Uploaded by adrianngwenya66

R e a d t h i s S t u d y G u i d e f i

advertisement
Rea
d
Stu this
Gui dy
de f
irst
CONCEPTS OF
MANAGEMENT
COMPUTING
Study Guide
D20059581
Edition 1
*D20059581-E1*
D20059581-E1
CONCEPTS OF MANAGEMENT COMPUTING
Study Guide
CONTENTS
PAGE
How to work through this study unit
1
Introduction
4
How to use this study guide
6
Your study schedule
8
Study Session one – introduction
11
Study Session two – computer hardware
15
Assignment 1
22
Study Session three – computer software
29
Study Session four – databases
36
Assignment 2
43
Study Session five – networks
49
Study Session six – computer security
54
Study Session seven – an introduction to the internet
59
Assignment 3
66
_____________________________________________________________________________
Concepts of Management Computing / © ICG
PRINTING HISTORY
1st
Edition March 2014
 INTERNATIONAL COLLEGES GROUP (ICG) PTY. LTD. 2014
29 Martin Hammerschlag Way, Foreshore, Cape Town, 8000, South Africa
_____________________________________________________________________________
This document contains proprietary information that is protected by copyright. All
rights are reserved. No part of this document may be photocopied, reproduced,
electronically stored or transmitted, or translated without the written permission of
ICG.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / (ii)
HOW TO WORK THROUGH THIS STUDY UNIT
The icons used in this study unit
Read through the descriptions of icons below. Look out for these icons as you work
through the study unit. They will show you at a glance where you need to work
through activities, definitions, self-assessment questions, and so on.
Icon
Description
Learning outcomes: This signals the learning outcomes of the unit. You
must be able to show competence in the outcomes after you have worked
through the study unit. Competence means that you must be able to
demonstrate that you can meet the outcome with skill and knowledge.
Definition: This signals an important definition that you should understand
and remember.
Mathematical formula: This is a formula that you will use in calculations. It
is important that you know what values to substitute into the formula.
Important statement: This signals an important point that you must grasp
before you continue with the rest of the lesson. It could also signal an
interesting snippet of information.
R
Revision: This signals work that you need to revise in order to proceed to
the next section or complete an activity, self-assessment question or
assignment.
Self-assessment questions: This signals the questions that will help you to
analyse your understanding of the theory that was covered in the lesson. We
conclude each lesson with a set of self-assessment questions.
Answers to self-assessment questions: This signals the suggested
answers to the self-assessment questions. Please do not look at the answers
before you have tried to answer the questions yourself.
Competence checklist: This signals a checklist to help you discover
whether you can meet all the assessment criteria in the lesson.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 1
The best way to study
To ensure that you get the full benefit of this study unit, we recommend that you do
the following:





Read the next section carefully, called Introduction to this Study Unit. It provides
you with the learning outcomes for each of the lessons in the study unit.
Carefully and diligently work through each lesson, keeping in mind the outcomes
that you have to achieve.
Ensure that you complete all the activities in the lessons.
Ensure that you answer all the self-assessment questions in the lessons.
Compare your answers to those provided in this study unit.
If you encounter any words that you do not understand, make a list of these,
then look up their meanings in a dictionary.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 2
Learning Objectives
On completion of this course, you should be able to do the following:


communicate meaningfully with IT professionals;

interact intelligently with the computer as an end-user; and

understand the basis on which IT decisions are made;
make an informed decision about your future studies in IT.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 3
INTRODUCTION
Welcome to your Concepts of Management Computing course.
Computers are affecting every aspect of our lives. Although our primary concern in this
course is the use of the computer in the business world, it is important to realise that
the computer has become more than just a business tool. Your understanding of the
computer in a business situation will help you realise how it can enrich your personal
life, whether you use it for education, communication or entertainment.
The rapid developments in computer technology are changing the nature of work itself.
You have the choice of being part of these exciting advances and developing marketable
skills or being left behind and becoming alienated from the possibilities.
We hope this course will excite and inspire you to develop your knowledge and skills.
After working through the course you will have an overview of the different aspects of
information technology. Within this wide range, you may decide on one aspect of
information technology to make your special interest.
Please keep in mind that this course is not meant to be a practical hands-on course
that teaches you specific skills. It is a conceptual course. This means a couple of
things:


