0% found this document useful (0 votes)
17 views16 pages

TCS 410 & ICS 424 Updated

Exam

Uploaded by

almuhseen24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views16 pages

TCS 410 & ICS 424 Updated

Exam

Uploaded by

almuhseen24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

TCS 410 EXAMINATION 2019/2020 SESSION

Question 1
a. The ISO network management model partitions the functions of network management into five
conceptual areas, list and explain each of them.
b. List five (5) roles of a Network Administrator.
Answer
a. The ISO network management model partitions the functions of network management into five
conceptual areas:
i- Fault Management: Detects, isolates, notifies, and corrects faults in the network. It involves
identifying and fixing network problems to ensure continuous network availability.
ii- Configuration Management: Manages network and system configurations. It involves tracking and
managing hardware and software configurations, including software updates and device settings.
iii- Accounting Management: Measures and monitors network usage to ensure fair distribution of
network resources. It includes tracking user activities, managing billing, and analyzing usage trends.
iv- Performance Management: Monitors and measures various aspects of network performance, such
as throughput, response time, and error rates. The goal is to maintain optimal network performance.
v- Security Management: Protects network resources from unauthorized access and ensures data
privacy and integrity. It involves implementing security policies, monitoring security breaches, and
managing access controls.

b. Roles of a Network Administrator are:


i- Network Monitoring: Continuously monitor network performance and security to identify and
resolve issues promptly.
ii- Network Configuration: Configure network devices such as routers, switches, and firewalls to
optimize network performance and security.
iii- Troubleshooting: Diagnose and fix network problems to minimize downtime and ensure network
reliability.
iv- User Support: Provide technical support to users, helping them with network-related issues and
ensuring they have access to necessary network resources.
v- Network Security: Implement and maintain security measures to protect the network from threats
and ensure data privacy.

Question 2
a. Managing network infrastructures is essential in administration of a network, explain network
management at service level.
b. Telecommunication Management Network (TMN) architecture and interfaces, defined in the ITU
M.3000 recommendation series, are built on existing open systems interconnection (OSI)
standards. Briefly explain these four (4) standards on which they are built.
c. Describe, with an example, QA (Q-Adapter) as a functional component of TMN.
Answer
a. Network management at the service level involves ensuring that network services meet the required
performance and availability standards. This includes monitoring service quality, managing service
configurations, and ensuring that service-level agreements (SLAs) are met. It also involves proactive
measures to prevent service degradation and quick resolution of service-related issues.

b. The Telecommunication Management Network (TMN) architecture and interfaces, defined in the
ITU M.3000 recommendation series, are built on existing OSI standards:
i- FCAPS Model: Fault, Configuration, Accounting, Performance, and Security management
framework used for network management.
ii- CMIP (Common Management Information Protocol): A protocol used for network management
communications in TMN, defined in the OSI model.
iii- GDMO (Guidelines for the Definition of Managed Objects): Provides guidelines for defining
managed objects in a network.
iv- ASN.1 (Abstract Syntax Notation One): A standard interface used for defining data structures for
representing, encoding, transmitting, and decoding data.
c. A Q-Adapter (QA) is a functional component of TMN that acts as an intermediary between
different network management systems (NMS) or between an NMS and network elements. It
translates information and protocols between incompatible systems to ensure seamless
communication. For example, a QA can convert SNMP protocol data from a network element into a
format understandable by a TMN system using CMIP.

Question 3
a. The various services provided on a Unix system can be categorized in a number of ways: They can
be network services or purely internal services. The service configuration could be of three (3)
different types. Mention the three (3) types and, giving an example, briefly explain each.
b. The first service provided by libwrap is to optionally log every connection it handles, and the more
useful service libwrap provide is a crude form of access control. This is controlled through two
files, /etc/hosts.allow and /etc/hosts.deny. In general, each line in these files contains three colon-
separated fields, as seen below in the Figure. Explain each of the line.
ALL.tcs.unilorin.edu.ng rfc931 allow sshd: ALL rfc931: allow ALL ALL deny
Figure: hosts.allowand hosts.deny
c. Draw a diagram to outline a TMN hierarchy.
Answer
a. Service Configuration Types in Unix Systems
i- Standalone Services: Services that run independently and handle their own processes. For example,
a web server like Apache running independently.
ii- Supervised Services: Services managed by a super-server such as inetd or xinetd. For example, the
FTP service managed by inetd.
iii- On-demand Services: Services that start only when requested. For example, ssh service that starts
when an SSH connection is initiated.

b. Explanation of /etc/hosts.allow and /etc/hosts.deny


ALL.tcs.unilorin.edu.ng rfc931 allow: Allows connections from the domain tcs.unilorin.edu.ng using
RFC931 for authentication.
sshd: ALL rfc931: allow: Allows all connections to the sshd service using RFC931 for authentication.
ALL ALL deny: Denies all other connections.

c. The TMN hierarchy is typically outlined in a multi-level structure with the following layers from
top to bottom:

Business Management Layer: Handles business-related activities.


