April 26, 2022

Uncategorized

BAC4202  ARTIFICIAL INTELLIGENCE FOR GAMES.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC4202 ARTIFICIAL INTELLIGENCE FOR GAMES FULL TIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (a) Describe the meaning of the term ‘Artificial Intelligence (AI) for games’ in the context of artificial intelligence for games (2 Marks) (b) Artificial intelligence (AI) for games model is divided into three sections. Describe each of these sections (2 Marks) (c) Describe the meaning of the following terms as used in artificial intelligence for games. Give one example in each case (i) Intelligent agents (2 Marks) (ii) Utility (2 Marks) (d) Describe three major assumptions in games (3 Marks) (e) Briefly explain three differences between searching and games (3 Marks) (f) Describe any four types of games. Give one example in each case (4 Marks) (g) There are three key elements for implement AI for Games. Describe each of these elements (3 Marks) (h) Briefly explain five roles of artificial intelligence Techniques in Games (5 Marks) (i) State and explain two AI for games approaches (4 Marks) QUESTION TWO a) Briefly explain the following terms as used in artificial intelligence for games. Give one example for each case (i) Zero sum game (2 Marks) (ii) Heuristics (2 Marks) (iii) Hacks (2 Marks) (b) Consider the following Payoff matrix for prisoner’s dilemma (i) Describe four possible outcomes for actions taken by both agents and their respective rewards. (4 Marks). (ii) Explain the meaning of the term nash equilibrium. Identify strategies that are in nash equilibrium in prisoners’ dilemma. Justify your answer (4 Marks). (iii) Identify the dominant strategy in prisoners’ dilemma. Justify your answer (2 Marks). c) Given the following 8-puzzle, define the problem as a search problem in terms of states, operators, a goal test and a path cost. (4 Marks) QUESTION THREE (a) A farmer and his wolf, goat, and cabbage come to the north side of a river that they wish to cross. There is a boat, but it has only room for two, and the farmer is the only one that can cross alone If the goat and the cabbage are left alone together, the goat will eat the cabbage. Similarly, if the wolf and the goat are together without the farmer, the goat will be eaten. i. Devise a series of crossings of the river so that all concerned make it across safely (4 Marks) ii. Define the search problem (3 Marks) iii. Use a graph to represent the search problem (3 Marks) (b) Briefly explain reinforcement learning. Use a diagram to illustrate your answer (2 Marks) (c) Describe one application of how reinforcement learning can be used in game theory (2 Marks) (d) Consider a building with five rooms connected by certain doors as shown in the figure below Where A to E is rooms inside the building while F represent outside the building. There are two doors leading to the building from F, that is through room B and room E. (i) Use a state diagram to represent the scenario. (2 Marks). (ii). Suppose you put an agent in any room, and you want the agent to go outside the building the doors that lead immediately to the goal have instant reward of 100 and other doors that do not have direct connection to the target room have zero reward. Draw state diagram to represent the problem indicating rewards for each movement made by the agent. Identify any absorbing goal state and justify your answer (4 Marks) QUESTION FOUR (a) Briefly explain four types of agents’ environments (4 Marks) (b) State and explain any four characteristics of an intelligent agent (4 Marks) (c) Briefly explain three ways in which intelligent agent is different from other software? (3 Marks) (d) Many matatus in Nairobi have drivers and conductors (manambas). The two work together. Lets assume that both are intelligent agents. (the setting is before 2003, before the new psv regulations were affected) Fill-in the table below for the conductor (manamba) (4 Marks) e) Given the following search tree, apply the alpha-beta pruning algorithm to it and show the search tree that would be built by this algorithm. How many nodes did you not have to visit With alpha- beta pruning when compared to the full MIN-MAX search ? Show all intermediate values at each node as they get updated including where the alpha and beta cuts are applied. Give the number of nodes that (5 Marks). QUESTION FIVE (a) Briefly describe the following terms as used in artificial intelligence for games. Give an example for each case (i) Path finding (2 Marks) (ii) Directed costed graph (2 Marks) (b) Consider the following graph Find the in-Degree of v1, out-degree of v3 and degree of v2 in the above a graph (3 Marks) c) The following figure shows a MIN-MAX game tree. Cross out the branches that are pruned by alpha-beta pruning and determine the number of nodes that you did not have to visit with alphabeta pruning when compared to the full MIN-MAX search. Show all intermediate values at each node as they get updated. (4 Marks) (d) Show how the following search algorithms can be implemented using appropriate pseudo code (6 Marks) i) Breath-First-Search ii) Depth-First-Search (e) Consider the search tree below (Assuming F is the Goal node, show at each step what nodes are in the queue for Depth-FirstSearch (3 Marks) 5 8 6