This course will introduce you to the language of information technology. In other
words, it will help you to communicate with specialists in the field. When they
talk to you using technical language, you should have some understanding of
what they are talking about.
This course will introduce you to the theory. The theory deals with the way things
work. As an analogy, think of the motor car. You can learn to drive, which is the
practical skill in use, or learn how the car works, which is the theory. Both
theory and practice have their place.
Ideally, you should be developing practical skills along with the theory. Take every
opportunity to speak to professionals who work with computers. Talk to these
professionals about what you have learned. Get used to using the language and
vocabulary in this course. You will find that when you work practically with a
computer the experience is much more meaningful.
We would like you to succeed, so we will help you with your study responsibilities, by
assisting you all the way. Remember that you can contact the College when you have
queries or need motivation.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 4
Here are our contact details:
GETTING IN TOUCH
If you have a query, and you would like to contact your tutor – or even if you just need a bit of
encouragement – please contact us at:
Damelin Correspondence College
PO Box 31001, Braamfontein, 2017, South Africa
Phone: (021) 417 6622 or 0860 41 41 41 Fax: 0861 122 322
E-mail: dccsupport@damelin.edu.za
VISIT US ON THE INTERNET: http://www.dcc.edu.za
Make contact with fellow students following the same course and form a study group if
possible. Ask the college to provide you with the names of students in your area if you
are interested in forming a study group.
Enjoy your course!
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 5
HOW TO USE THIS STUDY GUIDE
We have compiled this study guide for you to easily understand your Concepts of
Management Computing course.
In this study guide you will find the following:





a study schedule;
study sessions;
prescribed reading;
activities; and
tests.
Study schedule
The study schedule shows you what each study session consists of, where you can find
the topics in your textbook, and which tests to send to the College.
Study sessions
You must do all the study sessions in this study guide.
At the beginning of each study session you will find the outcomes for each chapter in
your study guide. These outcomes provide areas of focus and explain what you need to
be able to do by the end of the study session.
Prescribed reading

Varley, David. Fundamental Concepts of Information Technology. 2004. Third
Edition. Future Managers.
Your textbook, Fundamental Concepts of Information Technology, covers the syllabus.
Although you are encouraged to read other books to extend your knowledge, you have
to use this book as your reference point.
Activities
The activities at the end of each study session form an integral part of the study
methodology. After you have done the activities at the end of each assignment, check
your answers against the answers provided. Do not look at the answers until you have
completed the entire activity. The answers contain additional notes on the study
material as well as important points on interpreting and understanding the questions.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 6
Assignments
After you have worked through Study Session Two, Four and Seven, we will test you on
the work you have done. Assignments in this study guide are for your own benefit and
will show you and us whether you understand the work.
Although the tests will focus on the latest work you have covered, they will also include
questions from previous sections. This will help to make you familiar with your study
material.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 7
YOUR STUDY SCHEDULE
The study schedule shows you what each assignment consists of, where you can find
the topics in your textbook, and which tests to send to the College.
STUDY
SESSIONS
ONE
CHAPTER TOPICS
INTRODUCTION





TWO








THREE







Pages 1.1 to 1.11
The information age
Information systems
Future trends in white-collar work
The future of computer systems
Pages 2.1 to 2.32
Assignment 1
Introduction
Input devices
Output devices
CPU and related components
Primary memory
Secondary memory
Connecting peripherals and
devices to a computer
Power of a computer
Classification of computers
COMPUTER SOFTWARE

SUBMIT THESE
TESTS TO THE
COLLEGE
What is a computer?
COMPUTER HARDWARE

PAGE IN
TEXTBOOK
Pages 3.1 to 3.28
The concept of a program
The classification of software
Systems software
Applications software
Word processors
Spreadsheets
Office automation
Enterprise software
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 8
STUDY
SESSIONS
FOUR
CHAPTER TOPICS
DATABASES












FIVE





SIX









Assignment 2
Database systems
Some basic database concepts
More about fields
Records and tables
Relational databases
Normalisation of databases
Other database design issues
Other types of databases
Large database systems
Personnel
Security issues
Pages 5.1 to 5.19
Introduction
Protocols
Types of networks
Servers
Network operating systems
Communications between
networks
COMPUTER SECURITY

