Sei sulla pagina 1di 11

NATIONAL HND EXAMINATION PAPER STRUCTURE FOR COMPUTER

ENGINEERING: INFORMATION AND COMMUNICATION TECHNOLOGY

Paper: CASE STUDY


Specialty: INFORMATION AND COMMUNICATION TECHNOLOGY
Nature of the paper: written
Parts: three (03) sections
Duration of the paper: 6hrs
Coefficient: 5

I. PRESENTATION OF PAPERS
a) Nature of the paper : written
b) Structure of paper

The case study should be divided in three (03) sections, as followed:

i) SECTION I: Programming : 40%

This section should be divided in two separated parts to test the ability of the candidate in
programming, and stress on the ICT aspect, especially as far as web design is concerned as
follows:

(1) C language [This section should not go beyond the following topics]
(a) Programming principle
(b) C variable and conditions
(c) Expression and operators
(d) Arrays
(e) Functions
(f) Structures
(g) Files
NB: GNU GCC Compiler found in codeblock or Pelle C
(2) Web design (Static web page)
(a) HTML5
(b) CSS3
NB: The candidate will assume editing with NotePad++ editor
NB: The candidate should respect indentation when writing any sript.
ii) SECTION II: Networking : 45%
This section is made up of structural independent questions
(1) Fundamentals
(2) Switching
(3) Routing
(4) IPV4 subneting
(5) Basic security
(6) Troubleshooting
iii) SECTION III: INTERFACING: 15%
This section is a set of Combined Computer Architecture, Digital Electronics and
Analog Electronics, firmware programming, and a bit of RTOS.
(1) Microprocessor interfacing technique
[It is made up of structural independent questions on the following topics]
(a) Interfaces (Relays, Transistors, LED, SSR, push button…)
(b) Sensor- A/D: LDR Light Depending Resistors, LM35 Temperature sensor,
Humidity sensor, Potentiometer, PWM, OPAMP, FLIP FLOP….
(c) Protocols: RS232, SPI, I2C…
(2) Using Microcomputer/Microcontroller Unit as interface for Personal
Computer
[Use of the Arduino board as Recommended for Computer Architecture II ]
(a) Use Arduino board as A/D and D/A converter to send/receive data to
exchange with a host PC.
c) Objectives of the paper:

The case study is meant to access theoretically the ability of an HND candidate
to tackle real life problem, and propose solutions. The candidate should be directed
with straightforward questions, as mentioned above. Because ICT is actually a cross
platform where Software, Hardware, Telecoms, Networks and Electrical engineering
meet, the candidate must have knowledges in all those sections.

The case study will consist in creating two (02) applications that will be hosted
in a server, one in C, and another one is a web page. The candidate will also take care
of the networking, by setting and managing the network. At last he will write a
program to interface some hardware through the server.

d) Duration of paper : 06 (six)Hours


e) Total number of points for the paper: 100(One hundred)
i) Programming : 40 Marks
ii) Networking : 45 Marks
iii) Computer Architecture: 15 Marks
f) Coefficient of the paper: 05(five)
g) Name of the paper: CASE STUDY FOR ICT
II. ASSESSMENT CRITERIA
a) Outline the key elements of assessment
i) SECTION I Programming : 40 Marks
(1) C LANGUAGE (20Marks)
(a) Structural independent questions (5marks)
(b) Small problem (15marks)
(2) WEB DESIGN (20Marks)
(a) HTML5 (7marks)
(b) CSS3 (13marks)
ii) SECTION II Networking : 45 Marks
This section is made up of structural independent questions
iii) SECTION III INTERFACING: 15 Marks
(1) INTERFACES (5Mrks)
(2) ARDUINO PROGRAMMING (10Marks)
Paper: CASE STUDY Sample 2
Specialties: ICT
Coef: 5
Duration: 6hrs

SECTION I : PROGRAMMING
1. C LANGUAGE (20Marks)
1.1. Define/describe the following (5marks)
1. Arrays (1mrk)
2. printf("%s", myString); (2Mrks)
3. Write an instruction to open a file: “test.html” in appending mode (2Mrks)

1.2. Small problem (15marks)

Write a c script procedure to display the content of a file named “test.html”.