BAC4202  ARTIFICIAL INTELLIGENCE FOR GAMES. Read Post »

Uncategorized

BAC3306  NETWORK SECURITY.

UNIVERSITY EXAMINATIONS: 2017/2018 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3306 NETWORK SECURITY FULLTIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE a) A security administrator is looking to set up a secure network. To this end, he wants to deploy both an IDS and a Firewall. He is considering the following deployment scheme: Deploy the IDS behind the edge of the Firewall Deploy the IDS in-front of the edge Firewall i. Name Five pros and cons of both deployment schemes [5 Marks] ii. It is said that IDS majorly detect intrusions. How then is it useful in securing networks if it cannot prevent intrusion? Discuss. [4 Marks] iii. For each of the SIX options shown in the table below, give one example of attack that can be detected with the considered type of IDS. For each attack, briefly explain how and/or why. [6 Marks] b) Explain OSI architecture for security [2 Marks] c) What are the different types of security services [2 Marks] d) Briefly define categories of security mechanisms [2 Marks] e) Difference between block cipher and stream cipher [2 Marks] f) Explain any substitution techniques for cryptography [2 Marks] g) Describe Differential Cryptanalysis and Linear Cryptanalysis for DES [5 Marks] QUESTION TWO a) The Data Link Layer in the OSI model is concerned with the logical elements of transmissions between two directly connected stations. It deals with issues of local topology where many stations may share a common local media. This is the layer where data packets are prepared for transmission by the physical layer. The Data Link Layer has been a long-neglected area of study for information security, lost between the physical issues of layer one and the dominating realm of the firewall in layers three and four. i. Discuss the common vulnerabilities posed on a network at this level [5 Marks] ii. Describe different types of firewall [5 Marks] b) Define e-mail security [2 Marks] c) Briefly explain different protocols for e-mail security. [2 Marks] d) Describe the use SMIME [2 Marks] e) What are web security threats [2 Marks] f) Give countermeasures of web security threats [2 Marks] QUESTION THREE Authentication can be accomplished in many ways. The importance of selecting an environment appropriate Authentication Method is perhaps the most crucial decision in designing secure network system. a) Define Authentication with relation to network security systems [2 Mark] b) Describe the processes involved in the following authentication techniques: i. Digital Signatures [2 Marks] ii. Secure Sockets Layer [2 Marks] iii. Secure Shell [SSH] [2 Marks] iv. IP-SEC [2 Marks] v. Kerberos [2 Marks] c) User authentication can be handled using one or more different authentication methods. Some authentication methods such as plain password authentication is easily implemented but are in general weak and primitive. i. State two types of password authentication [2 Marks] ii. Outline TWO weaknesses exhibited by passwords [2 Marks] d) Briefly outline the problems and challenges faced in implementing network security by intrusion detection [4 Marks] QUESTION FOUR All information systems create risks to an organization, and whether the level of risk introduced is acceptable is ultimately a business decision. What constitutes an acceptable level of risk depends on the individual organization and its ability to tolerate risk. An organization that is risk averse will ultimately accept lower levels of risk and require more security controls in deployed systems. a) List FIVE risks associated to network system security [5 Marks] b) Elaborate how you can mitigate the above (a) named risks [5 Marks] c) Explain FIVE key considerations when engaging in network security strategy [5 Marks] d) Briefly discuss the demerits of wireless networks with regards to security. [5 Marks] QUESTION FIVE a) The objective of an ideal IDS is to give a notification of a successful attack in progress; with 100% accuracy, promptly, with complete diagnosis and recommendations. Unfortunately, this does NOT exist. Discuss using relevant examples. [5 Marks] b) Outline FIVE pros and Cons of an IDS as a network security [5 Marks] c) Describe the working of Public Keys with relation to authentication [5 Marks] d) What is a Certificate in relation to security [1 Mark] e) Describe the contents of a Certificate [4 Marks]