Service Management Layer: Manages services provided to customers.
Network Management Layer: Manages network elements and resources.
Element Management Layer: Manages individual network elements.
Network Elements: Actual hardware and software components of the network.

Question 4
a. Describe MD (mediation device) as a functional component of TMN.
b. Interfaces between two TMN components communicate with one another. In tabular form,
describe three (3) interfaces in the TMN model.
c. What are the challenges facing network administrator? Mention just four (4).
Answer
a. A Mediation Device (MD) is a functional component in TMN that collects, processes, and
distributes information between network elements and management systems. It performs data
aggregation, filtering, and protocol conversion to ensure accurate and efficient communication.

b. TMN Model Interfaces


Interface Description
Q3 Interface between the network management layer and element management layer.
Qx Interface between different management systems within the same layer.
F Interface between the network elements and the element management layer.

c. Challenges Facing Network Administrators are:


i- Security Threats: Constantly evolving cybersecurity threats.
ii- Network Downtime: Ensuring minimal downtime and quick recovery.
iii- Scalability: Managing network growth and scalability.
iv- Performance Monitoring: Continuously monitoring and optimizing network performance.

Question 5
a. Outline steps to perform simple (Network File System (NFS) experiment on a single system.
b. Explain Management Information Base in relation to Object Identifier that is normally used by
SNMP.
c. In NMS, explain Management Entity.
Answer
a. Steps to Perform a Simple NFS Experiment on a Single System
i- Install NFS Packages: sudo apt-get install nfs-kernel-server.
ii- Create Export Directory: sudo mkdir /export.
iii- Configure Exports: Add /export *(rw,sync,no_root_squash) to /etc/exports.
iv- Start NFS Service: sudo systemctl start nfs-kernel-server.
v- Mount NFS Directory: sudo mount -t nfs localhost:/export /mnt.

b. Management Information Base (MIB) and Object Identifier (OID) in SNMP


The Management Information Base (MIB) is a collection of information organized hierarchically. It is
used by SNMP to manage network devices. Each piece of information in the MIB is identified by an
Object Identifier (OID), which is a unique identifier used to reference specific objects.

c. A Management Entity in a Network Management System (NMS) is responsible for performing


network management functions such as monitoring, controlling, and coordinating network resources.
It interacts with managed devices to gather data and perform management operations.

TCS 410 EXAMINATION 2021/2022 SESSION


Question One
a. Managing network infrastructures is essential in administration of a network, briefly explain the
roles of network administrator at hardware and system monitoring levels.
b. Mention the four (4) open systems interconnection (OSI) standards on which the TMN architecture
and interfaces, defined in the ITU M.3000 recommendation series, are built.
Answer
a. Roles of Network Administrator at Hardware and System Monitoring Levels
I. Hardware Level:
i- Installation and Configuration: Setting up and configuring network hardware such as routers,
switches, firewalls, and servers.
ii- Maintenance: Performing regular maintenance tasks, such as firmware updates, hardware repairs,
and replacements.
iii- Upgrades: Implementing hardware upgrades to improve network performance and capacity.
iv- Troubleshooting: Diagnosing and resolving hardware-related issues to ensure network availability
and performance.
v- Documentation: Keeping records of hardware configurations, changes, and maintenance activities.
II. System Monitoring Level:
i- Performance Monitoring: Tracking network performance metrics such as bandwidth usage, latency,
and error rates.
ii- Fault Detection: Identifying and logging network faults or anomalies to address them promptly.
iii- Security Monitoring: Monitoring for security breaches, unauthorized access, and other security
incidents.
iv- Resource Utilization: Monitoring the utilization of network resources to ensure efficient usage and
to plan for capacity expansion.
v- Alerts and Notifications: Setting up alerts and notifications for critical events or threshold breaches
to facilitate quick response.

b. Four OSI Standards for TMN Architecture and Interfaces


i- FCAPS Model: Framework for network management functions: Fault, Configuration, Accounting,
Performance, and Security management.
ii- CMIP (Common Management Information Protocol): Protocol for network management
communications within the TMN.
iii- GDMO (Guidelines for the Definition of Managed Objects): Guidelines for defining managed
objects in a network management system.
iv- ASN.1 (Abstract Syntax Notation One): Standard for defining data structures used in network
management protocols.
Question Two
a. Describe the five (5) conceptual areas of the functions of network management according to the
International Standard Organization (ISO) network management model.
b. What is Management Information Base (MIB) in relation to Object Identifier (OID) that is
normally used by SNMP.
Answer
a. Five Conceptual Areas of Network Management According to ISO Model
i- Fault Management: Detecting, isolating, and correcting network faults to ensure continuous
operation.
ii- Configuration Management: Managing network configurations to track changes, updates, and to
ensure the network is configured correctly.
iii- Accounting Management: Monitoring network usage for billing, analysis, and ensuring fair
resource distribution.
iv- Performance Management: Monitoring and measuring network performance metrics to maintain
optimal operation.
v- Security Management: Implementing measures to protect the network from unauthorized access
and ensuring data integrity and privacy.

b. The Management Information Base (MIB) is a hierarchical database used to manage devices in a
network. It contains a collection of managed objects identified by unique Object Identifiers (OIDs).
Each OID represents a specific variable that can be monitored or controlled using the Simple Network
Management Protocol (SNMP).

