Computer Studies Paper 2, WASSCE (SC), 2019

Question 1


(a)  (i)   What is firewall?

(ii)   List two methods used in protecting the computer system.

(b)  Explain the following stages of the System Development Life Cycle:

(i)   feasibility study:

(ii)    design:

(iii)maintenance.

 

Observation

 

The expected answers were:

(a)  (i) A firewall

is a network security system that monitors and controls all the incoming and outgoing       network traffic based on advanced and a defined set of protocol/security rule.

OR

A firewall establishes a barrier between a trusted internal network and untrusted external network such as the internet.   

OR                                                                                         

A firewall is a software or hardware used to maintain the security of a private network and stop malicious traffic from getting to a user’s computer; it further prevents connection to unwanted sites and sending data without authorization.                                            

(ii) Methods used in protecting the computer system                  


        • Use antivirus
        • Update the operating system
        • Use firewall
        • Encryption of files/folders
        • Use of certificates
        • Physical protection
        • Authentication/password/biometric
        • Use of license software
        • Download files from trusted sites
        • Limit use of external storage devices
        • Disk cleaning
        • Defragmentation
        • Regular maintenance

         (b)  (i) Feasibility study stage

This is a stage in System Development Life Cycle(SDLC) that determines if  the set goals of the plan can be accomplished andinformation is gathered to identify what is needed to achieve the goal.                                       

OR                                                                     

This is a stage that involves drawing up the terms of reference, state the objectives and scope of the project, how long it should take and how the result should be achieved and presented.

OR

This is a stage a survey/preliminary study/analysis/evaluation is carried out to investigate whether the proposed project is plausibleand it involves schedule-driven, budget, personnel, legal implication and benefit. Afterwards, feasibility report is generated.                                                                                                                      

(ii) Design stage

This is the most critical phase in the development of a system. At this stage, the 
logical design is carried out and converted into physical system design. The programming language, the hardware and software platform in which the new system will run are also decided. Data structure, control process, equipment source, documentation, workload and limitation of the system, interface, training, procedures of using the system, taking backups and staffing requirement are decided at this stage.

OR

At this stage, desired features and operations are described in detail, this includes screen layout, business rules, process diagrams, pseudocode/ flowchart/algorithm and other documentation.

OR

This stage specifies how the system will accomplish the objectives set ahead. It consists of design activities which produce systems specifications satisfying the functional requirements developed in the system analysis stage.                                                  

(iii) Maintenance stage

This is the stage in which errors in the system are eliminated. The new system must meet the scope of any future enhancement, functionality and any other feature to cope with latest needs.

OR

At this stage, the system is assessed/evaluated to ensure it does not become obsolete and changes are made to initial system.

OR

This stage involves monitoring, evaluating users feedback and modifying of system to make desirable or necessary improvements.     
                                                                

The question tested candidates’ knowledge on computer firewall and system development life cycle.

The chief examiner reported that a good number of the candidates could not explain firewall. It was also reported that reasonable number of the candidates demonstrated good knowledge on system development life cycle.