BAC3306  NETWORK SECURITY. Read Post »

Uncategorized

BAC3217  FORENSIC PSYCHOLOGY.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3217 FORENSIC PSYCHOLOGY. FULL TIME/PART TIME DATE: APRIL, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (30 MARKS) a) Define psychology. (2Marks) b) What is the importance of forensic psychology in justice system. (6Marks) c) What are the FIVE basic elements of crime? (10Marks) d) Explain the three types of criminal intents. (6Marks) e) Describe the key function of intent. (2Marks) f) Give the formal definition of crime. (2Marks) g) What is the most striking thing you have learnt in this unit? (2Marks) QUESTION TWO (20 MARKS) a) Describe the following categories of crime and give an example of each. (9Marks) i) Felony ii) Misdemeanour iii) Petty offences. b) Explain the factors that a prosecutor may consider in deciding whether to change an offence as felony or misdemeanour. (4Marks) c) How can words be legally treated as the actus reus? Give a relevant example. (7Marks) QUESTION THREE (20 MARKS) a) “Not all morally wrongful conduct is classified as criminally or even civil wrong”. Discuss this statement and give a relevant example. (10Marks) b) How can one become a competent eye witness? (6Marks) c) Is it ever ethical to lie? Justify your answer. (4Marks) QUESTION FOUR (20 MARKS) a) Do we have innocent people in jail? Critically justify your answer. (10Marks) b) Thought cannot be criminalized. Discuss this statement and give a case to justify your answer. (8Marks) c) Define deception. (2Marks) QUESTION FIVE (20 MARKS) a) Explain the concept psychopathic personality. (3Marks) b) Describe the factors that cause domestic violence in Kenya. (10Marks) c) Does child abuse cause crime? Justify your answer. (7Marks)

BAC3217  FORENSIC PSYCHOLOGY. Read Post »

Uncategorized

BAC3216  INFORMATION SYSTEMS SECURITY POLICIES.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3216 INFORMATION SYSTEMS SECURITY POLICIES FULL TIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Explain the importance of information security policy (6 Marks) b) Discuss the stages of an information security policy life cycle (8 Marks) c) Describe the process of writing an effective policy (8 Marks) d) Analyze how information security policy can be used to deal with threats and risks (8 Marks) QUESTION TWO a) Explain the implications of privacy policies in dealing with cybercrime (6 Marks) b) Explain how intellectual property rights are addressed in information security policies (6 Marks) c) Describe the various tools that can be used to enforce network security and email policies (8 Marks) QUESTION THREE a) Discuss the applicability of encryption and key management policies in organizations (8 Marks) b) Discuss how disaster recovery and business continuity are facilitated in organizations (12 Marks) QUESTION FOUR a) What advice would you give an organization concerning the following? i. Audit and Compliance of security policies (4Marks) ii. Acceptable Use Policies and Training /Awareness (4Marks) iii. Enforcement and Effectiveness of security policies (4Marks) b) Explain Cybercrime legislation as an integral part of information security (8 Marks) QUESTION FIVE a) Examine advantages and disadvantages of internet censorship (8 Marks) b) Discuss the role of International Cooperation in Cyber Crime (12 Marks)

BAC3216  INFORMATION SYSTEMS SECURITY POLICIES. Read Post »

