DEPARTMENT OF MATHEMATICS
AHMADU BELLO UNIVERSITY, ZARIA
COSC TITLE: Professional and Social Aspects of Computing
COSC CODE: COSC409 Continuous Assessment
ANSWER ALL QUESTIONS
Time: 40mins
Registration Number: Signature
Qn is a set of beliefs about right and wrong behavior.
Q2) An Estimated 85 percent of all fraud is committed by Employee. TRUE or FALSE.
Q3) IT workers are not liable for malpractice because they do not meet the legal definition
of a professional. TRUE or FALSE
Q4) List three characieristics that distinguish a gift from a
bribe. and
a process that one undertake voluntarily to prove competency in a set of
es
skills (a) licensing (b) Certification (c) Registering (d) all of the above
QA provide the would-be hackers with fake information. (a) Firewall (b)
intrusion prevention system (c) honey pot (d) none of the above
Q7) An attack on information system that takes advantage of vulnerability is called (a) exploit (b)
firewalls(c) honey pot.
Q8) which of the following identifies the numbers of dialed outgoing call (a) Wiretap b) pen
register(c) trap and trace (d) phishing .
(Q9) which of the following is nota technique employed by identity thieves. (a) Spyware (b)
hacking database (c) trap and trace (d) phishing
QU0) The is the most basic legal guarantee to the right of freedom of
expression (a) Bill of right (b) Fourth Amendment (c) First Amendment (d) Constitution
QI1) A written statement that is false and that harms another person is called
Q12) True or False Under U.S.law, a bribe is not a crime if it was paid as part of doing business
im eforeign-countey-
Q13) Information that describe individual employees is called , and information
that describe a company and its operations is called
QA) Risk is the product of an event’s multiplied by its,QU5) A device that serves as a barrier between company and outside world is called
is a program a hacker secretly installs on a computer
act provide the public with the means to gain access to
QI6)
QI7) The
certain government records.
QI8) Judges frequently deny government request for Title III wiretap. TRUE or FALSE
Qs) is the science of encoding messages so that only the
sender and intended receiver can understand them.
Q20) A lawsuit in which the true identity of the defendant is temporarily unknown is called
Q21) Anonymous expiession which allows people to state opinions without revealing their
identity has been found unconstitutional. TRUE or FALSE
Q22) The Communication Decency Act which was passed in 1996 and was aimed at protecting
children from pornography was found unconstitutional. TRUE or FALSE
Q23) is software that can be installed with a web browser to block
access to certain website that contains offensive material.
Q24) CAN-SPAM legalizes the sending of unsolicited emails. TRUE or FALSE
Q25)
number of people.
Q26) The public key encryption algorithm that uses 128 bits encryption that represents 2'2°
is the transmission of the same e-mail messages to large
possible keys is called
@27) Implementation of a strong firewall provides adequate security for any network. TRUE or
FALSE
Q28) Executive 12333 is legal authority for electronic surveillance inside the U.S, TRUE or
FALSE
29) Computer crime is rapidly increasing in the United States but not in the rest of the world.
TRUE or FALSE
Q30) The types of data collected while surfing the web are. 2
; i ocean
and
7DEPARTMENT OF MATHEMATICS
AHMADU BELLO UNIVERSITY, ZARIA
COSC 409 TEST ANSWER ALL QUESTIONS
Signature
Time: 40mins
‘ation Number:_
Regi
QI) Habits that incline people to do what is unacceptable are called
.ccepted social norms.
Q2) A person who act with integrity acts accordance with generally a
TRUE or FALSE.
Q3) IT workers are not liable for malpractice because they do not meet the legal definition
of a professional. TRUE or FALSE
Q4) List three characteristics that distinguish a gift from a
bribe ; and
Q5) is a process that one undertake voluntarily to prove competency in a
set of skills (a) licensing (b) Certification (c) Registering (4) all of the above
QA provide the would-be hackers with fake information. (a) Firewall
(b) intrusion prevention system (c) honeypot (4) none of the above
7) Anattack on information system that takes advantage of vulnerability is called (2)
exploit (b) firewalls(c) honey pot.