Pages 4.1 to 4.30
SUBMIT THESE
TESTS TO THE
COLLEGE
Introduction
NETWORKS

PAGE IN
TEXTBOOK
Pages 6.1 to 6.19
Threats to computer systems
Computer viruses
Types of viruses and related
programs
Computer crime
Computer ethics
Physical dangers
Physical protection of systems
Software security
Backups
Legal issues
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 9
STUDY
SESSIONS
SEVEN
CHAPTER TOPICS
AN INTRODUCTION TO THE
INTERNET
















PAGE IN
TEXTBOOK
Page 7.1 to 7.29
SUBMIT THESE
TESTS TO THE
COLLEGE
Assignment 3
What is the Internet?
A brief history of the Internet
A TCP/IP primer
Ports and sockets
The DNS system
The World Wide Web
Internet Service Providers
Mail
Mail protocols
Browsing
Searching the web
FTP
Telnet
Newsgroups
E-commerce
Recreational use of the Internet
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 10
STUDY SESSION ONE – INTRODUCTION
Learning outcomes
When you have completed Study Session One, you should be able to do the following:



give examples of tasks a computer can carry out;
describe the components of an information system; and
explain how Information Age technology is changing the nature of
white-collar work.
Prescribed reading
Please study the following in Chapter 1 of your textbook:





What is a computer? (page 1.1)
The Information Age (page 1.2)
Information systems (page 1.3)
Future trends in white-collar work (page 1.5)
The future of computer systems (page 1.8)
How to approach each chapter
Look at the headings of the four sections mentioned above. What is the theme of
Chapter 1? What is the link between the sections?
Here is one view: we have this modern machine called a computer. The aspect of the
computer that has become extremely important in the modern world is the creation of
information. This became so important that the current period of history has become
known as the Information Age. The ability to work with and communicate vast
amounts of information is changing the nature of office work.
The concepts that are covered in each paragraph appear in the left-hand margin of the
textbook. Scan these concepts to get a feel of the details of the chapter. Some concepts
may be familiar. When you read the chapter, your brain will be aware of these words
and it will be easier to grasp the ideas.
Now read the chapter quickly. Do not worry if you do not understand everything. Next
time you return to the chapter, you will begin your detailed study.
Start with the first section and study each of the concepts in turn. Repeat the process
with each subsequent section.
Note that you have to apply this approach to each chapter in your textbook.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 11
Building your understanding of Chapter 1
Now work through the following:












Write down your own examples about things a computer can do.
Why is the computer a general purpose machine?
What is the difference between hardware and software?
What factors have contributed to the Information Age?
What is the difference between efficiency and effectiveness? Give an example of
each.
Why are information systems so useful?
Write down some examples of processing other than those listed in the book.
Give an example of capital-intensive production and labour-intensive production.
The textbook gives one example of time compression. Think of others.
Explain Toffler's idea of future shock in your own words.
List some examples of tasks that a company could outsource.
What are the problems and opportunities of the Information Age for Africa?
List of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related. The list
of concepts is as follows:


















computer
general purpose machine
program
computer system
hardware
software
end-user
information
information age
purpose of information systems
efficiency
effectiveness
data
input
processing
storage
output
gigo
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 12















