T215B FINAL 2016-2017 Spring

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Faculty Of Computer Studies

Course code: T215 B

Course Title: Communication and information Technologies- Part B

Final Exam_Key
Spring 2016/2017

T215B_ Final_Exam_Key_Spring_2016/2017 Page 1 of 10


Part 1
This part carries 15% of the total examination marks. You should attempt all questions in this
part by choosing the best answer for each question and write it on the external answer sheet.
Each question carries 1.5 marks. You are advised to dedicate approximately 20 minutes to this
part.

1. To align two fingerprints effectively in a matching process, a reference point known as


___________is often used.
a. Principle.
b. Vertex.
c. Core.
d. Edge.
2. ____________refers to incorrectly believing that two given sets of biometric data are not
matched.

a. False acceptance
b. False positive.
c. False non-match
d. False match.
3. Authentication of the server like the bank with the client like the client’s computer is
achieved using __________setup procedure between an HTTPS protected server and a client.
a. TCP/IP
b. TLS/SSL
c. WEP/WPA
d. SMTP/SOA

4. _____________that may include key-loggers and Trojans is generally downloaded from


compromised websites and email attachments. They can send “harvested” information to
fraudsters.
a. Skimming.
b. DOS attack.
c. Malware.
d. Eavesdropping.
5. One of attributes of the CRIAC framework which is related to a feature or service working as
expected, when expected and with acceptable accuracy is____________.
a. Acceptability
b. Reliability
c. Identity
d. Convenience

T215B_ Final_Exam_Key_Spring_2016/2017 Page 2 of 10


6. _________Consists of small rapid fluctuations of the atmospheric air pressure that surrounds
us.
a. Pixel
b. Sound
c. Image
d. Weight
7. The figure below shows two sinewaves, (a) and (b), that are _________________

a. Completely in phase.
b. Identical phase
c. Completely out of phase
d. Similar phase

8. The condenser microphone and the electret microphone are two types of microphone that
use the effect of_______________.
a. Electrostatic induction.
b. Electromagnetic induction
c. Electrodynamic induction
d. Optical induction.

9. When the minimum sampling rate is not respected, another sinewave with a lower frequency
can be drawn through these samples. This phenomenon is known as____________.
a. Amplification.
b. modulation
c. Aliasing
d. Boosting
10. __________is a tool for video production that provides ways of creating, editing and
processing videos.

a. Compiler
b. Interpreter.
c. Paintbrush
d. AviSynth

T215B_ Final_Exam_Key_Spring_2016/2017 Page 3 of 10


Part 2

This part carries 35% of the total examination marks. You should attempt only 5 out of 7
questions in this part. Each question carries 7 marks. You are advised to dedicate approximately
70 minutes to this part.

1. In the context of Cryptography, explain briefly the difference between a code and a cipher?

Solution:

A code replaces whole words, phrases or groups of symbols with alternatives (or code words).
The purpose of creating a code is not always for secrecy.
A code is used simply as an abbreviation.
A code is used to provide an alternative way of communicating information.
A code is the output of an encoding process (the reverse is decoding) and generally relies on sets
of look-up tables (codebooks) for the conversion processes. (3.5 marks)

Ciphers:

A cipher is the output of an encryption process that either replaces data symbols with alternative
symbols, or rearranges existing symbols.
The operation used to create a cipher is systematic (i.e. follows some set rules).
A cipher is almost always created for reasons of secrecy. (3.5 marks)

2. The level of security afforded during a TLS/SSL session depends on a number of factors. List
three of these factors.

Solution:
i. The browser application used at the client (2 marks)
ii. The version of TLS/SSL used to set up the connection (2 marks)
iii. Proper authentication of the digital certificate. (3 marks)

3. In fingerprint matching process, there are many reasons for intra-class variations. Explain
briefly, three of these reasons.
Solution: (any three from the list below are correct)

Reasons for intra-class variations:


• Displacement: different parts of the fingertip are presented to the sensor.
• Rotation: the fingertip is presented to the sensor at a different angle.
• Pressure of the impression: the finger is pressed on the sensor with a different force.
• Skin condition: on different occasions the fingertip may be dry, wet, scratched or
dirty.
• Condition of the sensor surface: on different occasions the surface may be clean,
dirty or greasy.
• Feature extraction accuracy.

T215B_ Final_Exam_Key_Spring_2016/2017 Page 4 of 10


(Award 2 marks for each of the first two items and 3 marks for the third one. Order is not
significant. Total marks=2x2+3=7 marks)

4. Automated teller machines (ATMs) are often referred as ‘cash machines’. What are the
services that can be provided by ATMs (at least four)? What are their benefits (at least three)?

