Sie sind auf Seite 1von 2

Q28 (a) Topologi bintang Reason: Sistem menggunakan Switch

(b)

Q31
i. Unethical - Students use schools computer for personal use. The schools computer should be used for educational related purposes only. Break the copyright law (copyright infringement) students download songs and movies from the internet without the owner consent. ii. Hardware missing - Theft is stealing schools computer hardware. Malicious code a computer program that perform unauthorized processes on a computer. iii. Approaches to prevent theft : a) Prevent access by using locks, smart card or password. b) Prevent portability by restricting the hardware from being moved. c) Detect and guard all exits and record any hardware. Approaches to prevent malicious code: a) Install antivirus to protect computer against viruses, Trojan horses and worms by identifying and removing those malicious code found in the computer memory, computer storage or incoming e-mails files. Q32

. (a) Star topology. J 1 mark Justification: i. It is equipped with one hub. ii. It is easy to set up the network. iii. Easy to do the maintenance. J 3 marks. Accept any relevant answer for justification. (b) Required device : switch 2 Functions : to connect all the hardware in the cyber caf //

Q33

(i) 4d - Input

4c Process/ Processor

4b - Output

4a - Storage (ii) (iii) cd, dvd, thumbdrive, pendrive, flash memory, external hdd CPU/Processor utilises the computer memory to accomplish tasks. - execute instructions from the application software and accomplish a task. - controls all activities within the computer system The functions of OS: (i) controlls and allocates memory Explanation. - set up memory boundaries for types of software and for individual applications. (ii) prioritize system requests Explanation. - allows the application to begin running, suspending the execution only long enough to deal with interrupts and user input. Interrupts are special signals sent by hardware or software to the CPU. (iii) controlls input and output devices (iv) facilitate networking and manage file systems.

(iv)

Das könnte Ihnen auch gefallen