IGCSE Computer Science Paper-1: Specimen Questions with Answers 55 - 57 of 164

Question number: 55

Edit
Short Answer Question▾

Write in Short

What do you mean by Computer Impersonation?

Explanation

Image of The Computer Impersonation

Image of the Computer Impersonation

Computer Impersonation is defined as the one which enables a server to act on behalf of a client to access its own objects. It is the ability of a thread to execute in a security context. For example when anonymous access is enabled on a Web site hosted on Internet Information Services (IIS).

Impersonation is effective in distributed computing environment when the server pass client requests to other server processes.

Question number: 56

Edit
Short Answer Question▾

Write in Short

Give an integer sequence to represent the Fibonacci numbers.

Explanation

0,1, 1,2, 3,5, 8,13,21,34,55,89,

Fibonacci number is generally denoted by . Each number is the sum of the two preceding ones, starting from 0 and 1.

Question number: 57

Edit
Short Answer Question▾

Write in Short

State the following terms Cookies, Spam, Spyware, Web browsers, Phishing.

Explanation

Cookies are defined as the temporarily stored files that are stored on a user’s computer. These cookies can hold data related to a particular client and website and can be accessed either by the web server or the client computer.

Spam is defined as the unsolicited junks being sent by botnets, networks of virus-infected computers, complicating the process of tracking down the spammers.

A spyware is defined as the unwanted software that can steal internet usage data and sensitive information or a malicious software designed to gain access to or damage ones computer without his/her knowledge.

A web browser is a software program that allows a user to locate, access, and display web pages. For eg Google Chrome, Mozilla Firefox.

Phishing is defined as the unsolicited effort of stealing ones data through email or through electronic communication such as that of telephonic.

Developed by: