100% found this document useful (1 vote)
240 views11 pages

2025 Exercise Computer 12 Unit 1 Computer System

Uploaded by

mayarali2112006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
240 views11 pages

2025 Exercise Computer 12 Unit 1 Computer System

Uploaded by

mayarali2112006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1

EXERCISE
Q 1. Select the best answer for the following Multiple-Choice Questions (MCQs).
1. A software product receives negative user reviews due to being difficult to use.
Which of the following factors is least likely responsible?
a. Inefficiency
b. Ineffectiveness
c. High satisfaction
d. High complexity
2. A web form alerts the user when an email address is entered incorrectly before
submission. Which usability principle does this best represent?
a. User satisfaction
b. Error prevention
c. Performance optimization
d. Feedback mechanism
3. If you want to observe users' emotional reactions and gather verbal feedback while
they perform tasks, which usability testing method would be most suitable?
a. Moderated Usability Testing
b. Unmoderated Usability Testing
c. A/B Testing
d. Remote Usability Testing ability
4. Which practice best supports confidentiality in a hospital's patient records system?
a. Ensuring the system is always online
b. Allowing only authorized doctors to access patient data
c. Letting patients edit their own files freely
d. Encrypting data for public access
5. A user receives a seemingly legitimate email from their bank requesting login details.
This is an example of:
a. Phishing
b. Malware
c. Spyware
d. Spoofing
6. A company wants to protect client data during transmission over the internet. Which
security method should they apply?
a. Firewall
b. b. Encryption
c. Access Control
d. Antivirus Software
7. What is the main objective of Human-Computer Interaction (HCI)?
a. System performance
b. User interaction
c. Software complexity
d. Hardware costs
8. Which of the following is NOT considered a key element of HCI?
a. Users
b. Tasks
c. Budget
d. Interface

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 1 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
9. Which of the following is a common issue related to accessibility in HCI?
a. Slow load times
b. Lack of alternative text for images
c. Inadequate error messages
d. Complicated authentication processes
10. Which method involves placing the end users at the core of the design process in
HCI?
a. Performance Optimization
b. Error Prevention
c. User-Centered Design (UCD)
d. Simplifying User Interfaces
11. What does the term 'interface' refer to in HCI?
a. The physical device used
b. Point where user interacts with system
c. The software programming language
d. The hardware configuration

12. Why is multi-factor authentication (MFA) often seen as a trade-off between security
and usability?
a. It's expensive to implement
b. It improves system speed
c. It increases security but can slow down user access
d. It reduces the need for encryption
13. Which issue is caused by encryption?
a. Processing speed
b. Data access
c. Key management
d. Interface
14. How can auto-save improve cybersecurity efficiency?
a. Recovery
b. Encryption
c. Complexity
d. Management
15. Which ethical consideration involves transparency in data use?
a. Efficiency
b. Cost
c. Privacy
d. Accessibility

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 2 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Give short answers to the following Short Response Questions (SRQs).

Q 1. What are the key components of usability in HCI?


Ans. When devices and systems are designed, the crucial aspects need to be considered:

• Easy to use (usability),


• Safe and secure from threats (security), and
• Accessible to everyone, including people with disabilities (accessibility).

Understanding these aspects is crucial because they affect how we interact with technology
and how technology affects our lives.

Q 2. List and briefly describe the four key elements of HCI.


Ans. The key elements of HCI include:
o Users
o Tasks
o Interface
o Environment
1. Users: Users are the individuals who interact with a system.
2. Tasks: Tasks refer to the specific activities that users need to perform using
the system.
3. Interface: The Interface is the point of interaction between the user and the
system.
4. Environment: The Environment refers to the physical and social context in which the
interaction between the user and the system takes place.

Q 3. What is the difference between moderated and unmoderated usability testing.


