2016/2016 WAEC COMPUTER ANSWER
THEORY ANSWERS
================================
1ai )
Networking cables are networking hardware used
to connect one network device to other network
devices or to
connect two or more computers to share printer,
scanner etc .
==================
1aii )
i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable
==================
1B-)
Very Small Aperture Terminal
==================
1c )
-An e - mail address is used to receive e -
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain. com
-website URL is an IP address
in text resolved by your DNS server and often
has nomenclature like this:
www.nameofyourchoice.com
==================
1cii]Types of email
i)buhari@ymail.com
ii)
Ebola@gmail.com
Types of website
i ) www.jamb.org.ng
ii )waec direct.org
====================================
2ai )
A computer virus is a malware that , when
executed, replicates by inserting copies of itself
(possibly modified) into
other computer programs , data files, or the boot
sector of the hard drive; when this replication
succeeds , the affected areas are then said to be
" infected " .
====================================
2aii )
i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses
===========================================
2B-)
i ) Vulnerabilities and attacks- s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerability management
is the cyclical practice of identifying ,
classifying , remediating , and mitigating
vulnerabilities as they are discovered .
ii )Backdoors – in a computer system , a
cryptosystem or an algorithm, is any secret
method of bypassing normal
authentication or security controls .
iii )Denial -of- service attack- are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times to
cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .
iv )Eavesdropping- is the act of surreptitiously
listening to a private conversation,
typically between hosts on a network . For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA
to eavesdrop on the systems of internet service
providers .
v )Privilege escalation- describes a situation where
an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level.
THEORY ANSWERS
================================
1ai )
Networking cables are networking hardware used
to connect one network device to other network
devices or to
connect two or more computers to share printer,
scanner etc .
==================
1aii )
i ) Coaxial cable
ii )Optical fiber cable
iii )Patch cable
==================
1B-)
Very Small Aperture Terminal
==================
1c )
-An e - mail address is used to receive e -
mail messages and is under the
nomenclature :
Nameofyourchoice @ domain. com
-website URL is an IP address
in text resolved by your DNS server and often
has nomenclature like this:
www.nameofyourchoice.com
==================
1cii]Types of email
i)buhari@ymail.com
ii)
Ebola@gmail.com
Types of website
i ) www.jamb.org.ng
ii )waec direct.org
====================================
2ai )
A computer virus is a malware that , when
executed, replicates by inserting copies of itself
(possibly modified) into
other computer programs , data files, or the boot
sector of the hard drive; when this replication
succeeds , the affected areas are then said to be
" infected " .
====================================
2aii )
i ) Resident Viruses
ii )Multipartite Viruses
iii )Direct Action Viruses
===========================================
2B-)
i ) Vulnerabilities and attacks- s a system
susceptibility
or flaw , and many vulnerabilities are
documented in the Common Vulnerability management
is the cyclical practice of identifying ,
classifying , remediating , and mitigating
vulnerabilities as they are discovered .
ii )Backdoors – in a computer system , a
cryptosystem or an algorithm, is any secret
method of bypassing normal
authentication or security controls .
iii )Denial -of- service attack- are designed to
make a machine or network resource
unavailable to its intended users.
Attackers can deny service to individual
victims , such as by deliberately entering a
wrong password enough consecutive times to
cause the victim account to be
locked, or they may overload the
capabilities of a machine or network and
block all users at once .
iv )Eavesdropping- is the act of surreptitiously
listening to a private conversation,
typically between hosts on a network . For
instance, programs such as Carnivore and
NarusInsight have been used by the FBI and NSA
to eavesdrop on the systems of internet service
providers .
v )Privilege escalation- describes a situation where
an attacker with some level of
restricted access is able to , without
authorization , elevate their privileges or
access level.
Post A Comment:
0 comments so far,add yours