Q8) which of the following identifies the numbers dialed for outgoing call (a) Wiretap b) pen
register (c) trap and trace (d) phishing
Q9) which of the following is not a technique employed by identity thieves. (a) Spyware (b)
hacking database (c) trap and trace (d) phishing
Q10) The is founded in 1947 and sponsor special interest group on IT
related issues (a) ACM (b) AITP (c) PMI (d) COPA
QI1) Executive Order 12333 is legal authority for electronic surveillance inside U.S.TRUE
or FALSE
Q12) True or False Under U.S.law, a bribe is not a crime if it was paid as part of doing
business in a foreign country.
Q13) Information that describe individual employces is and information that
describe a accompany and its operations isQI4) Risk is the product of an event’s. multiplied by its
QI5) The Check Clearing Act Requires Banks to Accept paper document in lieu of Original
Paper checks. TRUE or FALSE
Q16)____—__ isa harmful code that can propagate without human intervention
QI7) The act provide the public with the means to gain
access to certain government records.
QI8) Judges frequently deny government request for Title III wiretap. TRUE or FALSE
is the science of encoding messages so that only the
ais)
sender and intended receiver ean understand them.
0) act allows wiretapping of aliens and citizens in the
United States
liated website and keep
Q21) Click stream data monitor consumer surfing through any affi
track of information. TRUE or FALSE
22) The Electronic Communication Act of 1986 Prosecutors must justify their request.
TRUE or FALSE
Q23)
undesirable character.
Q2) Ingress filtering means ensuring spoofed packet doesn’t leave a network. TRUE or
is software that identifies criminal’s suspects and their
FALSE
Q25) is the transmission of the same e-mail messages to large number of
people.
Q26) An encryption system that uses a single key to both encodes and decodes messages.
Q27) Implementation of a strong firewall provides adequate security for any network. TRUE
or FALSE
Q28) and are nonprofit organization that regulate approach to
data privacy
Q29) Computer crime is rapidly increasing in the United States but not in the rest of the
world. TRUE or FALSE
Q30) A person who tests the limitations of computer systems out of intellectual curiosity is
called (a) Crackers (b) Hackers (c) Insiders (d) Industrial SpiesAhmadu Bello University, Zaria
t of Computer Science
tion Technology
st Semester Examination
2017/2018 F
Instruction: Answer any four questions Time: 2 hours
Question 1
a) What is Ethics? And why is it important to foster good business ethics?
(7 marks)
b) Why are public concerns about the ethical use of information technology?
Discuss. (6 marks)
c) What is the difference between opt-in policy and opt-out policy? (2 marks)
Question 2
a) Discuss the five (5) Issues that apply to intellectual property and information
technology (10 marks)
b) What is an affiliated website’
while surfing the web. (5 marks)
.2 List and explain the types of data collected
Question 3
a) What is Cryptography? (2 marks)
b) With the aid of a diagram explain a public key encryption system. (5 marks)
c) List and explain the four (4) most frequent attacks on network computer and
their characteristics (8 marks)
Question 4
n the following Nontraditional workers. (9 marks)
a) Write short notes o1
(i) Contingent, (ii) H-IB (iii) Outsourced offshore
b) List the five (5) steps used to combat student plagiarism? (5 marks)
c) What is Internet Filter? (1 mark)
Question 5
a) Discuss any four
b) List the four ways to limit or stop
(4 marks)
c) What is a corporate ethics officer? (1 mark)
(4) software testing methods? (10 marks)
deposit of cookies on hard drives.
Question 6
a) List and explain the four (4) use of Information Technology (IT) in
Healthcare industry. (8 marks)
b) List 3 differences between a gift and a bribe (6 marks)
¢c) What is an anonymous remailer service? (1 mark)Department of Computer Science
Ahmadu Bello University, Zaria
crnenter Hxamination
2016/2017 Session = Fitst
COSCA0S: Webs Application Engineering HE
Ol Finns Allowed: 2.5 Nowe
Date: Ap
Instructions:
Answer ANY four questions,
‘Question (1) is Compulsory
Write your answers in the space provided! on this quest
1
3 paper
Student's Matric Nor —
nature
Students Sivy
lator’s Signatures
ajhanesimple CRUD application
, i evelop
J been asked by yur projet supervisor to develop a simpli CAN Te
1. Youh a
containing two (2) fields (Full name and Gender). The table that fe he PHP and
database schema you must adhere to, Also you are expected to write the a
MySQL codes for the filenames highlighted next.
udent
[Field name [Data type | Primary Ke: Auto Inc
iE [nt [Yes Yes
Fullname | Varchar (50) [No No.