Question Three
a. Explain, giving an example each, the three (3) types of the service configuration as categorized
among the various services (network services or purely internal services) provided on a Unix system.
b. Describe Mediation Service (MD) as a functional component of Telecommunication Management
Network (TMN).
Answer
a. Types of Service Configuration in Unix Systems
i- Standalone Services: These services run independently as separate processes.
Example: A web server like Apache, which runs as its own process and listens for HTTP requests.
ii- Supervised Services: These services are managed by a super-server like inetd or xinetd, which
starts the service on demand.
Example: The FTP service managed by inetd, which only starts the FTP daemon when a connection
request is received.
iii- On-demand Services: These services start only when requested and are not running continuously.
Example: The sshd (Secure Shell Daemon) service, which starts when an SSH connection is initiated.

b. A Mediation Device (MD) in TMN acts as an intermediary that collects, processes, and distributes
information between network elements and management systems. It performs data aggregation,
filtering, and protocol conversion to facilitate accurate and efficient communication between different
network components and the management systems.

Question Four
a. In tabular form, explain three (3) interfaces in the TMN model considering how two (2)
components of the TMN communicate with one another.
b. Using a well and clearly labelled diagram, explain the TMN hierarchy.
Answer
a. Interfaces in the TMN Model
Interface Description
Q3 Interface between the network management layer and the element management layer,
facilitating communication and data exchange.
Qx Interface between different management systems within the same layer, ensuring
interoperability and coordinated management activities.
F Interface between network elements and the element management layer, enabling direct
management and monitoring of network devices.

b. TMN Hierarchy Diagram

Question Five
a. Briefly explain five (5) among the challenges facing the network administrator.
b. For Network File System (NFS) client and server systems to work reliably, some system daemons
are needed running. Mention those daemons, and group them accordingly.
Answer
a. Five Challenges Facing Network Administrators
i- Security Threats: Managing and mitigating constantly evolving cybersecurity threats.
ii- Network Downtime: Ensuring minimal downtime and quick recovery from network failures.
iii- Scalability: Handling network growth and scalability to accommodate increasing demand.
iv- Performance Monitoring: Continuously monitoring and optimizing network performance.
v- Keeping Up with Technology: Staying updated with rapid advancements in network technologies
and tools.

b. Required Daemons for NFS Client and Server Systems


I. NFS Server Daemons:
nfsd - NFS server daemon.
rpc.mountd - NFS mount daemon.
rpc.statd - NFS status monitor.
rpc.rquotad - Quota reporting daemon.
II. NFS Client Daemons:
rpcbind - RPC binding service.
rpc.statd - NFS status monitor.
rpc.lockd - NFS lock manager.

TCS 410 Test


Describe the two poss possible roles of a management entity in nerwork management.
Answer
In network management, a management entity can perform two primary roles:
a. Manager Role:
i. Function: The manager role involves overseeing and controlling the network's operations. This
entity collects data from various managed devices, analyzes it, and makes decisions to optimize the
network performance.
ii. Responsibilities: Monitoring network performance, detecting and diagnosing faults, configuring
network devices, and ensuring security compliance.
iii. Example Tools: Network management systems (NMS), such as IBM Tivoli, HP OpenView, or
SolarWinds, act as managers.
b. Agent Role:
i. Function: The agent role involves responding to requests from the manager and executing the
necessary actions on the managed devices. Agents run on network devices and provide the interface
through which the manager can interact with the device.
ii. Responsibilities: Gathering local data and metrics, implementing configuration changes, and
reporting status and alerts to the manager.
iii. Example Tools: SNMP agents, which run on devices like routers and switches, communicate with
the SNMP manager.
Question 2
a. The various services provided on a Unix system can be categorised in a number of ways: They can
be network services or purely internal services. They can be continually running, run on demand or
run at regular intervals. Which one of them launches on-demand network services.
b. In UNIX system, write a command that would add stud's details to the /etc/passwd file,
/tcs/stud00001 as the home directory, and also add him to the students and tes groups. This account
must also expire on the January 01, 2025.
Answer
a. The Various Services Provided on a UNIX System
On a Unix system, on-demand network services are typically launched by inetd or its more modern
replacement xinetd. These super-servers listen for incoming service requests on various network ports
and start the appropriate service daemon to handle each request. This method allows efficient use of
system resources by running services only when needed.

b. UNIX Command for Adding User


To add a user with specific requirements in a Unix system, you can use the following command:

sudo useradd -e 2025-01-01 -d /tcs/stud00001 -G students,tes -c "Stud's details" stud


-e 2025-01-01: Sets the account expiration date to January 01, 2025.
-d /tcs/stud00001: Sets the home directory to /tcs/stud00001.
-G students,tes: Adds the user to the "students" and "tes" groups.
-c "Stud's details": Adds a comment with the user's details.
stud: Username of the new account.

