April 2000 QUESTION 4 Total Marks: 15 Marks |
Click here to access other
questions
Click to access |
(a)Approaches to protecting PC software from copying may be software-based (for example,checksums to prevent modification),hardware-based (for example, implementing a program as a chip),or a mixture of the two (for example,a key or dongle ).Identify a problem with each method.[3 marks ] (b)Why might a software developer not protect their software from copying at all? [2 marks ] (c)Wire,wireless and fibre-optics are
three kinds of communication media. (d)Identify the two kinds of encryption that can be used in a network,and explain the differences between them.[4 marks ] |