Advanced level 2024 Northwest regional mock ICT guide
Advanced level 2024 Northwest regional mock ICT guide
Breaking of copyright and piracy;This involves the
obtent.on and illegal use of materials, files or software sntbotii
prior authorization from the author
Cyber terrorism;This is the use of the cyber space or internet
to carryout terrorists acts which include destruction of cnlical
systems, information, government records, shutting down
emails, etc.
Hacking;Hackers are knowledgeable and experienced
computer users who invade or break into other people’s
computer systems. There are two types of hackers.
Cracking; Crackers are hackers (black –hat hackers) who
break into a computer system with evil motives of carrying
out destructive
Salami shaving and data diddling;Salami shaving is the use
of a program by a programmer to subtract small amount of
money from someone‘s account and sending such funds to the
embezzler‘s account.
Data diddling;Data diddling is the stealing of funds through
the above method by insiders, but with modification of the
data such that they would never be traced.
Denial of service (Syn flooding);A denial of service attack
(DoS) involves overloading or bogging down an internet
server by hackers suchthat it becomes overloaded and cannot
more function.
2 (B 12 11 DB 22 21 CB 32 31. AB 42 41.. cC
13. BL) 14 13. CC 23 24.. CC 34 33. Cl ) 43 44. BA
5 15. B 25 A 35. A 45 C
6 C 16. B 26 B 36 B 46 D
7. B 17. A 27. B 37. B 47. A
8 D
18. D 19. B |
28 A 29. D |
A |
38 D 48 C
39. C 49. B
10. c | 20 |
. B | B |
40. B 50. D
ICT 796 A’ LEVEL PAPER 2
1–i.
I
petiG
Bnir‘4
yfiit ‘A
if.‘5–IS
Cyber Warfare:this is the act of using different methods to
carry out warfare or attacks on others using the internet.
Spammingispamming is the act of sending undesired or junk
mail to other persons’ mail box, usually by commercial sites for the advertisement of their products or so. |
instructions as well as their data are stored in memory, with the requirement that the treatment of programs and data in memory be interchangeable or uniform |
Character deformation assassination;This involves the of messages or other publications to paint one’s character as‘ use |
in. |
negative, by placing or posting them as if the massages
coming from such a one whose character is deformed.
1–ii. The stored–program concept is one in which program
were
Intranet is the internal network of an organization
which uses internet technology with access only to
members of the organization while extranet is that part
of an organization’s network with limited access to
outside users.
b) Internet is the interconnection of computer networks
worldwide while www is the World Wide Web or the
interconnections of web pages located in different servers worldwide. |
changing | results etc |
c) A switch is capable of sending received data directly
to the destination computer while data received
through a hub goes through other computers
connected to it, to locate the destination computer.
he creation and use of computer viruses he breaking of password systems |
advantage of the party paying or giving out the goods or services |
Tedit Card Fraud;This is the obtention and use of your
•edit card number by unknown persons.
a)
Information warfare terrorism;This involves the
information technology to
information or industrial system.
FRAUD;This involves
use of
corrupt or destroy energy’s
using the computer to carryout
dreadful acts like manipulating company accounts, Theft;This involves the physical stealing of components of an
information system (e.g. hardware, software etc)
Scamming;This is carrying out false and illegal business
deals on the internet with the aim of taking Cyber stalking;This is the use of the internet, e–mails, etc to
threaten or harass a person repeatedly.
Masquerading;This is the use of someone else
access a computer by unauthorized persons.
’s