Get premium membership and access revision papers, questions with answers as well as video lessons.

Cisy 203:Computer And Society Question Paper

Cisy 203:Computer And Society 

Course:Computer Science

Institution: Kenya Methodist University question papers

Exam Year:2012



KENYA METHODIST UNIVERSITY

END OF 3''RD ''TRIMESTER 2012 (EVENING) EXAMINATIONS
FACULTY : COMPUTING AND INFORMATICS
DEPARTMENT : COMPUTER SCIENCE AND BUSINESS
INFORMATION
UNIT CODE : BBIT 412/CISY 203
UNIT TITLE : COMPUTER AND SOCIETY
TIME : 2 HOURS




Instructions:

Answer question one and any other two questions.

SECTION A

Question One

Explain the following terms:

(8 marks)

Information
Communication
Technology
Authentication

Computers are perhaps, the best invention by man so far. The have impacted the society in different sectors. Explain the impact of computers in the following areas.

(10 marks)

Medical
Banking
Tech literacy
Entertainment

Briefly describe the THREE types of computer security.

(6 marks)


Explain THREE ways on how technology has threatened our privacy


(6 marks)

SECTION B

Question Two

Neo-luddites are modern critics of computerization, the Internet and Modern technology. Describe ten Neo-luddites criticisms on modern technology.

(10 marks)

Explain four potential challenges of integrating technology into a class.

(10 marks)

Question Three

Computer crime is a criminal activity that is related to the use of computers. Explain the following forms of computer crimes.

Computer fraud.

(3 marks)

Copyright infringement

(3 marks)

Computer theft

(3 marks)

Computer attack

(3 marks)

Explain any four key technological trends that heighten ethical concerns.

(8 marks)

Question Four

Today people rely on computers to create, store and manage critical information. It is also important to protect our computers from breaches of security and security risk. Discuss any five types of security measures that can be taken to ward off possible danger or damage.

(10 marks)

Authentication has played a major role in implementing computer ethics by safe guarding against unauthorized access and use. Explain any five forms of biometric authentication.

(10 marks)






More Question Papers


Popular Exams



Return to Question Papers