0% found this document useful (0 votes)
9 views11 pages

Mock 24 Infocorrect

The document covers various aspects of cloud computing, operating systems, and project management. It includes definitions, comparisons, and explanations of key concepts such as network architecture, OSI model, virtual memory, and risk management. Additionally, it discusses methodologies for project management and marketing research plans aimed at increasing international student admissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views11 pages

Mock 24 Infocorrect

The document covers various aspects of cloud computing, operating systems, and project management. It includes definitions, comparisons, and explanations of key concepts such as network architecture, OSI model, virtual memory, and risk management. Additionally, it discusses methodologies for project management and marketing research plans aimed at increasing international student admissions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SECTION A: Cloud Computing (20 marks)

1. Define network architecture and explain its significance in designing and


managing computer networks. (2 marks)

• Definition: Network architecture refers to the structured design and


organization of a computer network, encompassing its components (e.g.,
devices, protocols), their functions, and how they interact to facilitate data
communication.
• Significance:
o Provides a blueprint for designing scalable and efficient networks.
o Ensures interoperability and compatibility among devices.
o Facilitates management by defining protocols (e.g., TCP/IP) and
security measures.
o Enables troubleshooting and upgrades by offering a clear structure.
• This foundational role is critical for reliable network performance and future
expansion.

2. Compare and contrast the client-server and peer-to-peer network


architectures, providing diagrams and descriptions for each. (1 + 4 x 2 = 9
marks)

• Client-Server Architecture (4 marks):


o Description: A centralized model where clients (e.g., workstations)
request services or resources (e.g., files, databases) from dedicated
servers.
o Diagram:

text

Copier

[Client 1] --- [Server] --- [Client 2]

o Features:
▪ Centralized control simplifies management and backups.
▪ High scalability with additional servers.
▪ Enhanced security through controlled access.
▪ Dependent on server availability; failure can disrupt all clients.
• Peer-to-Peer (P2P) Architecture (4 marks):
o Description: A decentralized model where all nodes (peers) function
as both clients and servers, sharing resources directly with each other.
o Diagram:

text

Copier

[Peer 1] --- [Peer 2] --- [Peer 3]

oFeatures:
▪ No central server, reducing costs and single-point failure risk.
▪ Resource sharing (e.g., files, bandwidth) is distributed.
▪ Less secure due to open access among peers.
▪ Difficult to manage and scale with many nodes.
• Comparison (1 mark):
o Aspect | Client-Server | Peer-to-Peer
o Centralization | Centralized | Decentralized
o Scalability | High (add servers) | Limited (node-dependent)
o Security | High (controlled) | Lower (shared)
o Cost | Higher (server costs) | Lower (no central server)
o Management | Easier (centralized) | Harder (distributed)

3. Define the OSI model and outline its layers in descending order, specifying
the data unit at each layer. (1 + 7 + 3.5 = 11 marks)

• Definition (1 mark): The OSI (Open Systems Interconnection) model is a


conceptual framework developed by the International Organization for
Standardization (ISO) to standardize communication between diverse
computer systems by defining a seven-layer structure.
• Layers in Descending Order (7 marks):
1. Application Layer: Provides network services directly to user
applications (e.g., email, web browsing).
▪ Data Unit: Data
2. Presentation Layer: Translates data between application and network
formats (e.g., encryption, compression).
▪ Data Unit: Data
3. Session Layer: Manages sessions between applications (e.g.,
establishing, maintaining, terminating connections).
▪ Data Unit: Data
4. Transport Layer: Ensures end-to-end communication and error-free
data transfer (e.g., TCP, UDP).
▪ Data Unit: Segments (TCP) / Datagrams (UDP)
5. Network Layer: Handles logical addressing and routing of data
packets (e.g., IP).
▪ Data Unit: Packets
6. Data Link Layer: Manages physical addressing (e.g., MAC) and error
detection (e.g., Ethernet).
▪ Data Unit: Frames
7. Physical Layer: Transmits raw bit streams over physical media (e.g.,
cables, wireless).
▪ Data Unit: Bits
• Explanation (3.5 marks): Each layer adds specific functionality (e.g.,
routing at Network, error checking at Data Link), with data units evolving
(e.g., data to packets to bits) as information moves down for transmission
and up for reception. This layered approach ensures modularity and
interoperability across systems.

