Choose 5 of any 10 questions on there, whichever is easiest. Word limit was not specified, most likely at least 1 paragraph an answer.
THE FLINDERS UNIVERSITY OF SOUTH AUSTRALIA Computer Science, Engineering and Mathematics
COMP1001 Fundamentals of Computing Mid Semester Test (25%)
Please submit your test answers through FLO by midnight Friday 21st April.
This test is designed to measure your understanding of the fundamental concepts in computer science and your ability to communicate that understanding in written form. The test will also present an opportunity to show that you are capable of problem solving and critical thinking.
Requirements • Demonstrate an understanding of the fundamental concepts in computing as presented in the first half of the semester • Demonstrate an understanding of the human impact on computing technology and implementation quality • Demonstrate an understanding of the business, security and ethical considerations of computing technologies.
Guidelines • 10 questions are presented in this paper. Select and answer 5 questions only. If you answer more than 5 questions, only the first 5 will be marked. Please provide the full question before writing your answer. • Each question is worth 10 marks. • There will be NO extensions to the due date or time. Any request for an extension will result in a supplementary test under standard exam conditions. • References must be provided where required. ANY evidence of plagiarism or cheating will result in a zero mark for the test and will be recorded on your academic transcript. • Submit your answers as a single Pdf file to FLO. No other submission format or location will be accepted. • Ensure that your name and FAN are clearly shown on your submission or you will receive zero marks.
Select 5 of the following 10 questions to answer.
1. Many Governments want to regulate technology and information access but is this actually possible? What impact does the fact that the Internet is global but not governed by any 1 entity have on this aim? Discuss the legal and ethical implications and include at least 1 case study.
2. Explain how using flip flops, gates and number system conversions could enable us to encrypt a phone number. Based on your conceptual explanation, present an algorithm to encode any phone number.
3. Imagine you were asked by NASA to design the file transmission standards for their next space mission. They will be conducting experiments that will require the transmission of video, sound and photographic images. Assuming that there is constant, but low, bandwidth connectivity between Earth and the spacecraft, which format and compression technique would you suggest for each file format? Justify your recommendations.
4. A travel booking office has a number of machines (n= 0…k) running on a shared client server architecture and all need to repeatedly print travel documentation for clients using the same office printer on both A4 and A3 paper. Each client transaction process prints a series of documents for each request. The printer access algorithm is as follows: While there is another waiting process, if process n requests the printer and the flag = n, grant the request, otherwise wait and retry. When process n is finished with the printer, if the flag = k then set the flag to 0 otherwise increment the flag to n+1. What are the potential problems with this approach and what would you suggest to make the print process work better for this scenario?
5. What would you suggest is the most secure operating system for a small catering business with no IT department? Justify your recommendation.
6. An international consulting company established in Adelaide is opening a new office in Hanoi on shared infrastructure. You are asked to advise on a network solution for this business to enable sharing of confidential documents and enable collaborative work. Design a network to enable this business to enable its international departments to work securely and effectively given the different network types in Vietnam and Australia. Explain how the parts of the local and international networks could be connected (routers and bridges etc) and whether a private or public infrastructure would be advised.
7. When solving a computing problem, is it better to have a strong algorithm developer or a strong programmer? Explain your decision.
8. What are the advantages and disadvantages of coding in a first or third generation language? Explain your answer in terms of expertise, security and run time processing.
9. You have written a java program to compare the characters in a new and old, 8 digit, binary notation password (using only 1’s and 0’s) to ensure the user has changed at least 1 character. To provide the functionality your method compares each digit in the new password to the corresponding digit in the old password. Draw a circuit diagram that shows the gates required to compare 2 binary digits. If they are not the same your circuit should output a 1 or if they are the same output a 0. Explain how your diagram would change if the inputs to your java method were in octal or base 8.
10. People are a critical component of computer system implementation and management. Even the best systems can fail because of human error although the computer is usually blamed. Consider the following scenario: A critical cardiac event warning alarm failed in a hospital emergency department monitoring system after being connected to a child patient for the first time. It was later found that the error occurred as the machine sensors were not able to be adequately connected to the smaller body of the child and hence the required heart monitoring signal was irregular and could not be read or processed as programmed so no output was presented. The error resulted in the death of the patient. Who is liable? The software developer? The hardware designer? The person who recommended that software be used in that case? or the hospital IT management team? Discuss how each could have been liable and discuss how liability would change if it was found that a patch was available from the software development company but had not been applied to the software in this hospital?