logo

Crowdly

CSIT123 (S125) Computing and Cyber Security Fundamentals

Шукаєте відповіді та рішення тестів для CSIT123 (S125) Computing and Cyber Security Fundamentals ? Перегляньте нашу велику колекцію перевірених відповідей для CSIT123 (S125) Computing and Cyber Security Fundamentals в moodle.uowplatform.edu.au.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

Linux commands are actively used to analyse log files. Write a one-line Linux command that searches "208.115.111.72" from the sample.log file, sorts the found items and saves it to a file called 'sorted.list'. Your command must use "redirection", which we learnt in the workshop in week 4.     

Переглянути це питання

Observe the following sequence of numbers:

1 0 1 2 5 12  29    70    169  . . .

Design a recursive algorithm that produces the above sequence. (Hint: Investigate three consecutive numbers.) Your algorithm must specify appropriate initial values.    

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

Переглянути це питання

The memory cells with a width of 8 bits contain three decimal numbers: 158, 234, and 190.

1) Convert the three numbers to binary numbers.

2) Convert the three numbers to hexadecimal numbers.

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

Переглянути це питання

Imagine you are a secret agent and intercepted the following encrypted message (ciphertext): 

ZNK GMKTZ ZNKXK OY ZNK UTK 

Unfortunately, you do not have the key for the encryption algorithm. Decrypt the above ciphertext knowing that the message was encrypted using a substitution cipher in which each plaintext character (an alphabet letter) is replaced by a ciphertext character using the key.

Write your answers on white paper, showing all your workings, scan or take pictures of them, and upload the resulting file. (If you have more than one page, combine them into one file.) 

Переглянути це питання

A big tech company provides a free app service that gives users a list of nearby takeaway restaurants. The users need to agree that the app can trace their locations.  The app has a feature that allows users to order food and pay for it before they physically reach the restaurants. When sent to the card company's server, the app encrypts the users' financial information, such as credit card number and CVC (Card Verification Code), so that a cybercriminal cannot grab the numbers. The app collects the users' email addresses to send them the receipts for the payment for the food. However, the users' email addresses are visible to the restaurants. Analyze this scenario in terms of what privacy problems can arise. 

Переглянути це питання

A bank decided to utilise AI (artificial intelligence) to determine whether they would reject or accept the loan applications they receive. But some senior managers of the bank secretely agreed to design the AI algorithm in such a way that it will reject applications from some sepecific locaiton of the state automatically, cleverly concocting a reason why their applications are rejected (i.e. AI's natural language processing function will produce some statements looking reasonable but hiding the fact that the applicants' current location). Explain the problems with the bank's AI algorithm against Australia's AI ethics framework.

Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodle.uowplatform.edu.au?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!