True/False Questions (Answer with T/F and brief reasoning where needed)

a. Cloud computing involves the physical implementation of hardware


programs.

• F: Cloud computing involves delivering services (e.g., storage, software)


over the internet, not physical hardware implementation, which is handled by
providers.

b. Microsoft Office 365 is an example of software as a service (SaaS).

• T: Office 365 provides software (e.g., Word, Excel) via subscription over the
internet, fitting the SaaS model.

c. A well-architected cloud computing network can be adjusted to provide


bandwidth on demand.

• T: Cloud networks are scalable, allowing dynamic bandwidth adjustments


based on user demand.
d. Microsoft Azure is a cloud platform as a service (PaaS) developed by
Microsoft.

• T: Azure offers PaaS (e.g., app development platforms), though it also


provides IaaS and SaaS. The statement is correct in context.

e. Cloud services typically have a one-to-many relationship with their


customers.

• T: Cloud services (e.g., Google Drive) serve multiple users from a single
platform, fitting a one-to-many model.

f. Dropbox is an example of a cloud storage service.

• T: Dropbox provides cloud storage, allowing users to store and access files
online, alongside services like Apple iCloud and Box.

g. Cloud providers offer cloud services exclusively to individual users.

• F: Cloud providers serve both individuals and organizations (e.g.,


businesses, governments), not just individuals.

h. Cloud applications require an internet connection to function.

• T: Most cloud applications rely on internet connectivity to access services,


though some may offer offline modes with limited functionality.

SECTION B: Operating Systems (40 marks)

1. Explain the concept of virtual memory and its role in memory management.
(5 marks)

• Concept: Virtual memory is a memory management technique where the


operating system uses disk space as an extension of RAM, creating an
illusion of a larger memory space. Each process gets its own virtual address
space, mapped to physical memory.
• Role: It enables efficient memory allocation by allowing processes to run
even if physical RAM is limited, prevents memory conflicts through address
isolation, and supports multitasking by swapping data between RAM and
disk. However, excessive swapping can slow performance (thrashing).
2. Describe the role of the operating system in managing input/output devices.
(5 marks)

• The OS manages I/O devices by:


o Device Abstraction: Providing a uniform interface (e.g., drivers) to
interact with diverse hardware.
o Scheduling: Prioritizing I/O requests to optimize device usage.
o Buffering: Temporarily storing data to handle speed mismatches
between devices and CPU.
o Error Handling: Detecting and resolving I/O errors (e.g., device
failure).
o This ensures efficient communication between hardware and software,
minimizing direct user interaction with devices.

3. Discuss the importance of file management in an operating system. (5


marks)

• Importance:
o Organization: File management organizes data into files and
directories for easy access.
o Access Control: Manages permissions to ensure security (e.g.,
read/write access).
o Storage Efficiency: Allocates disk space optimally, preventing
fragmentation.
o Data Integrity: Ensures reliable storage and retrieval, preventing data
loss.
o User Interface: Provides tools (e.g., file explorers) for users to
interact with files.
• Without it, data handling would be chaotic, impacting system usability and
performance.

4. Compare and contrast the functions of the kernel and shell in an operating
system. (5 marks)

• Kernel:
o Core component, manages system resources (CPU, memory, I/O).
o Operates at a low level, interacting directly with hardware.
o Example: Handles process scheduling, memory allocation.
• Shell:
o User interface (CLI or GUI) to interact with the OS.
o Operates at a higher level, translating user commands to kernel
actions.
o Example: Bash shell executes commands like "ls" to list files.
• Contrast: Kernel is internal and system-focused; shell is external and user-
focused. Both are essential for OS functionality.