Ans.
Moderated Usability Testing Unmoderated Usability Testing
1. A facilitator or moderator is present to In unmoderated usability testing, users’
guide users through tasks, ask complete tasks on their own without a
questions, and observe behaviors in moderator's direct involvement.
real-time.
2. The moderator can also interact with This type of testing is often conducted
users to clarify instructions or probe remotely, allowing participants to use the
deeper int: specific Issues. system or device in their natural
environment. The sessions are typically
recorded for later analysis.
3. More time-consuming and expensive Faster and more cost-effective since tests
due to scheduling, facilitator can be conducted asynchronously and on a
involvement, and potential travel or scale.
coordination.
4. Example: Example:
• A company developing a new • An e-commerce website wants to test
software application conducts how easily customers can find and
moderated usability testing by purchase products.
inviting participants to a lab • The company conducts unmoderated
environment. usability testing by sending out tasks for
• The moderator asks users to users to complete at home, such as
perform specific tasks, such as searching for a product, adding it to the
Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 3 of 11
Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
navigating through the app's cart, and completing the checkout
features or completing a process.
transaction. • The user interactions are recorded, and
• The moderator observes how easily the company reviews the footage to
users can accomplish these tasks identify any pain points or areas of
and asks questions about their confusion.
experience, helping to identify any
usability issues.

Q 4. What does 'error handling' mean in the context of HCI?


Ans.
Error Handling:
• Error Handling involves the system's ability to:
o Prevent errors,
o Guide users in correcting them, and
o Help users recover from mistakes.
• Good error handling is essential for maintaining user trust and ensuring a smooth
interaction, even when things go wrong.
Example:
• An online booking system for airline tickets should prompt users to correct mistakes,
such as:
o Entering an invalid date or
o Leaving a required field blank
• Instead of allowing the user to proceed with faulty data, the system might highlight
the problematic fields in red and
• Provide an error message explaining what needs to be corrected.
• Additionally, providing helpful suggestions or autofill options can prevent common
errors, such as typos in names or addresses.

Q 5. What is meant by 'User-Centered Design (UCD) in HCI?


Ans.
User-Centered Design (UCD):
• User-Centered Design (UCD) is a design philosophy that places the end users at the
core of the design process.
• It is an iterative approach where user feedback is continuously gathered and
integrated throughout the development cycle.
• This method ensures that the final product aligns closely with the users' needs,
preferences, and limitations, resulting in a more effective and satisfying user
experience.
Example:
• Consider the development of a new educational User-Centered Design (UCD)software
intended for use in schools.
• By involving teachers and students in the design process from the beginning.
• Developers can gather valuable feedback on features such as interactive elements,
user interfaces, and content organization.
• Early testing might reveal that students prefer interactive quizzes over static reading
material, leading to adjustments that enhance engagement and learning outcomes.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 4 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Q 6. Give three benefits and two drawbacks of using password managers?
Ans.
Benefits of Using Password Managers:
1. Strong, Unique Passwords for Every Site:
o Password managers generate and store complex passwords, reducing the risk
of using weak or reused passwords across multiple accounts.
2. Convenience and Speed:
o They automatically fill in login forms, saving time and effort when accessing
different websites or apps.
3. Centralized Management:
o All credentials are stored securely in one place, making it easy to manage and
update passwords as needed.
Drawbacks of Using Password Managers:
1. Single Point of Failure:
o If the master password or the password manager account is compromised, all
stored passwords may be at risk.
2. Dependence on Software:
o If the password manager app crashes, is unavailable, or the user forgets the
master password, it can lock them out of all accounts.

Q 7. How does user feedback contribute to effective system design?


Ans.
• User feedback is a critical component of effective system design.
• It ensures that the final product aligns with the users:
o Actual needs,
o Behavior, and
o Expectations
How it contributes:
1. Identifying Real Needs: Direct input from users uncovers their pain points, goals, and
priorities, leading to a system that solves real problems.
2. Improving Usability: Usability testing and ongoing feedback highlight navigation
issues, unclear interfaces, or confusing terminology that designers can refine.
3. Detecting Bugs and Gaps: Users often detect issues that weren’t found in controlled
testing, helping improve system robustness and reliability.

