logo

Crowdly

CSIT123 (S125) Computing and Cyber Security Fundamentals

Looking for CSIT123 (S125) Computing and Cyber Security Fundamentals test answers and solutions? Browse our comprehensive collection of verified answers for CSIT123 (S125) Computing and Cyber Security Fundamentals at moodle.uowplatform.edu.au.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Linux commands are actively used to analyse log files. Write a one-line Linux command that searches "208.115.111.72" from the sample.log file, sorts the found items and saves it to a file called 'sorted.list'. Your command must use "redirection", which we learnt in the workshop in week 4.     

View this question

Observe the following sequence of numbers:

1 0 1 2 5 12  29    70    169  . . .

Design a recursive algorithm that produces the above sequence. (Hint: Investigate three consecutive numbers.) Your algorithm must specify appropriate initial values.    

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

View this question

The memory cells with a width of 8 bits contain three decimal numbers: 158, 234, and 190.

1) Convert the three numbers to binary numbers.

2) Convert the three numbers to hexadecimal numbers.

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

View this question

Imagine you are a secret agent and intercepted the following encrypted message (ciphertext): 

ZNK GMKTZ ZNKXK OY ZNK UTK 

Unfortunately, you do not have the key for the encryption algorithm. Decrypt the above ciphertext knowing that the message was encrypted using a substitution cipher in which each plaintext character (an alphabet letter) is replaced by a ciphertext character using the key.

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

View this question

A big tech company provides a free app service that gives users a list of nearby takeaway restaurants. The users need to agree that the app can trace their locations.  The app has a feature that allows users to order food and pay for it before they physically reach the restaurants. When sent to the card company's server, the app encrypts the users' financial information, such as credit card number and CVC (Card Verification Code), so that a cybercriminal cannot grab the numbers. The app collects the users' email addresses to send them the receipts for the payment for the food. However, the users' email addresses are visible to the restaurants. Analyze this scenario in terms of what privacy problems can arise. 

View this question

A bank decided to utilise AI (artificial intelligence) to determine whether they would reject or accept the loan applications they receive. But some senior managers of the bank secretely agreed to design the AI algorithm in such a way that it will reject applications from some sepecific locaiton of the state automatically, cleverly concocting a reason why their applications are rejected (i.e. AI's natural language processing function will produce some statements looking reasonable but hiding the fact that the applicants' current location). Explain the problems with the bank's AI algorithm against Australia's AI ethics framework.

View this question

Want instant access to all verified answers on moodle.uowplatform.edu.au?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!