5. Explain the concept of process scheduling in an operating system and


discuss various scheduling algorithms. (5 marks)

• Concept: Process scheduling determines which process runs on the CPU and
for how long, optimizing resource use and system performance. It manages
the ready queue of processes.
• Algorithms:
o First-Come, First-Served (FCFS): Processes are executed in arrival
order; simple but can cause long wait times (convoy effect).
o Shortest Job First (SJF): Prioritizes shortest tasks; reduces average
wait time but requires knowing execution times.
o Round Robin (RR): Each process gets a time slice (quantum); fair but
overhead from context switching.
o Priority Scheduling: Executes higher-priority processes first; risks
starvation for low-priority tasks.
o Scheduling balances responsiveness, throughput, and fairness,
depending on system goals.

6. Discuss the role of device drivers in an operating system and how they
facilitate hardware communication. (5 marks)

• Role: Device drivers are software modules that act as intermediaries between
the OS and hardware devices (e.g., printers, keyboards).
• Facilitation:
o Translation: Convert OS commands into hardware-specific
instructions (e.g., sending print data to a printer).
o Abstraction: Provide a standard interface, hiding hardware
complexity from the OS.
o Management: Handle interrupts and errors, ensuring smooth
operation.
o Configuration: Enable the OS to recognize and configure devices
during boot-up.
• Drivers ensure seamless integration of hardware, enhancing system
compatibility and functionality.
7. Differentiate between symmetric multiprocessing and asymmetric
multiprocessing in operating system design. (5 marks)

• Symmetric Multiprocessing (SMP):


o Multiple processors share a common memory and OS, handling tasks
equally.
o Example: All CPUs can run any process; used in modern PCs.
o Advantage: Load balancing; scalable.
o Disadvantage: Complex synchronization.
• Asymmetric Multiprocessing (ASMP):
o One processor (master) controls the system; others (slaves) execute
specific tasks.
o Example: Master assigns tasks to slaves; used in older systems.
o Advantage: Simpler design.
o Disadvantage: Master can be a bottleneck.
• SMP is more flexible and efficient for modern systems; ASMP suits
specialized applications.

8. Explain the concept of deadlock in operating systems and discuss strategies


for deadlock prevention and recovery. (5 marks)

• Concept: Deadlock occurs when two or more processes hold resources and
wait for each other to release others, causing a standstill (e.g., Process A
holds Resource 1, waits for Resource 2; Process B holds Resource 2, waits
for Resource 1).
• Prevention:
o Resource Ordering: Assign a global order to resources; processes
must request in order, preventing circular wait.
o Hold and Wait Elimination: Processes must request all resources at
once or release all before requesting more.
• Recovery:
o Process Termination: Kill one or more processes to break the
deadlock.
o Resource Preemption: Forcibly take resources from one process and
allocate them to another.
• Prevention avoids deadlocks but may reduce efficiency; recovery resolves
them but can disrupt processes.

SECTION C: Project Management and Legal Regulations (20 marks)


I. Short Structurals (10 marks)

1. Describe the concept of risk management in project management and its


importance in project success. (2 marks)

• Concept: Risk management involves identifying, assessing, and mitigating


potential issues that could impact a project’s objectives (scope, time, cost).
• Importance: It minimizes disruptions, ensures timely delivery, controls
costs, and enhances decision-making, increasing the likelihood of project
success.

2. Discuss the significance of stakeholder management in project management


and strategies for effective stakeholder engagement. (2 marks)

• Significance: Stakeholder management ensures alignment of project goals


with stakeholder expectations, reducing conflicts and securing support.
• Strategies: Identify stakeholders early, communicate regularly (e.g., updates,
meetings), address concerns promptly, and involve them in key decisions to
build trust.

3. Differentiate between agile and waterfall project management


methodologies, highlighting their respective advantages and disadvantages. (2
marks)

• Agile:
o Iterative, flexible approach with frequent releases and feedback.
o Advantages: Adapts to changes, delivers value incrementally.
o Disadvantages: Less predictable, requires active stakeholder
involvement.
• Waterfall:
o Linear, sequential approach with distinct phases.
o Advantages: Clear structure, predictable timeline and budget.
o Disadvantages: Inflexible, late testing risks major revisions.