Solution:

Modern ATMs allow many of the traditional over-the-counter services involving a bank teller to
be accessed through a machine. Some of these services are:

• withdraw cash
• check an account balance
• print out a summary or detailed statement
• pay in cheques, money orders and cash (4 marks)

ATM benefits:
• reduced costs (to banks)
• reduced delays (for customers)
• Extended availability outside normal banking hours. (3 marks)

5. Moving coil microphones is one type of microphones. What are its advantages and
disadvantages? What is its usage?

Solution:

Moving coil Microphones (electromagnetic induction):

Advantages:
Moving-coil microphones are typically quite rugged.
Moving-coil microphones are able to convert sounds more or less over the full range of audible
frequencies. (3 marks)

Disadvantage:
Moving-coil microphones tend not to be as sensitive as electrostatic microphone types.
(2 marks)
Usage:
Moving-coil microphones are most often used as handheld microphones for singers and
speakers, where ruggedness is more important than sensitivity. (2 marks)

T215B_ Final_Exam_Key_Spring_2016/2017 Page 5 of 10


6. Working with sound signal in its digital form has many advantages. Explain briefly, two of
these advantages.

Solution: (Any two items from the given below are correct. Award each item 3.5 marks):

1. Immunity from signal corruption brought about by extensive processing or through


transmission or storage.

2. Mixing and processing of sound comes down to a simple process of computation


(‘number crunching’) rather than involving complicated analogue electronic circuits and
devices.

3. Computer storage techniques can easily be used for storing sound in its digital form.

(Total marks=3.5x2=7 marks)

7. Provide briefly, the definitions for the following terms:

a- Digital video. (3 marks)


b- Frame. (2 marks)
c- Resolution of digital image. (2 marks)

Solution:

a. A digital video can be defined as a sequence of digital still images displayed in rapid
succession in order to simulate different types of animations and effects. (3 marks)
b. Each image in the video is known as a frame. (2 marks)
c. The resolution of the digital image is a measure of the amount of detail it can hold, and
is dependent on the number of pixels used to make up that image. (2 marks)

Part 3

This part carries 50% of the total examination marks. You should attempt all the problems in
this part. You are advised to dedicate approximately 90 minutes to this part.

Problem 1: (10 marks)

Part A:
Compute the decryption keys for the Caesar cipher (single coding) with encryption keys of: 8, 12
and 16? (Show calculation details) (6 marks)

Part B:
Consider that a fingerprint database contains 36 million records. If the identification system can
perform 12000 fingerprint comparisons per second, how long would it take to search through all
the records? Express time in minutes. (Show calculation details and formulas used) (4 marks)

T215B_ Final_Exam_Key_Spring_2016/2017 Page 6 of 10


Solution:

K=8 → K+ 𝐾̅ =26 → 𝐾
̅ =26 – K = 26 – 8 → 𝐾
̅ =18 (2 marks)
̅ ̅ ̅ =14
K=12 → K+ 𝐾 =26 → 𝐾 =26 – K = 26 – 12 → 𝐾 (2 marks)
̅ =26 → 𝐾
K=16 → K+ 𝐾 ̅ =26 – K = 26 – 16 → 𝐾
̅ =10 (2 marks)

Part B:
Time = number of records/processing speed. (1 mark)
6 3
Time = 36 x 10 / 12x10 = 3000 s (2 marks)

Time in minutes= 3000/60=50 minutes. (1 mark)

Problem 2: (10 marks)

Part A:

How many bytes are needed to store a single video frame with a RGB24 color model, and a
frame size of 1400 x 1000 pixels? Express your answer in bytes. At 24 frames per second what is
the data rate that will have to be handled by the video player software? (Express your answer in
megabytes per second.) (4 marks)

Solution:
• The RGB24 color model allocates 24 bits, or 3 bytes, to determine the color of each pixel.
• There are 1400×1000 pixels per frame giving a total of: 3×1400×1000 = 4 200 000 bytes.
(2 marks)
• In 1 second, 24 frames will be processed. The number of bytes per second is therefore:
24×4200000 = 100 800 000 bytes per second = 100.8 megabytes per second. (2 marks)

Part B:

Consider an audio CD that contains exactly one third of an hour of stereo sound. Ignoring any
additional requirements for format information and other data to ensure the integrity of the
sound samples, how many bytes of storage does the CD need to contain for both of the stereo
channels? Assume the sample rate is 44100 samples per second and each sample requires two
bytes of storage. (6 marks)