Uncategorized

BAC3212  ANIMATION AND VISUALIZATION-PRODUCTION PLANNING.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3212 ANIMATION AND VISUALIZATION-PRODUCTION PLANNING FULL TIME/PART TIME DATE: APRIL, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) What is computer animation? (2 Marks) b) What is computer visualization? (2 Marks) c) Distinguish between 2D and 3D animation (8 Marks) d) Identify the EIGHT stages in production a 3D animation production (8 Marks) e) How can the animation and visualization be used in learning (4 Marks) f) Provide a selection criteria you would used to choose from the list of available animation softwares in the market. (6 Marks) QUESTION TWO a) Outline the role of an audio asset director. (2 Marks) b) Why is collaboration beneficial when producing an animation? (4 Marks) c) An animated television commercial is to be produced. Describe what needs to be considered when scheduling tasks for this project. (6 Marks) d) Explain why file management is important for digital animation projects. (4 Marks) e) Explain why different types of platforms are necessary for the delivery of digital animations. (4 Marks) QUESTION THREE You have been given a production brief to create a humorous animation to promote safety in the workplace. (a) Outline what is likely to be found in the production brief. (4 Marks) (b) Distinguish between design specifications and technical specifications. (8 Marks) (c) Produce a series of FOUR scene layouts for this project. Justify your choice of creative principles. (8 Marks) QUESTION FOUR a) What is scope of flash in Animation industry? (2 Marks) b) An animation production project has the following activities Activity Precedence Duration (wks) You are required i) Draw a network analysis diagram (8 Marks) ii) Using the Program evaluation and Review technique and show clearly the critical path (10 Marks) QUESTION FIVE Explain the following phrases in animation production (20 Marks) a) Squash and Stretch b) Timing and Motion c) Anticipation d) Staging e) Follow Through and Overlapping Action f) Straight Ahead Action and Pose-to-Pose Action g) Slow In and Out h) Exaggeration i) Secondary Action j) Appeal

BAC3212  ANIMATION AND VISUALIZATION-PRODUCTION PLANNING. Read Post »

Uncategorized

BAC3211  SIMULATION ANIMATION VISUAL ASSEMBLY.

UNIVERSITY EXAMINATIONS: 2017/2018 ORDINARY EXAMINATION FOR THE BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3211 SIMULATION ANIMATION VISUAL ASSEMBLY FULLTIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question ONE and any other TWO QUESTION ONE a) To animate any character, we must manually be creating the movements along a time series so that when played the character will perform the actions that the animator has defined for the character. Using a relevant example, describe THREE types of characters you can animate. [4 Marks] b) Digitizing the human movements can be a complex problem when trying to manually simulate the effects of specific moves or environments. Using relevant example, briefly discuss how this problem can be solved. [4 Marks] c) Describe the following terminologies as used in animation: [6 Marks] i. Motion editing ii. Motion planning iii. Particle motion d) Explain the FOUR techniques that are used in animation. [4 Marks] e) List and explain FOUR approaches you can use for the generation of facial animation data. [12 Marks] QUESTION TWO a) Discuss the safety, ethical and professional considerations when developing a simulation activity [8 Marks] b) State and briefly explain the TWO types of joints and their DoF [2 Marks] c) Outline FOUR limitations of Simple Skinning [4 Marks] d) Briefly describe the role of the following in animation. i) Skin creation [2 Marks] ii) Binding [2 Marks] iii) Optimizing smooth [2 Marks] QUESTION THREE a) Differentiate the following: i. Forward Kinematics [1 Mark] ii. Inverse Kinematics [1 Mark] b) Using relevant diagrams, state and briefly explain the different types of Keyframing uses. [12 Marks] c) State the keyframing process in animation [6 Marks] QUESTION FOUR a) Briefly explain the Game Theorem according to E. Zermelo. [4 Marks] b) State TWO assumptions in the Game theory [2 Marks] c) Give FOUR benefits of the Game theory [4 Marks] d) Differentiate the following types of Games [10 Marks] i. Sequential vs. Simultaneous moves ii. Single Play vs. Iterated iii. Zero vs. non-zero sum iv. Perfect vs. Imperfect information v. Cooperative vs. conflict QUESTION FIVE a) State the three Computer facial animation models [3 Marks] b) Explain FOUR major types of Mocaps [8 Marks] c) Briefly discuss FOUR advantages Motion capture offers over traditional computer animation of a 3D model [9 Marks]