4. Explain the concept of earned value management (EVM) in project


management and its role in project performance evaluation. (2 marks)

• Concept: EVM integrates scope, schedule, and cost to measure project


progress (e.g., using metrics like Earned Value (EV), Planned Value (PV)).
• Role: It evaluates performance by comparing actual progress to planned,
identifying variances (e.g., schedule variance, cost variance), and forecasting
completion, enabling timely corrective actions.

5. Define the term "critical path" in project management and discuss its role
in project scheduling. (2 marks)

• Definition: The critical path is the longest sequence of tasks in a project that
determines the shortest possible duration to completion.
• Role: It identifies tasks that cannot be delayed without delaying the project,
helping prioritize resources and schedule activities to meet deadlines.

II. Essay (10 marks)

6. As a project manager, outline the steps you would take to conduct a risk
assessment for the construction project of 2 classrooms at Africa Blockchain
Institute. Detail the process of identifying, analyzing, and mitigating potential
risks, and discuss strategies for monitoring and controlling risks throughout
the project lifecycle. (5 marks)

• Steps for Risk Assessment:


1. Identify Risks: Brainstorm with the team and stakeholders to list
potential risks (e.g., delays due to weather, material shortages, labor
strikes). Use historical data and checklists.
2. Analyze Risks: Assess each risk’s likelihood and impact (e.g., high
likelihood of rain delays in the rainy season, high impact on schedule).
Use a risk matrix to prioritize.
3. Mitigate Risks: Develop response plans:
▪ Weather delays: Schedule construction during dry months, have
backup indoor tasks.
▪ Material shortages: Secure contracts with multiple suppliers.
▪ Labor issues: Ensure fair wages and clear contracts to prevent
strikes.
• Monitoring and Controlling Strategies:
o Regular Reviews: Hold weekly meetings to track risk status and new
risks.
o Risk Register: Maintain a log to document risks, responses, and
outcomes.
o Contingency Plans: Allocate a budget reserve (e.g., 10% of project
cost) for unforeseen issues.
o KPIs: Monitor schedule and cost variances using tools like EVM to
detect risk impacts early.
• This proactive approach ensures the project stays on track despite
uncertainties.

7. Develop a comprehensive marketing research plan for Africa Blockchain


Institute aimed at increasing international student admissions. Discuss the
methodologies, data collection techniques, and analysis approaches you would
employ to gather insights into target markets, competitor analysis, and student
preferences. (5 marks)

• Marketing Research Plan:


1. Objective: Increase international student admissions by understanding
target markets, competitors, and preferences.
2. Methodologies:
▪ Quantitative: Surveys to measure student interest in blockchain
education.
▪ Qualitative: Focus groups to explore motivations and barriers.
3. Data Collection Techniques:
▪ Surveys: Distribute online questionnaires to prospective
students in target regions (e.g., Asia, Europe) via social media
and email.
▪ Focus Groups: Conduct virtual sessions with international
students to discuss preferences (e.g., program structure, cost).
▪ Secondary Research: Analyze competitor websites, brochures,
and reviews to assess their offerings.
4. Analysis Approaches:
▪ Target Markets: Segment data by region, age, and academic
background to identify high-potential markets (e.g., tech-savvy
students in India).
▪ Competitor Analysis: Compare competitors’ programs, fees,
and marketing strategies to identify gaps (e.g., lack of
scholarships).
▪ Student Preferences: Use thematic analysis for qualitative data
(e.g., preference for online learning) and statistical analysis for
surveys (e.g., 70% prioritize affordability).
5. Insights and Recommendations:
▪ Offer scholarships to attract cost-conscious students.
▪ Highlight unique blockchain certifications to differentiate from
competitors.
▪ Target tech hubs like Nigeria and India with digital marketing
campaigns.
• This plan ensures data-driven strategies to boost international enrollment.

You might also like