Question 3
Briefly describe OSI (open systems interconnection) Functionality in TMN (Telecomunications
Management Network).
Answer
The OSI model's functionality in TMN involves using its layered architecture to provide a framework
for managing telecommunication networks. TMN uses the OSI model to define standards and
protocols for communication between different network management systems and devices. The key
functionalities include:
a. Layer 1 (Physical Layer): Ensures the transmission and reception of raw bitstreams over a physical
medium.
b. Layer 2 (Data Link Layer): Provides error detection and correction to ensure reliable data transfer.
c. Layer 3 (Network Layer): Manages routing and forwarding of data packets across the network.
d. Layer 4 (Transport Layer): Ensures end-to-end communication and error recovery.
e. Layer 5 (Session Layer): Manages sessions and controls dialogues between computers.
f. Layer 6 (Presentation Layer): Translates data between the application layer and the network format.
g. Layer 7 (Application Layer): Provides network services directly to end-user applications.

Question 4
Describe Accounting management as defined in ISO network management model.
Answer
Accounting Management in the ISO network management model involves tracking the usage of
network resources by users and applications. The main objectives include:
a. Resource Utilization Tracking: Monitoring and recording the usage of network resources such as
bandwidth, storage, and processing power.
b. Usage Analysis: Analyzing the collected data to understand usage patterns, detect anomalies, and
optimize resource allocation.
c. Billing and Cost Allocation: Providing data for billing purposes and ensuring that costs are
allocated appropriately to different departments or users based on their resource consumption.
d. Budgeting and Planning: Using accounting data to plan and budget for future network expansion
and resource allocation.

Question 5
5. Network Administration involves a wide array of operational tasks that and a network to run
efficiently. With the aid of a diagram, outline network management functional grouping.
Answer
Network Management Functional Grouping involves categorizing network management tasks into
five key areas. Here's a diagram and description:

a. Fault Management: Detecting, isolating, and resolving network faults to ensure network reliability.
b. Configuration Management: Managing network configuration information to ensure the network
operates as intended.
c. Accounting Management: Tracking and billing resource usage by users and applications.
d. Performance Management: Monitoring and analyzing network performance to maintain an optimal
level of service.
e. Security Management: Protecting network resources from unauthorized access and ensuring data
integrity and confidentiality.

Question 6
6. Describe Management Information Base (MIB) in relation to Object Beatifier (OID) that is
normally used by (Sinaple Network Management Protocol) SNMP.
Answer
a. Management Information Base (MIB):
i. Definition: A collection of information organized hierarchically. These are accessed using a network
management protocol such as SNMP.
ii. Structure: The MIB contains managed objects identified by object identifiers (OIDs). Each
managed object represents a network resource or device attribute.
b. Object Identifier (OID):
i. Definition: A globally unique identifier used to name an object (such as a device or an attribute of a
device) in the MIB.
ii. Structure: OIDs are arranged in a hierarchical tree structure, with each node represented by a
number. For example, the OID for system uptime might be 1.3.6.1.2.1.1.3.
iii. Usage: OIDs are used by SNMP to identify and manage objects. When an SNMP manager queries
an agent, it uses the OID to specify which object it wants information about or wants to set.
iv. Example: 1.3.6.1.2.1.1.1.0
This OID represents the "system description" in the MIB.

ICS 424 Test 2019/2020


Question 1
Write short notes on the following: Internet governance, ICANN, NIRA.
Answer
a. Internet Governance: Internet governance refers to the processes and structures that guide and
control the use of the internet. It involves the development and application of shared principles,
norms, rules, decision-making procedures, and programs that shape the evolution and use of the
internet. Key aspects include policy coordination, administration of domain names, management of IP
addresses, and maintaining the global interoperability of the internet.
b. ICANN (Internet Corporation for Assigned Names and Numbers): ICANN is a nonprofit
organization responsible for coordinating the maintenance and procedures of several databases related
to the namespaces and numerical spaces of the internet. Its primary function is to ensure the stable and
secure operation of the internet's unique identifier systems, such as domain names and IP addresses.
ICANN plays a crucial role in the allocation and assignment of domain names, IP address spaces, and
protocol parameter registries.
c. NIRA (Nigeria Internet Registration Association): NIRA is the organization responsible for
managing the .ng country code top-level domain (ccTLD) in Nigeria. It oversees the registration and
maintenance of .ng domain names, ensuring that Nigerian internet users have a local digital identity.
NIRA's activities include the promotion of the .ng brand, ensuring the security and stability of the .ng
domain, and fostering the development of internet services in Nigeria.

Question 2
According to the section 106 of the 1976 Copyright Act, the act generally gives the owner of
copyright the exclusive right to do and to authorize others with certain privileges. Highlight five of
those rights others are authorize to perform
Answer
Rights Under the 1976 Copyright Act
According to Section 106 of the 1976 Copyright Act, the owner of a copyright has the exclusive rights
to:
i. Reproduction: To reproduce the copyrighted work in copies or phonorecords.
ii. Distribution: To distribute copies or phonorecords of the work to the public by sale or other transfer
of ownership, or by rental, lease, or lending.
iii. Public Performance: To perform the copyrighted work publicly, in the case of literary, musical,
dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works.
iv. Public Display: To display the copyrighted work publicly, in the case of literary, musical, dramatic,
and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the
individual images of a motion picture or other audiovisual work.
v. Derivative Works: To prepare derivative works based upon the copyrighted work.

