Computer Security: Social Engineering (Kevin)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Kevin) , ,

Program detail (Final): This program is a program that will run automatically when windows starts up. The program has 2 files, one is the executable file, and one is a folder containing all the pictures and sound. Program name: Kaelproject.exe, folder name: Randomimage. The program will check if the program is already running. If it

CONTINUE READING …

Computer Security: Social Engineering (Daniel)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Daniel) , ,

First, I tried to convince the target that I would give him the photo of a kid. The target was extremely obsessed by the look of the kid. So I thought his photos would be very attractive for the target. I decided to make an application that acted as a photo viewer. The photo viewer

CONTINUE READING …

Computer Security: Social Engineering (Clark)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Clark) , ,

On the 12th of May 2015, I used my program to my good friend, Igna. The program that I made is an annoying virus that pops out a mathematical question every hour after the computer is turned on. The program spread is through flashdrive, but it have to be run manually through the flashdrive. The

CONTINUE READING …

Computer Security: Social Engineering (Grace)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Grace) , ,

Yesterday night I send my virus to two of my friend’s email then I inform them to check it by saying that it’s my experiment for my school project. Then when they check it they thought that its just their computer cant open my file then they just click run. When they ran into my

CONTINUE READING …

Computer Security: Social Engineering (Albert)

BY IN CS - Computer Security Comments Off on Computer Security: Social Engineering (Albert) , ,

Part 3 : Scenario The scenario for the social enginnering is as follows: Ask help from a friend which is in the same class of the target (Wilson) I give Wilson a flashdisk containing the program. He then insert the flashdisk containing the program, and copy it into the desktop during school hours. He then

CONTINUE READING …

Computer Security Issues

BY IN CS - Computer Security Comments Off on Computer Security Issues

Worms: fast spreading using wide network (internet), sometimes uncontrollable Trojan Horse: a software that hides inside another software, need user interaction to make it active. mostly give destructive impact! Places that usually used by virus to defend itself: Registry Task Manager Configuration Files (WIN.INI, SYSTEM.INI, MSConfig etc) System Directories Social Engineering: Send a copy of “important”

CONTINUE READING …

Computer Science: Database Case Study

BY IN CS - Database, IB Computer Science Comments Off on Computer Science: Database Case Study ,

CitaHati Christian Senior School Formal Assessment, March 2015 Topic: Database   Student’s name: _________________________   Class: ____________   Date: 19th March, 2015 Subject:  ___ Computer Science___                           Level: HL / SL   Time: 1 hour 30 minutes     OTA SYSTEM MANDARA Inc. is one of the biggest OTA (Online Travel Agent) in India. It

CONTINUE READING …

Computer Science: Paper 3 Predicted Questions

BY IN CS - Exam, IB Computer Science Comments Off on Computer Science: Paper 3 Predicted Questions , ,

This refers to Electronic Banking Case Study 2015 Answer all questions. 1. Outline the meaning of the following terms. (a) phishing [2 marks] (b) push/pull technology [2 marks] 2. TransEuropa is based in a European country where it has been established for many years. It also has a presence in some developing countries where its

CONTINUE READING …

Computer Science: IA Criteria E obtaining highest mark

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science: IA Criteria E obtaining highest mark , ,

The student must evaluate the effectiveness of the product based on feedback from the client/adviser. This must include direct references to the success criteria identified in criterion A. The student must recommend proposals for the future improvement of the product. In the assessment criteria, it is stated for the highest mark : The product is

CONTINUE READING …

Computer Science: IA Criteria D obtaining highest mark

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science: IA Criteria D obtaining highest mark , ,

This criterion assesses the extent to which the product: functions, as evidenced in the video can be expanded and modified by future users as evidenced in the design and development documentation. In the assessment criteria, it is stated for the highest mark: The video shows that the product functions well. Some expansion and modifications of

CONTINUE READING …

Computer Science: IA Criteria C obtaining highest mark

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science: IA Criteria C obtaining highest mark , ,

The student must identify techniques used in developing the product. The student must explain the techniques, with screenshots, that were used to develop the product identified in criterion A, explaining why they have been used and why they are adequate for the task In the assessment criteria, it is stated for the highest mark: The

CONTINUE READING …

Computer Science: IA Criteria B obtaining highest mark

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science: IA Criteria B obtaining highest mark , ,

The student must provide a record of tasks and a design overview that includes an outline test plan. The Record of tasks form must be used. The record of tasks and design overview must refer to the product proposed in criterion A. In the assessment criteria, it is stated for the highest mark : The

CONTINUE READING …

Computer Science: IA Criteria A obtaining highest mark

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science: IA Criteria A obtaining highest mark , ,

The success criteria identified in criterion A will be used in criterion E to evaluate the effectiveness of the product. In the assessment criteria, it is stated for the highest mark: An appropriate scenario for investigation for an identified client, providing evidence of consultation, is described. The rationale for choosing the proposed product is justified and

CONTINUE READING …

Computer Science: MySQL Query Example

BY IN CS - Database, IB Computer Science Comments Off on Computer Science: MySQL Query Example , ,

Get all employee details from the employee table Get First_Name,Last_Name from employee table Get First_Name from employee table using alias name “Employee Name” Get First_Name from employee table in upper case Get First_Name from employee table in lower case Get unique DEPARTMENT from employee table Select first 3 characters of FIRST_NAME from EMPLOYEE Get position

CONTINUE READING …

Computer Science IA: Assessment Criteria

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science IA: Assessment Criteria , ,

Rationale General overview The computer science internal assessment focuses on the balance between the level of algorithmic thinking and problem-solving required to develop a product within the framework of the design cycle. The assessment criteria Criteria A, B and E are process-orientated and examine how the internal assessment task was carried out and allow common

CONTINUE READING …

Computer Science: DFD (Data Flow Diagram)

BY IN CS - Database, IB Computer Science Comments Off on Computer Science: DFD (Data Flow Diagram) , , ,

A-BEAUTY SPA Corp is a Mobile Spa Company based in Surabaya. It just opened its operation and want to develop a system. Customers can do a reservation to have a service and its staff/therapist will come to customer’s place to do the service. The company has more than 20 therapist and they earned a monthly

CONTINUE READING …

Computer Science IA Review: Photography Rating System

BY IN CS - Internal Assessment, IB Computer Science Comments Off on Computer Science IA Review: Photography Rating System , ,

Criteria A Revise this statement: notepad++ provides a simple connection to the database server. I don’t see any connection between the freeware notepad++ with its ability to connect to the database. In fact, notepad++ is only a text editor that has a built in feature for highlighting some parts of coding. This paragraph is so biased: XAMPP

CONTINUE READING …

Computer Science Database Project

BY IN CS - Database, IB Computer Science Comments Off on Computer Science Database Project , ,

A small restaurant called “PaPa Burger” needs to hire programmer to build the system for the restaurant. They need to record all the transaction everyday. The Cash Receipt will be given to their customer with the following layout ************************************ “PaPa Burger Restaurant” Inv No: _______________ Inv Date: ______________ 2pcs Small Burger $4.90 … $9.80 2pcs

CONTINUE READING …