BAC3211  SIMULATION ANIMATION VISUAL ASSEMBLY. Read Post »

Uncategorized

BAC3210  ACTIONSCRIPT PROGRAMMING.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3210 ACTIONSCRIPT PROGRAMMING FULL TIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Name any FIVE movie clip properties that can be controlled with ActionScript. (5 Marks) b) What is the basic logic behind a preloader ActionScript? (7 Marks) c) Where do you place the messages and animations in ActionScript? (3 Marks) d) What keyword is used to create a new instance of an ActionScript class? (3 Marks) e) How is a display object added to the display list in ActionScript? (2 Marks) f) Explain one way to generate a random color in ActionScript? (5 Marks) g) Write the basic syntax to use for loop in ActionScript 3.0. (5 Marks) QUESTION TWO a) Name THREE file types that you can load into a Flash project with the UILoader component (3 Marks) b) Explain an ActionScript class that can be used to store a list of objects (3 Marks) c) What method can be used to add a new element to the next available location in an Array instance? (2 Marks) d) Explain an event that is available for the List component that can respond when the user makes a selection from a List instance. (2 Marks) e) Explain the steps of developing an actionscript animation (4 Marks) f) Write an actionscript program of your choice and explain what it does (6 Marks) QUESTION THREE a) Write a script to change temperature from Fahrenheit to Celsius (6 Marks) b) Describe how you will use the package directive to create a simple package containing one class (4 Marks) c) Using examples explain how control structures are used in ActionScript program (10 Marks) QUESTION FOUR Using an example of geometric shapes describe by writing ActionScripts that demonstrates the following concepts i. Defining classes (4 Marks) ii. Extending classes (4 Marks) iii. Polymorphism and the override keyword (4 Marks) iv. Defining, extending, and implementing interfaces (4 Marks) QUESTION FIVE a) With your help, Philip has constructed the initial version of a Flash Web site for KENOMO Project. He now needs to add some pages with interactive elements, including a page that will allow potential clients to submit information about projects that they would like KENOMO to complete. Philip asks you for help in learning how to use ActionScript 3.0 to add these interactive elements. You show Philip how to write a function that processes information and returns a value or performs some action. If a function does not return a value, explain the term that must appear in the function definition to indicate that no value is returned? (4 Marks) b) Aaron is developing a Web site for the dinosaur exhibit at his local science museum, and he asks for your assistance in using ActionScript 3.0 to add interactive elements to the Web site. For example, he wants to allow users of the site to pause movie clips, and he wants to include links to Web sites with additional information about dinosaurs. You tell Aaron that he can use ActionScript to pause a movie clip when the user clicks a pause button. You mention that there are three elements involved when writing the necessary code. One of these elements is the pause button itself, which is the object used to trigger the desired action. Explain the technical term for this type of element? (4 Marks) c) You next tell Aaron that he must create the function that the Flash Player will execute when the user clicks the pause button. What is the term used for this type of function? (2 Marks) d) Once Aaron creates the function that will be executed when the user clicks the pause button, he needs to establish a connection between that function and the pause button. Explain the name of the method used to establish the connection? (4 Marks) e) You next show Aaron how he can use buttons to represent links to external Web sites. When the viewer clicks a button, a browser window will open, displaying an external Web site. In the functions that he writes for this purpose, Aaron needs to create an object with the value of the Web address of the site to which he wants to link. Explain the name of the class that he will use to define this object? (4 Marks) f) In the functions that Aaron writes for the purpose of displaying an external Web site, he needs to call a function that opens the Web site in the computer’s default browser. What is the name of this function? (2 Marks)