Q 8. Provide an example of how user feedback led to a design change.


Ans.
Example: Microsoft Word's "Ribbon" Interface
Background
• Before 2007, Microsoft Word (and other Office products) used a traditional menu and
toolbar system.
• Over time, as more features were added, the interface became cluttered and
confusing.
• Many users couldn’t find or didn’t know about key features—even ones that would
improve their workflow.
User Feedback Collected
• Complaints: Users were overwhelmed by the number of buttons and menus.
• Usage data: Microsoft tracked which features were used frequently and which were
often hidden or unused.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 5 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
• Interviews and testing: Users reported difficulty navigating the interface and finding
essential tools.
Design Change
In response, Microsoft introduced the "Ribbon" interface in Office 2007:
• It grouped tools and commands into tabbed categories based on tasks (e.g., "Insert",
"Layout", "Review").
• Frequently used features were surfaced more clearly.
• Contextual tools appeared only when needed (e.g., image editing tools when selecting
a picture).
Impact
• The Ribbon reduced cognitive load and helped users discover functionality they didn’t
know existed.

Q 9. Give two considerations for designing accessible systems for users with disabilities.
Ans.
Here are two key considerations for designing accessible systems for users with disabilities:
1. Provide Multiple Means of Interaction:
• Ensure that users can interact with the system using various input methods
(e.g., keyboard navigation, voice control, screen readers).
• This accommodates users with motor impairments, visual impairments, or
other limitations that prevent them from using traditional input devices like a
mouse.
2. Use Clear and Perceivable Content:
• Design content that is easy to see, hear, and understand.
• This includes using high-contrast colour schemes, readable fonts, alternative
text for images, and captions for audio or video content.
• It will support users with visual, auditory, or cognitive impairments.

Q 10. Suggest three features that should be included in a new educational software
application to enhance accessibility for users with disabilities.
Ans.
Here are three essential accessibility features that should be included in a new educational
software application:
1. Screen Reader Compatibility:
• Ensure that all content and navigation elements are fully compatible with
screen readers (like NVDA or JAWS).
• This includes using proper semantic HTML, ARIA labels, and logical heading
structures so users with visual impairments can understand and navigate the
application effectively.
2. Keyboard Navigation:
• Design the application so that all functions can be accessed using only a
keyboard (e.g., via Tab, Shift+Tab, Enter, and arrow keys).
• This supports users with motor disabilities or those who cannot use a mouse.
3. Customizable Display Options:
• Allow users to adjust font size, color contrast, and background themes.
• This benefits users with low vision, dyslexia, or sensory sensitivities, enabling
them to tailor the display to their specific needs.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 6 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Give long answers to the following Extended Response Questions (ERQs).

Q 1. Describe how accessibility challenges impact the usability of a digital system and
provide examples of improvements that can address these challenges.
Ans.
• Accessibility challenges can significantly impact the usability of a digital system by
making it difficult or even impossible for users with disabilities to navigate,
understand, or interact with content.
• Poor accessibility can lead to frustration, exclusion, and reduced engagement with
the system.
How Accessibility Challenges Impact Usability:
1. Visual Impairments:
If a website uses small text or poor colour contrast, users with low vision or colour
blindness may struggle to read or interpret content.
Improvement:
o Use high-contrast colour schemes and allow text size customization.
o Add alt text for all images and ensure screen reader compatibility.
2. Hearing Impairments:
Videos or audio content without captions or transcripts are inaccessible to users who
are deaf or hard of hearing.
Improvement:
o Provide closed captions and transcripts for all audio and video content.
3. Motor Disabilities:
If a user must use a mouse to navigate, people with limited mobility may be unable
to use the system effectively.
Improvement:
o Enable full keyboard navigation and support for assistive technologies like
voice control or switch devices.
4. Cognitive Disabilities:
Complex layouts, unclear instructions, or inconsistent navigation can confuse users
with cognitive impairments.
Improvement:
o Use simple language, consistent design patterns, and offer text-to-speech
features or visual cues.

