Vous êtes sur la page 1sur 3

(These answers are for example only and not considered a model answer)

Assignment (Unit 18): Writing 10:


A hacker writes script and hides it in other code such as an image file or utility and attaches the hidden script (Trojan) to email. Then, he sends the email to someone at Microsoft company. In Microsoft network, the anti-virus detection program does not detect the Trojan. This allows the Trojan thru the firewall. When a Microsoft employee opens the attachment, the Trojan code is activated. This will cause the virus program to record all the names and passwords and use a Microsoft email program to send them to the hacker. These names and passwords are used by the hacker to cruise Microsoft network for source code software. Specialist reading (part B):
1/ 2/ 3/ 4/ a iv, b iii, c i, d ii a iii, b iv, d I, e ii, f v a False, b True, c False, d False, e False, f False, g True, h True c,d,b,a

Assignment (Unit 19):


Specialist reading (part B):
2/ a iv, b vi, c I, d ii, e iii, f v 3/ a False, b True, c False, d False, e True, f False

Assignment (Unit 20):


Starter 1:
1 Hacker Unite. 2 A new phishing scam which substituted a bogus website address for any bank details in the computer. 3 Kevin Mitnick. 4 The hackers ran up a 1m phone bill. 5 2 and 3 6 it forced them to slow down or even stop working

Word Study 8:
B,A B C,D,E E E,D B B D C D,C,E anti-virus software backups bandwidth browser domain name encryption firewalls FTP GPS IRC D,E E A C B D A A E,D D,C E ISP hyperlink logic bomb pagers password router trigger routine Trojan URL Usenet XML

Writing 11:
Step 1: an infected .EXE file arrives as an email attachment. Step 2: the infected .EXE file is opened. Step 3: the computer is infected and used to spread the virus. Step 4: when first run, the virus may copy one .EXE file using the same file name but with the final character of the filename decreased by 1. Step 5: the copied file is then infected. Step 6: a WIN.INI entry maybe created to execute the infected file when the system starts up. Step 7: the copied executable infects other 32 bit .EXE files when run. Step 8: five minutes after the file is opened, the worm creates a .DAT file hidden on the hard disk, named after the machine name. Step 9: the worm uses mass mailing techniques to send itself to these addresses.

Assignment (Unit 21):


Language work 8:
First input the room number. Then set the total to zero. Next, set the VAT and count to zero. After that, read a record. If it is for this room number, then if the count is zero, print the guest details. Next, add the record amount to the total. Then add one to the count. After that, print the record details. Repeat these steps until there are no more records. If the count is greater than zero, then calculate the VAT and gross. Print the total, VAT and finally print the gross.

Writing 10:
Parallel implementation: it means that both systems run at the same time for a period. The advantage is that if the new system does not operate properly, the old system is available as a fallback. The disadvantage is that two systems have to be maintained. Phased implementation: it is when parts of the system are converted separately. This maybe done gradually or in groups. The advantage is that people can gradually get used to the new system and certain problems can be dealt with as they arise. The disadvantage is that this method is more complex and time-consuming. In addition, there may be problems of incompatibility between the old and the new systems. Pilot implementation: is when the new system is piloted in part of the company before extending it to the whole company. The advantage is that problems can be identified and solved before the new system is implemented throughout the company. The disadvantage is that it takes longer to introduce the new system.

Specialist reading (part B):


1/ a vi, b i, c v, d ii, e vii, f iii, g iv 2/ inheritance , object-oriented , modules , instances , inherit , objects , key , development , maintenance.

Vous aimerez peut-être aussi