Question 3
Some areas of Internet law remain unsettled and have raised a number of legal issues. One of which is
"Contract". Explain (i). Online transactions under English contract law (ii) Virtual Trade
Answer
Legal Issues in Internet Law
i. Online Transactions Under English Contract Law: Online transactions under English contract law
are governed by the same principles as traditional contracts. Essential elements include offer,
acceptance, consideration, and intention to create legal relations. In online contracts, the terms and
conditions must be clear, and the user must have a chance to review them before acceptance. The
Electronic Commerce (EC Directive) Regulations 2002 also play a role, requiring certain information
to be provided to consumers and stipulating how contracts can be concluded electronically.
ii. Virtual Trade: Virtual trade involves the buying and selling of virtual goods and services, often
within online games and virtual worlds. These transactions can include virtual currencies, in-game
items, and digital services. Legal issues in virtual trade include the enforcement of virtual property
rights, the applicability of real-world contract and property laws, and the regulation of virtual
economies. The lack of clear legal frameworks can lead to disputes over ownership, fraud, and the
rights of users versus platform operators.

Question 4
Define Intellectual Property.
Answer
Intellectual property (IP) refers to creations of the mind for which exclusive rights are recognized.
These rights allow the creator or owner to benefit from their invention or creation. IP includes
inventions, literary and artistic works, designs, symbols, names, and images used in commerce. The
main types of IP rights are patents, trademarks, copyrights, and trade secrets.

Question 5
What is Trademark? What kinds of trademarks can be registered?
Answer
A trademark is a sign capable of distinguishing the goods or services of one enterprise from those of
other enterprises. It can be a word, phrase, symbol, design, or a combination of these. Trademarks
help consumers identify and purchase products or services based on their unique characteristics and
quality.
Types of Registrable Trademarks:
i- Word Marks: Words or combinations of words.
ii- Design Marks: Logos, symbols, or images.
iii- Composite Marks: Combination of words and designs.
iv- Color Marks: Specific colors or combinations of colors.
v- Sound Marks: Specific sounds associated with a product or service.

Question 6
Illustrate two Intellectual Property dispute cases.
Answer
Intellectual Property Dispute Cases
Case 1: Apple Inc. vs. Samsung Electronics Co.: This was a major patent infringement case where
Apple accused Samsung of copying the design and functionality of its iPhone. The case led to a series
of lawsuits and counter-suits in several countries, resulting in various rulings and settlements. Apple
was awarded significant damages, and the case highlighted the importance of design patents in the
tech industry.

Case 2: Google LLC vs. Oracle America, Inc.: This case involved the use of Java APIs in Google's
Android operating system. Oracle claimed that Google's use of its Java APIs constituted copyright
infringement. After a lengthy legal battle, the Supreme Court ruled in favor of Google, determining
that its use of the APIs was fair use, emphasizing the balance between protecting IP rights and
fostering innovation.

Question 7
Define Antitrust. What do Antitrust Laws Prohibit?
Answer
Antitrust refers to regulations that promote competition and prevent unfair business practices that
could lead to monopolies or anti-competitive behavior. The goal of antitrust laws is to ensure a fair
and competitive market environment, benefiting consumers with better choices and prices.

Prohibitions Under Antitrust Laws:


i- Monopolization: Preventing single firms from dominating a market to the detriment of competition.
ii- Cartels and Collusion: Prohibiting agreements between competitors to fix prices, limit production,
or divide markets.
iii- Mergers and Acquisitions: Regulating mergers and acquisitions that could significantly reduce
competition.
iv- Predatory Pricing: Banning the practice of pricing goods or services below cost to drive
competitors out of the market.
v- Tying and Exclusive Dealing: Preventing companies from requiring customers to buy a second
product or service as a condition of purchasing a primary product or service.

ICS 424 Test 2019/2020


Question 1
Write short notes on the the important regulations or authorities which applies to (a)
Telecommunications sector (b) Audio-visual media distribution sector.
Answer
Important Regulations or Authorities
(a) Telecommunications Sector:
i- International Telecommunication Union (ITU): An international organization that coordinates the
shared global use of the radio spectrum, promotes international cooperation in assigning satellite
orbits, and works to improve telecommunication infrastructure in the developing world.
ii- Federal Communications Commission (FCC): A U.S. government agency responsible for
regulating interstate and international communications by radio, television, wire, satellite, and cable.
Ofcom (Office of Communications): The UK regulator for communications services, covering
television, radio, telecommunications, and postal services.
iii- Nigerian Communications Commission (NCC): The regulatory authority for the
telecommunications sector in Nigeria, responsible for creating an enabling environment for
competition among operators and ensuring the provision of qualitative and efficient
telecommunications services.

