Computer Science Viva Voce Class of 2015

BY IN Extended Essay, IB Computer Science Comments Off on Computer Science Viva Voce Class of 2015 ,

Explanation about Viva Voce (Oral Examination)

Viva Voce questions can be anywhere from your area of study. They can ask anything to test your knowledge. You must aware of your project well and should gather and take account of everything related to your project topic and how your project is advantageous for those factors. Sometimes they might ask about point by point in your project and might ask to explain them clearly. So you must be well prepared to face any type of questions and should practice well to answer those queries.
http://www.crazyengineers.com/threads/viva-voce-questions-for-your-project-topic.74190/

For Computer Science Extended Essay, the result of Viva Voce will determine (if possible) the mark in Criterion D and Criterion K, so get ready with the questions that the supervisor will ask to you

The common questions:

What is your RQ (Research Question)? Why do you think your RQ is feasible for Computer Science Extended Essay?
Why do you choose this topic? (your answer can be: because you are mastering the topic, or you like/interested with the topic, or the topic is somehow became a popular topic at the time when you wrote your essay)
How much time you spent in total (roughly) to write your essay?

The specific questions:

FIRST ESSAY
“THE EMERGING THREAT OF THE BLOGGING COMMUNITY: BOTNET”

What do you know about these terms: nginx, .htaccess .htpasswd? How these terms can be used to minimize the flaw?
In your conclusion it is stated that in the future the usage of SSL is impenetrable. How can you explain that?
Some of log’s server has been retrieved for your research. Could you please explain how you get that information? If you just get it from the internet, could you describe the steps, how can you get the data from the server?

SECOND ESSAY
“HOW DOES QUANTUM CRYPTOGRAPHY WORK THAT IS FEASIBLE TO REPLACE THE CONVENTIONAL CRYPTOGRAPHY METHOD, ESPECIALLY IN INFORMATION SECURITY?”

Can you distinguish between classical and quantum cryptography? Why the encryption algorithm using quantum theorem from physics is considered stronger?
In your research, in which areas quantum cryptography can be applied? Does it have a consideration to install, such as from financial issue?
In your essay, it is stated that quantum cryptography is unhackable, but in the other part, it is said that there’s still a chance that hacker can intercept and steal the information. How can you explain that? Could you explain the limitation of quantum cryptography?




Comments are closed.