NOVEMBER 2016 DICT INTERNET SKILLS



MONDAY: 21 NOVEMBER 2016 DICT INTERNET SKILLS
Answer ALL questions. Marks allocated to each question are shown at the end of the question.
QUESTION ONE
a)      Differentiate between “cyber bullying” and “cyber crime” in the context of internet safety. (4 marks)
b)      Highlight four legal issues raised by the use of the internet. (4 marks)
c)       Sate the role of each of the following as applied in internet technology:
                  (i)            Proxy server. (2 marks)
                (ii)            DNS server. (2 marks)
d)      Highlight four strategies of ensuring effective search using search engines. (4 marks)
e)      Justify the importance of using a virtual keyboard in an online based system. (2 marks)
f)       Outline two advantages of using Hyper Text Transfer Protocol (HTTP) instead of File Transfer Protocol (FTP). (2 marks)

QUESTION TWO
a)      Highlight issues that could be considered in each of the following internet governance aspects.
               (i)         Internet freedom and human rights politics. (2 marks)
             (ii)         Governing the internet infrastructure. (3 marks)
            (iii)         Standard and protocols governance. (3 marks)
b)      Outline three reasons that have led to high demand of clouds computing services. (3 marks)
c)        State three limitation of cellular internet. (3 marks)
d)      Explain the role of wireless body Area Network (WBAN. (2 marks)
e)      State two example of each of the following programs in the context of the internet. 
            (i)            Web client. (2 marks)
          (ii)            Web server. (2 marks)

QUESTION THREE
a)      Distinguish between “web analytics” and “load balancing” as applied in website content management. (4 marks)
b)       Highlight three poor website design practices. (3 marks)
c)       explain the roles of the following as used in internet connectivity:
            (i)            Protocols.  (2 marks)
          (ii)            IP address.  (2 marks)
         (iii)            Domain name. (2 marks)
        (iv)            URL. (2 marks)
d)      Outline three security threats to a server. (3 marks)
e)      Describe the term “unified communications” in the context of internet communication services. (2 marks)

QUESTION FOUR
a)      Using the following, distinguish between two-tier and three –tier client/sever architect.  (6 marks)
b)      Explain the following functions in the context of client/sever model of computing.
            (i)            Transparency of location. (2 marks)
          (ii)            Encapsulation of services. (2 marks)
         (iii)            Scalability. (2 marks)
c)       Describe two problems associated with the use of simple mail transfer protocol (SMTP). (4 marks)
d)      Outline the sequential steps used by POP3 email protocol to access emails. (4 marks)

QUESTION FIVE
a)      Asses thee challenges posed the internet to the protection privacy. (3 marks)
b)      Citing an example in each case, distinguishing between absolute URL and relative URL. (4 marks)
c)       Distinguish between the following terms in the context of internet:
            (i)            “Blogosphere” and “e-commerce”. (2 marks)
          (ii)            “Dynamic website” and “brochureware”. (2 marks)
d)      Outline four application areas of Internet of Things [IoT]. (4 marks)
e)       State five parts of an interment browser. (5 marks)

Comments

Popular posts from this blog

STRUCTURED PROGRAMMING - JUNE 2013

PRINCIPLES OF WEB DEVELOPMENT MAY 2018