BAC3210  ACTIONSCRIPT PROGRAMMING. Read Post »

Uncategorized

BAC3209  MULTIMEDIA FRONT END DEVELOPMENT.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3209 MULTIMEDIA FRONT END DEVELOPMENT FULL TIME/PART TIME DATE: APRIL, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE a) Distinguish between front end and back end development (4 Marks) b) What is your understanding of the term plug-in technology (1 Mark) c) State FOUR major advantages of HTML5 over its preceding versions (4 Marks) d) Describe FIVE languages that can be used by web authors for multimedia content (5 Marks) e) Identify the FIVE factors that are critical to the development of multimedia content and explain their role (10 Marks) f) Why would it be necessary to use CODECS in multimedia? (4 Marks) g) Give two reasons why adobe flash player was driven to obsolescence (2 Marks) QUESTION TWO HTML5 has the following NEW features for input type i) Date ii) Datetime iii) Month iv) Time v) range vi) Color vii) Email viii) Tel ix) url x) search You are required: Demonstrate how you would use it coding and the expected results (20 Marks) QUESTION THREE a) Give a brief history of events that have shaped the web developments from the early sixties to date (10 Marks) b) Describe FIVE formats available for use in front end development i) Audio (5 Marks) ii) Video (5 Marks) QUESTION FOUR a) Define a headless browser and give THREE examples of such (4 Marks) b) State advantages of client server architecture in from end development (4 Marks) c) Use a suitable diagram to illustrate the web architecture (6 Marks) d) What do you imagine to be the role and responsibilities of a front end SEO expert (6 Marks) QUESTION FIVE a) State FOUR factors for consideration interactive multimedia design. (4 Marks) b) Compare and contrast the Chrome and internet explorer web browsers (4 Marks) c) As a front end developer what are the features that would consider in choosing between WAMP and XAMPPS (6 Marks) d) Write commands in a suitable version of SQL to undertake the following i) Create a database called Kenya and a table called nairobicounty (2 Marks) ii) Delete a table by the name nakurucounty form database Kenya (2 Marks) iii) List all citizens over the age of 65 for pension payments by idnumber, citizenname, age, grouped by county (2 Marks)

BAC3209  MULTIMEDIA FRONT END DEVELOPMENT. Read Post »

Uncategorized

BAC3207  VIRTUAL WORLD MODELING.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC3207 VIRTUAL WORLD MODELING FULL TIME/PARTTIME DATE: APRIL 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE (30 MARKS) a) Briefly describe Virtual Reality Modeling Language (VRML). (4 Marks) b) List the application areas that VRML can be used. (6 Marks) c) Using an illustration, describe any three objects that one can represent while using VRML? (6 Marks) d) Describe the sections of the following code snippet as used in VRML97: (5 Marks) Shape { appearance { } geometry { } } e) Develop in VRML97 a Cone that has a height of 4 and contains a radius of 4, it should be brown in color (5 Marks) f) What are the general factors influencing human performance efficiency in virtual environments? (4 Marks) QUESTION TWO (20 MARKS) a) Compare and contrast VRML and Java 3D for developing VR applications. (6 Marks) b) Using an illustration explain the following terms as used in Transfrom node(9 Marks) i. Translation ii. Rotation iii. Scale c) From a virtual environment designer’s viewpoint explain the five main 3D interaction issues at stake when virtual environment users interact with virtual objects in three dimensions. (5 Marks) QUESTION THREE (20 MARKS) a) Describe the various means available in VRML97 for specifying the geometries of 3 dimensional shapes. (6 Marks) b) How are events generated and handled in VRML97? (5 Marks) c) Differentiate between the DEF and USE as used in VRML97 (4 Marks) d) Describe the evolution of VRML (5 Marks) QUESTION FOUR (20 MARKS) a) Develop in VRML97 the 3D form of a simple lamp with a base, straight shaft and shade using 3 shape nodes. (7 Marks) b) Add to the VRML97 model the means to make the lamp shine. (4 Marks) c) Add a touch sensor to your VRML97 model and wire it to your lamp in such a way that when the viewer clicks on the lamp, it is illuminated, if off, and goes dark, if on. (9 Marks) QUESTION FIVE (20 MARKS) a) Describe any two means available in VRML97 for reusing VRML code. (4 Marks) b) Develop in VRML97 a simple TV set box without legs that plays an MPEG file “news24.mpg” on its faces in a continuous loop. (6 Marks) c) Add a proximity sensor to your model and wire it to your TV set in such a way that when the viewer is close to the TV set, it plays its MPEG in a loop, and stops the looping if the viewer is no longer close to the set. (6 Marks) d) Add to your TV set model the means to make it into a reusable node called “TV” with a position parameter that places it in the world. (4 Marks)