(b) Audio-visual Media Distribution Sector:


i- Federal Communications Commission (FCC): In the U.S., the FCC regulates interstate and
international communications by radio, television, wire, satellite, and cable.
Ofcom: In the UK, Ofcom also oversees the broadcast, telecom, and postal sectors, ensuring fair
competition and protecting consumers.
ii- National Film and Video Censors Board (NFVCB): In Nigeria, the NFVCB regulates the film and
video industry, ensuring that distribution of audio-visual content adheres to established guidelines.
iii- European Union Audiovisual Media Services Directive (AVMSD): This directive sets out EU-
wide coordination of national legislation on all audiovisual media, both traditional TV broadcasts and
on-demand services.

Question 2
Explain the principle of 'Fair Use'. Mention two criteria courts use in judging whether a copyright use
is "fair" or an "infringement".
Answer
The principle of fair use allows limited use of copyrighted material without acquiring permission from
the rights holders. It aims to balance the interests of copyright owners with the public's interest in the
dissemination of information.
Two Criteria Courts Use:
(a) Purpose and Character of the Use: Courts examine whether the use is of a commercial nature or
for nonprofit educational purposes. Transformative uses that add new expression or meaning and are
not mere reproductions are more likely to be considered fair use.
(b) Effect of the Use on the Market: Courts consider whether the use negatively impacts the potential
market for the original work. If the use could replace the original work and reduce its market demand,
it is less likely to be considered fair use.

Question 3
3. Some areas of Internet law remain unsettled and have raised a number of legal issues which are yet
to be fully resolved. Explain three of these areas.
Answer
Unsettled Areas in Internet Law
(a) Privacy and Data Protection: With the increasing amount of personal data being collected online,
there are ongoing debates and legal challenges regarding how this data should be protected and what
rights individuals have over their data. Regulations like GDPR in the EU have set standards, but
global consensus and enforcement remain complex.
(b) Cybersecurity: The legal framework for cybersecurity is still evolving. Issues such as the
responsibility of organizations in case of data breaches, cross-border cybercrime, and the balance
between national security and individual privacy are yet to be fully resolved.
(c) Intellectual Property Rights in the Digital Age: The ease of copying and distributing digital content
has made it difficult to enforce intellectual property rights. Issues such as the protection of digital
content, the role of internet service providers, and the liability for user-generated content are still
being debated.

Question 4
Why is Intellectual Property needed? Highlight the difference between a Design and Trademark
Answer
(a) Why Intellectual Property is Needed:
Intellectual property is needed to encourage innovation and creativity by providing creators and
inventors with exclusive rights to their works and inventions. This incentivizes investment in research
and development, promotes economic growth, and ensures that creators are rewarded for their
contributions.
(b) Difference Between Design and Trademark:
i- Design: Refers to the aesthetic aspects of a product, including its shape, pattern, and color. Design
rights protect the visual appearance of a product, not its functionality.
ii- Trademark: A sign capable of distinguishing the goods or services of one enterprise from those of
other enterprises. Trademarks protect brand identity, including words, logos, symbols, and other
identifiers used in commerce.
Question 5
Explain the concept of "offer" and "acceptace" required to form contract under the English Law.
Answer
An offer is a clear, unequivocal proposal made by one party (the offeror) to another (the offeree) with
the intention that, once accepted, it will create a binding contract. The terms of the offer must be
definite and communicated to the offeree.
Acceptance is the unequivocal agreement to the terms of the offer. It must be communicated to the
offeror and must mirror the terms of the offer without any modifications. If any conditions are
attached to the acceptance, it is considered a counter-offer rather than acceptance.

Question 6
Illustrate two Intellectual Property dispute cases.
Answer
Intellectual Property Dispute Cases
Case 1: Apple Inc. vs. Samsung Electronics Co.:
This case involved patent infringement claims where Apple accused Samsung of copying the design
and functionality of its iPhone. After multiple lawsuits across various jurisdictions, the U.S. courts
awarded Apple significant damages, emphasizing the protection of design patents.
Case 2: Google LLC vs. Oracle America, Inc.:
The dispute centered on Google's use of Java APIs in its Android operating system. Oracle claimed
that this constituted copyright infringement. The U.S. Supreme Court ultimately ruled in favor of
Google, stating that its use of the APIs was a fair use, underscoring the balance between innovation
and intellectual property rights.

7. Define Antitrust. What do Antitrust Laws Prohibit?


Answer
Antitrust refers to laws and regulations designed to promote competition and prevent unfair business
practices that can lead to monopolies or anti-competitive behavior. The primary goal is to protect
consumers and ensure a fair marketplace.

Prohibitions Under Antitrust Laws:


i- Monopolization: Preventing the formation of monopolies that can dominate and control a market.
ii- Cartels and Collusion: Prohibiting agreements between competitors to fix prices, limit production,
or divide markets.
iii- Mergers and Acquisitions: Regulating mergers and acquisitions that could reduce competition and
lead to a monopoly.
iv- Predatory Pricing: Banning the practice of setting prices low with the intent to eliminate
competitors and then raising prices once they have been driven out of the market.
v- Tying and Exclusive Dealing: Preventing companies from requiring customers to purchase
additional products or services as a condition for buying a desired product or service.