Q 2. What are the main elements involved in Human-Computer Interaction (HCI)


design? Explain each element's role in creating effective interactive systems.
Ans.
Answer is given above in the form of four short questions

Q 3. Explain the ethical considerations in Human-Computer Interaction (HCI) with


examples. Why are these considerations important in the design and deployment
of computing systems?
Ans.
Ethical Considerations in Human-Computer Interaction (HCI)
• Ethics in HCI focuses on ensuring that interactive systems are designed and used in
ways that respect user rights, promote well-being, and avoid harm.
• These considerations are critical because computing systems influence how people
live, learn, work, and interact.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 7 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Ethical Considerations in HCI
1. Privacy and Data Protection:
• Users must have control over their personal data.
• Systems should collect only necessary data and protect it from misuse or
unauthorized access.
Example:
• An educational app should not track students' locations or browsing habits
without explicit consent and a clear educational purpose.
Why it matters?
• Violating privacy can lead to loss of trust, legal issues (e.g., GDPR), and
psychological harm.
2. Accessibility and Inclusion
• Systems must be usable by people of all abilities, including those with disabilities.
Example:
• A public transportation app should include features like screen reader support
and high-contrast modes for visually impaired users.
Why it matters?
• Exclusion from digital systems can limit opportunities, independence, and social
participation.
3. Transparency and Informed Consent
• Users should understand how the system works and what it does with their data.
Example:
• A health-tracking app must clearly explain how it uses users’ biometric data and
obtain informed consent before data collection.
Why it matters:
• Users can only make responsible choices if they are properly informed.

4. Bias and Fairness


• Systems must avoid reinforcing social biases or making discriminatory decisions.
Example:
• A hiring platform using AI should be tested for bias against gender or race to
ensure fair evaluations.
Why it matters:
• Unfair systems can reinforce inequality and cause real harm to affected
individuals.
5. User Safety and Well-being
• Interfaces should not encourage addictive behaviour, stress, or harm.
Example:
• A social media app should limit notifications and promote healthy usage patterns
to avoid user burnout or anxiety.
Why it matters:
• Digital systems have a strong influence on mental health and lifestyle.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 8 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Q 4. You are developing a new software tool for remote team collaboration. What
usability and security features would you integrate to support efficient teamwork
while protecting sensitive data?
Ans.
• When developing a remote team collaboration software tool, it’s essential to
integrate both usability and security features to ensure effective communication
and data protection.
• The key features need to consider:
Usability Features (To Support Efficient Teamwork)
1. User-Friendly Interface
o Simple, intuitive layout with minimal learning curve
o Clear navigation for accessing chats, files, meetings, and tasks
2. Real-Time Collaboration Tools
o Shared documents with live editing
o Commenting and task assignment features
3. Integrated Communication Channels
o Text chat, video conferencing, and voice calls
o Threaded conversations for organized discussions
4. Cross-Platform Compatibility
o Support for desktop, mobile, and web browsers
o Consistent experience across devices
5. Accessibility Support
o Keyboard navigation, screen reader compatibility, adjustable text sizes and
contrast
Security Features (To Protect Sensitive Data)
1. End-to-End Encryption
o Secure messaging and file sharing so only intended recipients can access
content
2. Role-Based Access Control (RBAC)
o Limit access based on user roles (e.g., admin, editor, viewer)
o Prevent unauthorized access to sensitive project areas
3. Multi-Factor Authentication (MFA)
o Additional login layer to protect user accounts

4. Data Backup and Recovery


o Regular backups and easy restoration of deleted or lost data
5. Secure File Sharing and Storage
o Files stored in encrypted formats
o Expiring links and permission-based sharing

Q 5. You are tasked with designing an e-commerce website. The site must be both user-
friendly and secure. List three features you would include to achieve this balance
and explain why.
Ans.
To design an e-commerce website that is both user-friendly and secure, here are three
essential features to include:
1. Simple and Clear Navigation:
Why?
• A clean layout with clearly labelled menus and search bars helps users find
products easily.
Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 9 of 11
Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
• This improves the user experience and keeps customers on the site longer.
2. Secure Payment Gateway:
Why?
• Using trusted payment methods (like PayPal or secure credit card processing)
protects users’ personal and financial information.
• This builds trust and prevents fraud.
3. Two-Factor Authentication (2FA):
Why?
• Adding 2FA during login adds an extra layer of security.
• Even if someone steals a password, they still can’t access the account without
a second verification step (like a code sent to the user’s phone).

Q 6. Discuss the trade-offs between usability and security in computing systems.


Provide examples of how these trade-offs might manifest in real-world
applications.
Ans.
Trade-offs between Usability and Security in Computing Systems
• When designing computing systems, achieving a balance between usability and
security is crucial.
• Both factors are essential, but they often come into conflict.
• The trade-offs between usability and security consider the following:
o Efficiency,
o Cost,
o Privacy, and
o Ethics
• Usability focuses on how easy and intuitive a system is for users.
• While security aims to protect the system from unauthorized access and attacks.
• The trade-offs arise because enhancing security can sometimes degrade usability,
and vice versa.
Authentication Complexity Aspect:
Security:
• Enhances security by adding extra verification steps like multi-factor authentication
(MFA), making unauthorized access much harder.
Usability:
• Reduces usability as MFA requires additional steps like entering codes from a phone,
slowing down user access and causing potential frustration.
Example:
• A user logging into a bank account needs to enter a password and then a code sent to
their phone, increasing security but delaying access.
Access Controls:
Security:
• Protects sensitive data by restricting user permissions, ensuring only authorized
individuals can access or modify information.
Usability:
• Hinders usability when users frequently encounter permission issues, requiring them
to request access, which can slow down their work.
Example:
• An employee needs frequent permission from IT to access certain files, delaying their
ability to complete tasks efficiently.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 10 of 11


Prepared by: Ahmed Hassan Khan Computer System Second Year Chapter # 1
Encryption:
Security:
• Secures data by converting it into a format only accessible with a decryption key,
protecting against unauthorized access even if data is intercepted.
Usability:
• Impacts usability as encryption can slow down data access and processing, and
managing encryption keys can be complex and time-consuming.
Example:
• Encrypting patient records keeps them secure but may slow down access, which can
be challenging during emergencies.

Q 7. You are tasked with designing an e-commerce website. The site must be both user-
friendly and secure. List three features you would include to achieve this balance
and explain why.
Ans. Q5. Is repeated

Q 8. How do security measures like multi-factor authentication (MFA) and encryption


impact usability, and how can designers balance these trade-offs?
Ans.
• Security measures like multi-factor authentication (MFA) and encryption play an
important role in protecting data and systems.
• However, they can also affect usability, which means how easy and convenient a
system is for users.
Impact on Usability:
1. Multi-Factor Authentication (MFA):
o Positive: Increases security by requiring two or more verification steps (e.g.,
password + OTP or fingerprint).
o Negative: Can be inconvenient or time-consuming for users, especially if they
need to verify identity frequently.
2. Encryption:
o Positive: Protects data during storage or transmission, making it unreadable to
unauthorized users.
o Negative: May slow down performance or require extra steps (e.g., entering
passwords to decrypt files), which can reduce ease of use.
Balancing Trade-offs (Security vs. Usability):
Designers can balance security and usability by:
1. User-friendly authentication methods:
o Using biometrics (fingerprint, face recognition) which are secure yet easy to
use.
2. Remembering trusted devices:
o MFA can be skipped on devices that are frequently used and marked as safe.
3. Efficient encryption techniques:
o Using modern, fast algorithms that secure data without noticeable delay.
4. Clear instructions and interface:
o Making the system simple to understand so users don't feel overwhelmed by
security features.
5. Custom security settings:
o Letting users choose their level of security (e.g., optional MFA) based on their
needs.

Punjab College of Comm. Cantt. Campus Updated 06/08/2025 Page 11 of 11

You might also like