2. WEB DESIGN (20Marks)

Figure 2
2.1. HTML5 (7marks)

Using HTML5 structural tags, propose an html script sketch well indented to produce the
design of figure 2

2.2. CSS3 (13marks)

Using the figure 2, propose a CCS script


1. To style the aside containing (IP, TCP, TCP/IP, W3SCHOOLS) as it looks on figure 2(9Mrks)
2. Explain each line of the following script :(4Mrks)
SECTION II: Networking: 45Marks
1. Define the following terms with respect to network security. Cracker, Spammer, Phisher
(3mrks)
2. What is a router? (1mrk)
3. What do you understand by routing? (2mrks)
4. List four routing protocols. (2mrks)
5. . What is the difference between a public and a private IP address? (1mrk)
6. What do you understand by a default gateway? (1mrk)
7. What is a routing table? (1mrk)
8. Explain how a routing table is formed from a newly installed router. (4mrks)
9. The principle where by many computers can “hide” behind a single IP address and
communicate with other networks is govern by a protocol, What is the name of this
Protocol? (1mrk)
10. Give the full meaning of CSMA/CD and explain its mode of operation. (6mrks)
11. What layer(s) does the application layer of the TCP model correspond to in the OSI
model? (2mrks)
12. Outline the various layers of the TCP model and their various protocols. (10mrks)
13. What is the full meaning of DNS and explain what happens from when you type in the
name of a website until when the webpages appears on the screen. (4mrks)
14. How is data referred to at the various layers of the OSI model? (7mrks)

SECTION III: INTERFACING: 15Marks


1. INTERFACES (5Mrks)
1.1. Define: I²C, SPI. (2Mrks)
1.2. Design a circuit diagram of an ASTABLE with NE555.
(3Mrks)

2. ARDUINO PROGRAMMING (10Marks)

Write a program, using an Arduino board to display the Analog value sensed from a
potentiometer and display it every 2Seconds on the PC.
Paper: CASE STUDY Marking guide Sample 2
Specialties: ICT
Coef: 5
Duration: 6hrs

SECTION I : PROGRAMMING
1. C LANGUAGE (20Marks)
1.1. Define the following (5marks)
1. Arrays in C act to store related data under a single variable name with an index
2. printf("%s", myString);: this instruction will print on the screen, the content of
myString which should be an array of characters.
3. Instruction to open the file is:
FILE* myFile = NULL;
myFile = fopen("test.html", "a+");

1.2. Small problem (15marks)

//fonction to read a file


void readFile (){

FILE* myFile = NULL;


char myString[SIZE_Max] = "";
myFile = fopen("test.html", "r");
if (myFile != NULL)
{
printf(" READ File is opened\n\n");
while (fgets(myString, SIZE_Max, myFile) != NULL) // Read myFile until the end (NULL)
{
printf("%s", myString); // display the line read
}
fclose(myFile);
}
getch();

//fonction to edit a file


3. WEB DESIGN (20Marks)
3.1. HTML5 (7marks)

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<link rel="stylesheet" href="style.css" />
<title>COMPUTER</title>
</head>

<body>

<header>
<h1>ICT Design</h1>
</header>

<nav>
HTML<br/>
CSS<br/>
JAVASCRIPT<br/>
XAJAX<br/>
JQUERY<br/>
</nav>

<section>
<h1>HTML</h1>
<p>
HyperText Markup Language (HTML) is …
</p>
<h1>CSS</h1>
<p>
CSS (Cascading Style Sheets, also called style sheets): the role …
</p>
<h1>PROTOCOL</h1>
<p>
In telecommunications, a communication <span class="important">protocol</span> …
</p>
</section>
<aside>
IP<br/>
TCP<br/>
TCP/IP<br/>
W3SCHOOLS<br/>

</aside>

<footer>
Copyright © UBUEA.CM
</footer>

</body>
</html>
3.2. CSS3 (13marks)
1. To style the aside containing (IP, TCP, TCP/IP, W3SCHOOLS) as it looks on figure 2(9Mrks)

2. Explain each line of the following script :(5Mrks)

18 The selector here is section


19 The wdth of the section 700 pixels
20 Displays the section as an inline-level block container
21 10px shoud separate the border edge and the content
22 the section should be align from the top.
23 closing the section script selector.