[Gender | Varchar (10) [No No
a. student sql (SQL codes only)
fomnection-php (Use connection parameters of your choice)
c. listphp
4. create.html (This should contain plain HTML) x
©. ereate_exec.php; not to trust user input
In public interfaces of web applications, a developer is Se several approaches.
and this has resulted in ensuring input validation of form fil form using PHP's
Write the complete PHP codes to validate all user inputs on a fo the following
native functions or regular expressions. Assume the form contains S
fields
i. Name in full.
ii, Matric number (Adhere to the format of A.B.U).
Password (This must contain exactly 10 alphanumeric character and must
begin with the string phpmysql).
iv. Mobile phone number (This ent
as +2348090909090),
v. Email Address,
6. Write the PHP function definition that tr
ity must adhere to international format such
‘ansfers an uploaded file to a new location405 lecturer has Successfully dew
race in which he sets session ¥
shboard. He has also
a. Write the
ccloped a web application containing user
ariables on successful login and redirects the
annie ee ‘ded a user logoutaction without implementation.
ocssTons arid Techs hee ere ese a wil tere all
be Wate tc matte te user to the login page (losn-php).
P function that will convert an associative array to a JSON object.
4. Study carefully the table below and answer the questions that follows:
| Grade Remark
[A Excellent
iD Very Good |
tc Merit
Create an associative array using entries in Table 1. Entries in grade column
should be captured as keys while entries in remark column should captured as
values.
b. Write a simple PHP function that accepts the associative array in (a) above as
parameter. Inside the function body, write the codes to iterate the array and set
cookies using the key value pairs. All cookies must expire in one month time
SI—
ronous Javascript And XMLis a group of interrelated
client-side to create interactive web applicatioy ‘d web,
t to load the content of HTML file (cose fas h
405.htm,
x an acronym for Asynch
development methods used on the
a. Wrie the complete AJAX scrip!
inte a div element. Assume the div
b Meation three (3) Data Manipulation Staten tents (DML) in SQL you kno
you know
element hus its id set to “loadme’
n example for each,
writits simplest, the client/server architecture is about dividing up application processing
into two or more logically distinet pieces.
a. Using a diagram describe the dynam
of web applications.
b. Mention three (3) simple data types in PHP you know,
6
ic client / server request / response sequenceDepartment of Computer Science
Ahmadu Bello University, Zaria
2017/2018 Session - First Semester Examination
COSC405: Web Application Engineering Il
Date: May 22, 2018 Time Allowed: 2 Hours
Instructions:
1. Answer Question 1 «
2. Write your answers in the
d any other three (3).
¢ provided on this question paper
Registration Number: _ Student's Signature:
Invigilator's Signature:
Date/Ti
{ Question — “Max Score Score Obtained
| H 7 | 15
|
Ke le
| 2 15
ince
{3 15
|
L =
\4 15
I | .
LL |
| 2 | 15
Cosca05-2017/2018.sressions and Control(Compulsory) —— (15mis)
3.0 and $e=5
Question I =
(3mks)
(3mks)
b) Write the output (rom browser) of the following PHP script?
";
}
_
“
cc) Mention three (3) simple data types in PHP you know (3mks)
‘ANS: . |
i)
ii)
iti) ~
Junction getGrade() that returns a grade for any given score. The function
elie ore (assume integer ranging from 0 to 100 inclusive) and returns
i : corresponding grade (A, B, C, D, E or F). Complete the implementation of the function
te ow. Use the following ‘ation for the range of scores for each grade:
-39 is F, 40-44 is 45-49 ig D, 50-59 is C, 60-69 is B, 70-100 is A
4) Below is
aceepls one parame
—
COSC405-2017/2018rade (gscore) {
function 3}
sgrade
return sgrade;
}
Snudy the PHP seript given ext and write any possible output. (mks)
fase
ee ™
COSC405-2017/20185 7 7
Question 2— Forms and Database Interaction
s 15,
i clement:
“onsider the following form elemen . spar" »
See confections “handler .php* method ="POsT an
Username:
i. Is there anything wrong with the above form element? If yes what is the error?
(3.5mky)
[' NS:
When the form is filled and submitted, which of the following variables) will be
available in handler.php? S_POST, SGLOBALS, S_REQUEST, S_FILES,
S_GBT (4.5mky)
[ANs:
) Consider the HTML for