BAC3207  VIRTUAL WORLD MODELING. Read Post »

Uncategorized

BAC2508  SOCIOLOGY.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APPLIED COMPUTING BAC2508 SOCIOLOGY FULL TIME/PART TIME/DISTANCE LEARNING DATE: APRIL, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Define the term sociology. (2Marks) b) Explain the influence of the following agents of socialization. (15Marks) i) Family ii) Media iii) Society iv) Peers v) School c) Explain the concept social imagination. (3Marks) d) Describe the role of sociology in society. (8Marks) e) What is the key thing that you have learnt in this unit and has helped you in your behavior. (2Marks) QUESTION TWO (20 MARKS) a) Explain the functions of work. (10Marks) b) Describe the social challenges faced by the students in the university and suggest possible solutions. (10Marks) QUESTION THREE (20 MARKS) a) Explain the reasons for increase of divorce cases in our country. (10Marks) b) The media has reported many cases of homicide, one may want to know the reasons for that pattern of events. What could be the underlying issues in such cases? (8Marks) c) What do you understand by the term child abuse? (2Marks) QUESTION FOUR (20 MARKS) a) Draw your family shield and explain the significance of it in our life. (10Marks) b) Explain the principles for self- awareness. (10Marks) QUESTION FIVE (20 MARKS) a) Analyze the challenges of leadership in developing countries, relate to your country. (10Marks) b) What is the role of religion if our society. (8Marks) c) In your own words, what is democracy? (2Marks)

BAC2508  SOCIOLOGY. Read Post »

Uncategorized

BAC1102-BISF1102- BSD1104- BIT1106A-BBIT111- OPERATING SYSTEMS.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREES OF BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY/ SOFTWARE DEVELOPMENT/ BUSINESS IT/ INFO. SEC& FORENSICS/ APPLIED COMPUTING BAC 1102/ BISF 1102/ BSD 1104/ BIT 1106A/ BBIT 111: OPERATING SYSTEMS FULLTIME/ PART TIME/DISTANCE LEARNING ORDINARY EXAMINATIONS DATE: AUGUST, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Define the term ‘operating system’ (2 Marks) b) Give SIX types of operating systems (6 Marks) c) Give SIX functions of the operating system (6 Marks) d) Define a shell as used in operating system (3 Marks) e) State the functions of a file manager (3 Marks) f) Draw the structure of the MS-DOS operating system and briefly explain it. (5 Marks) g) In your opinion why is Linux operating system emerging as an Operating system to reckon over its rival Microsoft windows? Discuss. (5 Marks) QUESTION TWO [20 MARKS] a) Describe briefly the ways that can be used to terminate a process. (4 Marks) b) What is a control structure that the operating system uses to keep the information of the process context? Give the pieces of information that are likely to be in this structure. (4 Marks) c) i) What is a binary semaphore? (2 Marks) ii) Describe the signal and wait operation and how it is implemented in a semaphore. (4 Marks) d) i) Explain what a thread is? Give an example. (2 Marks) ii) What is the difference between a process and a thread? (4 Marks) QUESTION THREE [20 MARKS] a) Distinguish between the following pairs of terms: i) Starvation and deadlock (2 Marks) ii) Fault avoidance and error detection (2 Marks) iii) Device driver and device controller (2 Marks) iv) Paging and segmentation (2 Marks) b) i) Describe the operations of shortest job first (SJF) and shortest remaining time first (SRTF) scheduling algorithms. (4 Marks) ii) Consider the following schedule. Complete the schedule for each of the two algorithms in b(i) above (8 Marks) QUESTION FOUR [20 MARKS] a) With the aid of a diagram, explain the relationship between operating system, computer hardware, utility programs and application programs (6 Marks) b) Briefly explain FOUR main performance criteria used to select a scheduling algorithm (4 Marks) c) i) Briefly describe any TWO file management metaphors (2 Marks) ii) Identify and briefly describe any filename extensions (4 Marks) d) Describe the FOUR conditions for deadlock in Operating System. (4 Marks) QUESTION FIVE [20 MARKS] a) i) Explain briefly the objective of computer security. (2 Marks) ii) State three procedure and processes that specify security policies. (3 Marks) iii) What does data integrity entail? Discuss (3 Marks) b) Explain briefly the following terms with respect to inter-process synchronization i) Critical section ii) Mutual exclusion (4 Marks) c) Describe the THREE forms of explicit inter-process synchronization (6 Marks) d) Describe TWO ways in which a program can invoke services of the operating system. (2 Marks)