SECTION II: Networking : 45Marks


1. Define the following terms with respect to network security. Cracker, Spammer, Phisher
(3mrks)

Cracker :Someone with malicious intentions who tries to gain unauthorized access to
network resources

Spammer :An individual who sends large quantities of unsolicited email messages.

Phisher :Someone who uses email or other means to disguise as a trusted party so that
victims are enticed into providing sensible information, such as credit card number or
password

2. What is a router? (1mrk)

A router is a networking device that segments broadcast domains. it also helps to interconnect
networks

3. What do you understand by routing? (2mrks)


Routing is the processes by which the router takes when it wants to make a decision on
the best way for it to get a packet to its destination successfully.

4. List four routing protocols. (2mrks)

RIPv1,RIPv2,EIGRP,OSPF,BGP

5. . What is the difference between a public and a private IP address? (1mrk)


A private IP address is used only within a LAN while a public IP address externs the land to other
networks like the internet
6. What do you understand by a default gateway? (1mrk)

A default gateway is the router’s IP address, which is the pathway to any and all remote
networks, which helps forward the packet to its destination network

7. What is a routing table? (1mrk)

A routing table is a chart created by the router to help it forward packets faster to their
correct destinations

8. Explain how a routing table is formed from a newly installed router. (4mrks)

When a newly configured router is connected to a network, the router send a broadcast
requesting for the information of all its neighbors which is then used to form the routing
table

9. The principle where by many computers can “hide” behind a single IP address and
communicate with other networks is govern by a protocol, What is the name of this
Protocol? (1mrk)
NAT
10. Give the full meaning of CSMA/CD and explain its mode of operation. (6mrks)

Carrier sense multiple access with collision detection

 The device with a frame to send listens until the Ethernet is not busy.
 When the Ethernet is not busy, the sender begins sending the frames
 The sender listens to make sure that no collision occurred.
 If a collision occurs, the devices that had been sending a frame each send a
jamming signal to ensure that all stations recognize the collision.
 After jamming is complete, each sender randomizes a timer and waits that long
before trying to resend the collided frame.
 When each randomize timer expires, the process starts again from begining
11. What layer(s) does the application layer of the TCP model correspond to in the OSI
model? (2mrks)
Application layer and presentation layer
12. Outline the various layers of the TCP model and their various protocols. (10mrks)
13. What is the full meaning of DNS and explain what happens from when you type in the
name of a website until when the webpages appears on the screen. (4mrks)
DNS=domain name saver, when the name of a site is entered into the address bar of the web
browser, the dns then converts that name into its corresponding IP address of which a request is
now sent to the web server requesting for that particular webpage, and when the page is found,
it can now be displayed on your screen
14. How is data referred to at the various layers of the OSI model? (7mrks)

SECTION III: INTERFACING: 15Marks


1. INTERFACES (5Mrks)
1.1. Define: I²C, SPI. (2Mrks)
SPI: Serial Peripheral Interface bus is a synchronous serial communication interface
specification used for short distance communication
I²C (Inter-Integrated Circuit), is a multi-master, multi-slave, single-ended, serial
computer bus, the connection is established via two conductors. One is used for data
transfer, while the other is used for synchronization (clock signal).
1.2. Design a circuit diagram of an ASTABLE with NE555.
(3Mrks)
2. ARDUINO PROGRAMMING (10Marks)

Potrebbero piacerti anche