Uploaded by やรץcho

IT project

advertisement
1)
a) The information should be accurate.
b)People might not be truthful when responding to the questionnaire or the interview, there is a
chance that the individuals gathering the data will make mistakes when gathering it, the
questions might not be phrased correctly, Interviews might explain the response and ask
questions based on previously provided responses.
c) User is in contact with the main computer.
d) - Visit the website
- select a category of goods
- add items to your shopping cart or basket
- click the "Buy" button
- Next, click "Proceed to Checkout," enter your shipping address, and then submit your order
- Enter your credit or debit card information - Verify your order
2)
Benefit
Modules can be used to write programmes. Programmers can divide a large programme into
smaller, more manageable modules (object files or libraries) using the linker. Due to the fact that
different developers can work on separate modules without influencing each other's code, this
modularity encourages code reuse and maintainability. It can also use less RAM, saving money
on memory costs.
Drawbacks
The same variable may be assigned multiple names in various modules or sections of the
codebase, which is one of the main concerns with variable names. Developers may find it
confusing and challenging to comprehend how variables are used throughout the complete
programme as a result of this predicament. When code from various modules interacts with one
another, inconsistent naming might potentially cause errors and undesired behaviour.
When variable names are not descriptive and unambiguous, the documentation must make up
for this intricacy by being more thorough. It is more difficult for other developers (and even the
original creator) to grasp the function and usage of each variable when the variable names are
unclear. As a result, in-depth explanations or supporting material are required to provide context
and understanding. The development team's overall burden may grow as a result of the timeconsuming nature of writing and maintaining thorough documentation.
3)
Benefit
- Prevent files getting corrupted
- Prevent computer from crashing
- Prevent computer password from being changed
- can select which file or folder to scan
Drawbacks
- Sometimes it need to pay
- Only delete the whole file that is infected or detected
- Takes space in storage/harddrive/disk
- It needed to be up to date
4)
- Data protection and privacy: To safeguard sensitive data and uphold privacy, encryption is
required. When data is encrypted, it is changed into an unintelligible format that can only be
decoded by authorised people who have access to the encryption key. This guarantees that
even if unauthorised people access the data, they will be unable to grasp its contents.
- Data Breach Mitigation: Encryption helps to lessen the effects of data breaches. Encrypted
data stays unreadable and useless to attackers if it is taken or accessed without authorization,
minimising the potential harm brought on by the breach.
-Data Storage Security: Data stored on devices like hard drives, laptops, and mobile devices
needs to be encrypted. The encrypted data is still inaccessible without the right decryption key
in the event that the physical device is misplaced, stolen, or compromised.
- Data Integrity: By ensuring that data is unaltered throughout transmission or storage,
encryption can also be utilised to protect data. One can confirm the accuracy of the data and
find any unauthorised changes by utilising encryption with digital signatures.
5
ai)A light sensor, also known as a photodetector or photosensor, is a device that measures the
intensity of light in its surroundings. It converts the light energy into an electrical signal that can
be further processed and analyzed by electronic systems.The automatic control of lights is a
viable application for a light sensor in a monitoring system. Light sensors can be used to
measure ambient light levels in a smart home or workplace setting. The technology can modify
the artificial lighting to keep the level of brightness where it should be. When there is enough
natural light during the day, the system can reduce or turn off artificial lighting to conserve
energy. On the other hand, in darker situations, the system can make the lights brighter to make
sure that the occupants have enough light.
aii)A temperature sensor is a device that gauges the ambient temperature and transforms it into
an electrical signal that electronic systems can understand and use. Climate Control Systems:
Temperature sensors are used to keep track of the outside temperature in heating, ventilation,
and air conditioning systems. For the system to control the output of heating or cooling and
maintain a comfortable temperature for people, this information is important.
b
One-Point Calibration.
- Easiest method to carry out.
- Only one point of data is used, making it simple and quick.
Two-Point Calibration:
- More complex than one-point calibration but still relatively straightforward.
- Involves calibrating the sensor at two points within the expected range of values.
- Necessary when monitoring a range of values to account for potential nonlinearities.
- Requires a linear relationship between sensor readings and the variable being measured,
making it unsuitable for curved relationships.
Multi-Point Calibration:
- The most complex calibration method.
- Used for non-linear, multipoint relationships where the sensor response is not linear.
- Requires multiple data points to calibrate the sensor accurately.
- Greater knowledge of mathematics is needed to analyze and fit the calibration curve.
6. The hacker will send out a fake email to the victim. It uses email to persuade the victim into
giving personal information, the hacker can also ask the victim to download to 3rd party app to
get the information. The email will look like legitimate but the fact is fake. The email will look like
something that will demand the target attention, so the email will have a website URL inviting to
go to the site , after opening the link it will take take them to a fake website, and the hacker will
ask the victim to enter their personal information such as their bank account.
7.
- Some people in developing country don't have a clear address, making it challenging to deliver
products ordered online.
- Since many people in developing country lack access to broadband, transaction speeds are
slower.
- Many people in developing countries lack access to banks and credit cards, so they must
arrange for someone else to make the purchase on their behalf.
- Internet purchases in many developing countries are not protected by consumer protection
legislation, leaving buyers defenceless against dishonest vendors.
- Power shortages in developing countries might result in a connection being lost throughout the
procedure, forcing a retry or losing the sale.
8.
a)
- A programme that spreads itself across other computers by duplicating itself
- does not need to be attached to an already-running programme or file.
- They spread out and multiply, taking up more storage.
- can alter or delete data, introduce other malicious software, bring backdoors, and so on
- A worm takes advantage of weaknesses in systems or networks security
b)
- The use of a malicious computer program to access a computer
- Misleading people about its true purpose/passing itself off as genuine software
- Provides the creator with access to control the machine it has infected
- They don't try duplicate themselves
9)
A format used for storing data, to all users. Both proprietary and open-source software can use
an open-source file format. The code can be modified without violating copyright, open source
formats are frequently referred to as free file formats. Open source is needed because not
everyone can purchase proprietary software and users can work on files in many locations
without the need for the same software.
Download