ICS 424 Examination (2019/2020)


Question 1
SECTION A
a. Explain the principle of 'Fair Use' in a copyright.
b. Distinguish between "offer" and "acceptance" required in a contract.
c. Write short notes on the objectives of the underlisted towards the development and growth of IT in
Nigeria; (i) NITDA (ii) NCC (iii) NBC.
Answer
a. The principle of 'Fair Use' allows limited use of copyrighted material without acquiring permission
from the rights holders. This principle is designed to balance the interests of creators and the public by
permitting certain uses that benefit society. Factors considered to determine fair use include:
i- Purpose and Character of the Use: Uses for criticism, comment, news reporting, teaching,
scholarship, or research may qualify as fair use, especially if they are transformative (i.e., they add
new expression or meaning).
ii- Nature of the Copyrighted Work: Uses of factual works are more likely to be considered fair than
uses of purely creative works.
iii- Amount and Substantiality of the Portion Used: Using smaller, less significant portions of the
work favors fair use, although even small parts may not be fair use if they are the "heart" of the work.
Effect on the Market: If the use negatively impacts the market for the original work or its potential
market, it is less likely to be considered fair use.

b. i- Offer: An offer is a clear proposal made by one party (the offeror) to another (the offeree) with
the intention that, upon acceptance, it will create a binding contract. The offer must be communicated,
definite, and show the offeror's intent to be bound by the terms.
ii- Acceptance: Acceptance is the unambiguous agreement to the terms of the offer. It must be
communicated to the offeror and must match the terms of the offer exactly. If any changes are made to
the terms, it becomes a counter-offer rather than acceptance.

c. (i) NITDA (National Information Technology Development Agency):


I- Develops and regulates information technology in Nigeria.
II- Implements national IT policies, fostering digital literacy and skills.
III- Promotes IT development and infrastructure, enabling economic growth and job creation.
IV- Ensures cybersecurity and data protection.
(ii) NCC (Nigerian Communications Commission):
I- Regulates the telecommunications sector in Nigeria.
II- Ensures a competitive market by licensing operators and preventing anti-competitive practices.
III- Promotes the availability and affordability of telecommunications services.
IV- Facilitates the development of modern telecom infrastructure and services.
(iii) NBC (National Broadcasting Commission):
I- Regulates and controls the broadcasting industry in Nigeria.
II- Ensures that broadcasting standards align with national values and cultural norms.
III- Promotes the growth and development of the broadcast industry through licensing and regulatory
oversight.
IV- Encourages the adoption of new broadcasting technologies.

Question 2
a. How has the enactment of Federal Competition and Consumer Protection Act (FCCPA) benefited
businesses in Nigeria? (5 marks)
b. Many areas of Internet law remain unsettled which in some instances makes it difficult to develop
clear, unambiguous statements about what constitutes lawful behavior or breaches of lawful behavior
online. Explain three of these areas.
c. Differentiate between copyright and related right.
Answer
a. The FCCPA has significantly benefited businesses in Nigeria by:
i- Promoting Fair Competition: Prevents monopolies and anti-competitive practices, ensuring a level
playing field for all businesses.
ii- Consumer Protection: Enhances consumer confidence, leading to increased patronage and loyalty.
iii- Innovation and Efficiency: Encourages businesses to innovate and improve their services to stay
competitive.
iv- Dispute Resolution: Provides mechanisms for resolving disputes between consumers and
businesses, fostering a more stable business environment.
v- Market Regulation: Establishes clear rules and regulations, reducing uncertainty and fostering a
predictable market environment.

b. Unsettled Areas in Internet Law


i- Privacy and Data Protection: With the vast amount of personal data collected online, there are
ongoing legal challenges regarding how this data should be protected and what rights individuals have
over their data.
ii- Cybersecurity: The legal framework for cybersecurity is still evolving. Issues such as responsibility
in case of data breaches, cross-border cybercrime, and the balance between national security and
individual privacy are unresolved.
iii- Intellectual Property Rights in the Digital Age: The ease of copying and distributing digital content
has made it difficult to enforce intellectual property rights. Issues include the protection of digital
content and the liability of service providers for user-generated content.

c. i- Copyright: Protects the original works of authorship such as literary, musical, and artistic works.
It grants the creator exclusive rights to reproduce, distribute, perform, and display the work.

ii- Related Right: Protects the legal rights of entities and individuals who contribute to making works
available to the public. These include performers, producers of sound recordings, and broadcasting
organizations. Related rights often provide protection similar to copyright but focus on the execution
and dissemination of works.

