of the infection.
 Isolate all possible infected disks.
 Use your AV software to eliminate the virus and clean the disks. If your current software cannot get rid of
the virus, get an upgrade of software that will.
 Keep your backups up-to-date, as they may be needed. The virus may have destroyed data files and these
will need to be recovered from you backups.
 As a last resort to get rid of the virus, a low-level format of a hard drive may be necessary. This destroys all
files on the disk, so it is very important that your backups are current.

Review Questions for Session 12


1.What are the main items you need to connect to the Internet?
 Computer
2. What is a Server?
 A machine that makes services available on a network.

3. What is hypertext and how is it identified?


7
 A computer based text retrieval system that enables a user to access particular locations in WebPages or
other electronic documents by clicking on links within specific WebPages of documents
4. Which of the following home pages are located on overseas computers?

http://www.microsoft.com/
http://www.swin.edu.au/
http://www.ibm.com.au/
http://www.sofcom.com.au/
http://www.eisa.net.au/
http://www.uct.ac.za/

5. What program has to be running the whole time you are connected to the Internet?
 Hystory

6. What is the difference between e-mail, newsgroups, FTP and the World Wide Web?
 World Wide Web. The collection of hypertext documents made up of multi-media material.
 Newsgroups Discussion groups on USENET.
 E-mail Electronic Mail. Messages sent and received by users of the Internet.
 FTP File Transfer Protocol. One of the main ways to retrieve files from computers on the Internet

8
9

You might also like