Duck hunt
CERTIFIED COMPUTER SCIENCE OBJECTIVES
__________________________
1.A
2.A
3.C
4.B
5.C
6.D
7.B
8.C
9.A
10.B
_______________________
11.A
12.B
13.C
15.A
16.C
17.C
18.B
19.C
20.D
_______________________
21.C
22.A
23.B
24.C
25.A
26.A
27.C
28.B
29.C
30.A
________________________
31.B
32.D
33.D
34.B
35.B
36.A
37.C
38.D
39.B
40.C
__________________________
41.A
42.B
43.D
44.B
45.B
46.A
47.D
48.C
49.A
50.D
__________________________
1ai )
Networking cables are networking hardware
used to connect one network device to other
network devices or to
connect two or more computers to share
printer , scanner etc.
1aii )
i ) Coaxial cable
ii) Optical fiber cable
iii ) Patch cable
1b )
Very Small Aperture Terminal
1c )
-An e-mail address is used to receive e-
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain.com
-website URL is an IP address
in text resolved by your DNS server and
often has nomenclature like this :
www.nameofyourchoice .com
2ai )
A computer virus is a malware that, when
executed, replicates by inserting copies of
itself ( possibly modified) into
other computer programs , data files , or the
boot sector of the hard drive ; when this
replication succeeds , the affected areas are
then said to be "infected ".
2aii )
i ) Resident Viruses
ii) Multipartite Viruses
iii ) Direct Action Viruses
2b )
i ) Vulnerabilities and attacks-s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerabilities
and Exposures ( CVE ) database and
vulnerability management
is the cyclical practice of identifying ,
classifying, remediating , and mitigating
vulnerabilities as they are discovered .
ii) Backdoors - in a computer system , a
cryptosystem or an algorithm , is any secret
method of bypassing normal
authentication or security controls.
iii ) Denial -of- service attack -are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times
to cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .
iv ) Eavesdropping - is the act of
surreptitiously
listening to a private conversation ,
typically between hosts on a network. For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and
NSA to eavesdrop on the systems of internet
service providers.
v) Privilege escalation-describes a situation
where an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level .
4a) more coming pls bear with us
4b)
i)Floppy, Hard Drive
4c)
i)System software
ii)Application software
4cii)
i)System software
A)Microsoft Windows
B)Linux
ii)Application software
A)Steam
B)Adobe Reader
4c)-System software is computer software designed to operate and control the computer hardware as well as to run application sosoftware.
eg web browsers
-Application software is readily apparent and visible to the user.
eg. business productivity programs.