Question 3
a. Discuss the goals of telecommunication regulation towards the achievement of a competitive
environment.
b. Explain five challenges to the effective implementation of the Freedom of Information Act (FIA).
c. Are inventions in all fields patentable? Discuss.
Answer
a. Goals of Telecommunication Regulation Towards Competitive Environment
i- Promote Competition: Prevent monopolies and ensure fair competition among telecom providers.
ii- Protect Consumers: Ensure that consumers have access to high-quality, affordable
telecommunication services.
iii- Encourage Investment: Create a favorable environment for investment in telecommunications
infrastructure.
iv- Universal Service: Ensure that telecommunication services are accessible to all citizens, including
those in rural and underserved areas.
v- Innovation and Development: Foster technological innovation and the development of new telecom
services.

b. Five Challenges to Effective Implementation of the Freedom of Information Act (FIA)


i- Lack of Awareness: Many citizens and public officials are unaware of their rights and
responsibilities under the FIA.
ii- Resistance from Public Institutions: Some government agencies resist releasing information due to
a culture of secrecy or fear of exposing corruption.
iii- Bureaucratic Delays: Lengthy bureaucratic processes can delay the release of information,
undermining the effectiveness of the FIA.
iv- Limited Resources: Lack of funding and resources for the agencies responsible for implementing
the FIA can hinder its effectiveness.
v- Weak Enforcement: Without strong enforcement mechanisms, there is little incentive for public
institutions to comply with FIA requests.

c. Not all inventions are patentable. To be patentable, an invention must meet certain criteria:
i- Novelty: The invention must be new and not known to the public before the patent application.
ii- Inventive Step: The invention must involve an inventive step that is not obvious to someone with
knowledge and experience in the subject.
iii- Industrial Applicability: The invention must be capable of being used in some kind of industry.
iv- Non-Exclusion: Certain inventions are excluded from patentability, such as abstract ideas, natural
phenomena, and discoveries.

SECTION B
Question 4
a. Discuss how technology can be used to promote the Rule of Law and Constitutional Supremacy.
b. Explain how the exponential development of Artificial Intelligence (AI) and the associated
disruptive innovation pose substantial challenges for policy makers.
Answer
a. Technology to Promote the Rule of Law and Constitutional Supremacy
i- Digital Governance: Using online platforms to provide access to legal documents, enabling
transparency and accountability.
ii- E-Government Services: Streamlining government services through technology to reduce
corruption and improve efficiency.
iii- Online Legal Education: Providing online resources and platforms for legal education to promote
awareness and understanding of the law.
iv- Digital Evidence: Utilizing technology to collect and present digital evidence in legal proceedings,
ensuring accuracy and integrity.
v- Public Participation: Leveraging social media and other digital tools to engage the public in legal
and political processes.

b. Challenges of AI and Disruptive Innovation for Policymakers


i- Regulatory Lag: Policymaking often lags behind the rapid pace of technological innovation, leading
to outdated regulations.
ii- Ethical and Legal Issues: AI raises complex ethical and legal issues, such as bias, accountability,
and the potential for misuse.
iii- Economic Disruption: AI and automation can lead to significant economic disruption, including
job displacement and changes in industry structures.
iv- Privacy Concerns: The use of AI in data collection and analysis raises significant privacy
concerns.
v- Global Coordination: The global nature of AI development and deployment requires international
cooperation and coordination.

Question 5
a. Is Privacy a Myth? Discuss.
b. Narrate any case that involved the breach of individuals' privacy.
c. Using Moor's natural/normative privacy distinction, differentiate between a loss of privacy and
violation of privacy.
Answer
a. Privacy is increasingly viewed as a myth due to the pervasive nature of surveillance and data
collection in the digital age. Despite legal protections, the ability of governments, corporations, and
hackers to access personal information has eroded the notion of true privacy.

b. Case Involving Breach of Privacy


One notable case is Cambridge Analytica. In 2018, it was revealed that Cambridge Analytica had
harvested personal data from millions of Facebook users without their consent and used it for political
advertising. This breach of privacy led to widespread public outcry and regulatory scrutiny.

c. i- Natural Privacy: The state of being free from observation or disturbance in a natural setting,
where individuals expect to be left alone.
ii- Normative Privacy: The societal standards and expectations regarding privacy. Violation of privacy
occurs when societal norms are breached, such as unauthorized data collection, while loss of privacy
happens when natural privacy is intruded upon, such as being watched in one’s home.

Question 6
a. Explain how data mining technology affects personal privacy.
b. Describe how RFID technology threatens individual's privacy.
c. What is your opinion about data privacy protection in Nigeria?
Answer
a. Data mining involves analyzing large datasets to discover patterns and insights. While it offers
significant benefits, it can intrude on personal privacy by revealing sensitive information without
individuals' consent, leading to potential misuse of personal data.

b. RFID (Radio Frequency Identification) technology uses electromagnetic fields to identify and track
tags attached to objects. It poses privacy risks as it can be used to track individuals without their
knowledge, leading to concerns about unauthorized surveillance and data collection.

c. Opinion on Data Privacy Protection in Nigeria


Data privacy protection in Nigeria is still developing. While efforts like the Nigeria Data Protection
Regulation (NDPR) represent progress, there is a need for stronger enforcement, greater public
awareness, and continuous updating of regulations to address new privacy challenges.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy