CS – Exam

contactwahyu on March 30th, 2016

A. State one example of a peripheral that might be attached to a personal computer (PC), but not always. Outline 2 significant purposes of a network. Describe one advantage of using a PC in stand-alone mode, not attached to a network. Outline what the term human resources means in a computer system. Explain why computer […]

Continue reading about Mock Exam Sample

contactwahyu on June 1st, 2015

Another Semester Exam Session for Computer Science students SECTION A Outline how backups can prevent data loss If we create backup regularly or periodically, any damaged data that occurred will be no problem. Because, once the data is damaged, we still have a copy of it and simply restore it. However, for large amount of […]

Continue reading about Computer Science: Semester Exam

contactwahyu on May 22nd, 2015

Several issues that need to be discuss: Data loss its integrity; How it can happen? How we can avoid it? If it’s already happened, what’s the best way to restore it? RAM – Random Access Memory ROM – Read Only Memory Distinguish the differences! Why RAM is considered as a storage? Why RAM is primary […]

Continue reading about Computer Science: Exam Preparation

contactwahyu on March 20th, 2015

This refers to Electronic Banking Case Study 2015 Answer all questions. 1. Outline the meaning of the following terms. (a) phishing [2 marks] (b) push/pull technology [2 marks] 2. TransEuropa is based in a European country where it has been established for many years. It also has a presence in some developing countries where its […]

Continue reading about Computer Science: Paper 3 Predicted Questions

contactwahyu on February 17th, 2015

Define the term authentication. Describe the term backdoor methods, and explain its functions in computer security What is Man-in-the-Browser (MitB) Trojan and how does it work? How is TAN (Transaction Authentication Number) is used by some inline banking services? How does the role of Zapp play an important factor in computer security? Outline two disadvantages […]

Continue reading about Computer Science HL Paper 3 Predicted Questions