Solution:

Third of an hour = 20 x 60 = 1200 seconds. (2 marks)


Storage requirement = 1200 × 44100 × 2 = 105840000 bytes (2 marks)
For both of the stereo channels = 105840000 × 2 = 211680000 bytes. (2 marks)

T215B_ Final_Exam_Key_Spring_2016/2017 Page 7 of 10


Problem 3: (10 marks)

The figure below represents a sound signal propagates in air as medium, answer the following
questions:

a) Consider each square of the time axis represents 0.4 ms; calculate the period of signal in
seconds and milliseconds? (2 marks)
T = 5 x 0.4 = 2 ms (1 mark)
T = 2x0.001=0.002 s (1 mark)
b) Calculate the frequency of signal in Hz? (2 marks)
f = 1/T = 1/0.002 = 500 Hz
c) Calculate the wavelength of signal. Consider the speed of sound in air is 340 m/s? (2
marks)
λ = v x T = 340 x 0.002 = 0.68 m
d) What are the peak and root-mean square (r.m.s.) amplitudes? Consider each square of
the pressure axis represents 0.2 µPa? (4 marks)
Peak pressure = 7 squares x 0.2 = 1.4 µPa (2 marks)
r.m.s. = peak amplitude / √2 = 1.4 / √2 = 0.9899 µPa (2 marks)

T215B_ Final_Exam_Key_Spring_2016/2017 Page 8 of 10


Problem 4: (10 marks)
The system shown below consists of two subsystems: Face and fingerprint. Each subsystem
provides a decision (Match or Non-Match)

Finger Match/Non Match


Combined biometric
Fingerprint biometric
Subsystem
system Match/
AND Non Match
Face Facial biometric
Subsystem
Match/Non Match

Suppose that the subsystems decisions are combined as follows:

The outcome of the combined system will be a match only when the outcomes of both of the
subsystems are matches. When the outcome of either subsystem is a non-match, the outcome
of the combined system will be a non-match.

Assume that the following values have been obtained for the two systems separately,

The FMR for the face subsystem is 6%


The FNMR for the face subsystem is 12%
The FMR of the fingerprint subsystem is 2%
The FNMR of the fingerprint subsystem is 7%.

a. Calculate the FMR and FNMR of the combined system? (Show details). (6 marks)
b. What are your observations about the obtained values? (2 marks)
c. What is your conclusion about the combined system? (2 marks)

Solution:

a.
Combined FMR:
A false match can only occur if BOTH subsystems wrongly say there is a match.

FMR of the combined system: FMR = FMR x FMR


C 1 2
6 2 12
FMR = 100 × 100 = 10000 = 0.0012 = 0.12% (3 marks)
c

T215B_ Final_Exam_Key_Spring_2016/2017 Page 9 of 10


Combined FNMR:
A false non-match can occur if EITHER the face subsystem or the fingerprint subsystem gives a
false non-match.

FNMR of the combined system: FNMR = FNMR + FNMR – (FNMR x FNMR )


C 1 2 1 2

FNMR = 12% + 7% – (12% × 7%) = 19% – 0.84% = 18.16%. (3 marks)


C

b.
Observation about FMR: The FMR of the combined system is much smaller (at 0.12%) than is
C
the FMR of either subsystems (which are 6% and 2%). (1 mark)

Observation about FNMR: The FNMR of combined system has not gone down, it has gone up!
(1 mark)
c. Conclusion: Fewer illegitimate users will be allowed access (More security), but more
legitimate users will be denied access (less convenience). (2 marks)

Problem 5: (10 marks)

Use the Vigenère cipher with the keyword ‘tablet’ to encrypt the following sentence: “Welcome
to ITC Program”. Show your work in details in the form of table.
Table below help you to find the code equivalent to each letter.

c ≡ p + K mod 26 (0.5 mark)

Plaintext w e l c o m e t o i t c p r o g r a m
Code 22 4 11 2 14 12 4 19 14 8 19 2 15 17 14 6 17 0 12
Key t a b l e t t a b l e t t a b l e t t
Code 19 0 1 11 4 19 19 0 1 11 4 19 19 0 1 11 4 19 19

Result 15 4 12 13 18 5 23 19 15 19 23 21 8 17 15 17 21 19 5

Cipher P E M N S F X T P T X V I R P R V T F
text

(0.5 for each correct column mark; Total marks= 19x0.5+0.5=10 marks)
(Deduct 1 mark if student write the ciphertext in small letters)

T215B_ Final_Exam_Key_Spring_2016/2017 Page 10 of 10

You might also like