BAC1102-BISF1102- BSD1104- BIT1106A-BBIT111- OPERATING SYSTEMS. Read Post »

Uncategorized

BAC 3117  HUMAN ASPECTS OF FORENSICS.

UNIVERSITY EXAMINATIONS: 2017/2018 EXAMINATION FOR THE DEGREE OF BACHELOR OF SCIENCE IN APLIED COMPUTING BAC 3117 HUMAN ASPECTS OF FORENSICS FULLTIME ORDINARY EXAMINATIONS DATE: AUGUST, 2018 TIME: 2 HOURS INSTRUCTIONS: Answer Question One & ANY OTHER TWO questions. QUESTION ONE [30 MARKS] a) Describe any TWO common situations where computer forensics apply. (2 Marks) b) Using an example, discuss how the “third-party authorization” approach can be used by a social engineer. (4 Marks) c) Discuss the following human related terms: (6 Marks) i) Persuasion ii) Perception iii) Social engineering d) Describe the following exploits and use a case scenario to illustrate how they can be used to gain access to company information assets: i)Diffusion of responsibility (3 Marks) ii) Moral duty. (3 Marks) e) Describe the common defenses against digital attacks. (4 Marks) f) Discuss any FOUR explanations of criminal behavior. (8 Marks) QUESTION TWO [20 MARKS] a) Explain THREE ways in which humans directly initiate and execute cybercrime (6 Marks) b) Discuss the following access controls: i) Discretionary ii) Mandatory (4 Marks) c) Discuss any FIVE forensics challenges (10 Marks) QUESTION THREE [20 MARKS] a) Explain the following information asset valuation terms: i) Data classification (2 Marks) ii) Security clearance (2 Marks) b) Describe any SEVEN types of threats to information systems and offer an example for each. (7 Marks) c) The Psychoanalytic Theory describes cybercrime to be controlled by three subconscious sources: – the id – the ego – the superego. Discuss each of these. (9 Marks) QUESTION FOUR [20 MARKS] a) i) Describe the concept of “digital evience” (2 Marks) ii) What is so special about digital evidence? Discuss. (8 Marks) b) Discuss the TWO beliefs held by the Positive School of thought. (4 Marks) c) Discuss any THREE aspects of routine activity with respect to crime. (6 Marks) QUESTION FIVE [20 MARKS] a) “If you know neither the enemy nor yourself, you will succumb in every battle”. Discuss the logic of this statement and its applicability to forensics. (6 Marks) b) Biological determinism believes in THREE main types of criminals. Discuss. (6 Marks) c) Explain the process of risk management with regard to computer forensics (8 Marks)

BAC 3117  HUMAN ASPECTS OF FORENSICS. Read Post »

Scroll to Top