debugging
decision support systems
white-collar work
skills of the information age
labour intensive
capital intensive
dot coms
B2C
enterprise software
outsourcing
B2B
the Web
time compression
future shock
the African concept
Activity 1
Answer the questions at the end of Chapter 1 of the textbook. Do not look at the answers until
you have completed the activity.
Note: Question 11 should read: 'What are logical errors in a program called?
Answers
1.
(a)
2.
(c)
3.
(d)
4.
False
5.
(c)
6.
(b)
7.
Garbage in garbage out
8.
(b)
9.
(a)
10.
(b)
11.
bugs
12.
(a)
Note: In other words, skills are only valid for a while. As new technologies emerge, new
skills need to be learned and old ones discarded.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 13
13.
dot coms
Note: The general name for business conducted over the Internet is e-commerce. When
businesses do business between themselves it is called B2B. The companies themselves
are called dot coms
14.
(c)
Note: It takes less time for things to happen. In other words, things happen more quickly.
Be careful of (a) and (b) – time itself does not change. Perhaps this question is a bit
confusing since people might speak colloquially of time running faster.
When you get a multiple-choice question, it can happen that you could justify more than
one answer. Read all options carefully and choose the option that is best.
15.
(a)
Note: Multiple-choice questions are usually made up of options that are plausible but
incorrect. These are called detractors. You need to know your work to know which is
correct.
16.
(b)
17.
(c)
Note: Make sure you read the question carefully. The word modern is very important. The
modern economy is global and companies operate across the world wherever it is most
profitable, in other words where it is possible to achieve high productivity and have low
costs.
18.
(c)
Note: Again, be careful of the wording, in particular the word not. The question implies
that three options are true and one is false. You need to determine which statement is
false.
19.
Enterprise software
20.
False
Note: The truth is the other way around. The modern trend is from labour intensive to
capital intensive.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 14
STUDY SESSION TWO – COMPUTER HARDWARE
Learning outcomes
When you have completed Study Session Two, you should be able to do the following:




identify the major hardware components of a computer and their functions;
make appropriate hardware choices, particularly with regard to monitors, printers and
disk drives;
choose appropriate units to measure different aspects of computer power and to convert
between units; and
distinguish between different types of computers and their areas of application.
Prescribed reading
Please study the following in Chapter 2 of your textbook:









Introduction (page 2.1)
Input devices (page 2.2)
Output devices (page 2.5)
The CPU and related components (page 2.9)
Primary memory (page 2.12)
Secondary memory (page 2.13)
Connecting peripherals and devices to a computer (page 2.17)
Power of computers (page 2.19)
Classification of computers (page 2.21)
Building your understanding of Chapter 2
Now work through the following:








Compare the uses of RAM and ROM.
Write down the characteristics of an ideal monitor.
Draw up a table comparing the advantages and disadvantages of dot matrix,
inkjet and laser printers.
Draw up a table showing examples of the uses of dot matrix, inkjet and laser
printers.
What do we mean by machine code? How does this relate to binary code?
Explain what a CPU does.
Compare the nature and function of primary and secondary memory.
What different methods can be used for making copies of important data? What
are the advantages and disadvantages of each?
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 15

Draw up a table giving examples of the uses of the different types of computers.
List of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related.
Carefully study these key concepts in your textbook. Once you have done this, check
that you have covered all the outcomes as set out at the beginning of this study
session. The list of concepts is as follows:






























hardware
peripherals
input device
keyboard
mouse
joystick
microphone
optical reader
bar-code reader
light-sensitive pen
scanner
output device
monitor
pixel
screen resolution
refresh rate
eye problems
stress problems
electromagnetic radiation
LED screens
active and passive screens
hard copy
printer
dot matrix printer
advantages and disadvantages of dot matrix printers
line printers
inkjet printers
advantages and disadvantages of inkjet printers
laser printers
advantages and disadvantages of laser printers
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 16







































IC
CPU
machine code
binary code
clock
MHz
types of CPU
motherboard
bus
slots
video cards
ISA cards
PCMCIA cards
AGP cards
primary memory, purpose of primary memory
bits
bytes
ASCII
uni-code
kb/Mb/Gb
RAM
volatility of RAM
booting
ROM
comparison of RAM and ROM
cache memory
secondary storage
floppy disks
hard disks
capacity of disks
hard-disk characteristics
vulnerability of data
tape streamers
CD-ROM drives
rewritable CDs
CDs as back-up devices
DVD drives
flash memory
power of computers
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 17












benchmarks
MHz
MIPS
classification of computers
personal computers
laptop and notebook computers
mini-computers
mainframes
supercomputers
firewire
Bluetooth
infrared
Do Activity 2 below and check your answers against those provided.
Activity 2
Answer the questions at the end of Chapter 2. Do not look at the answers until you have
completed the activity.
You may find a couple of questions that do not have the answers in the text of the book. This is
intentional, as the questions are also meant to extend your knowledge. Having an unanswered
question in one's mind often makes the absorption of new ideas easier.
Answers
1.
True
Note: This software is becoming more and more accurate. Speech-recognition software
enables us to give commands to computers and enter data.
2.
Dot matrix
3.
True
4.
0 and 1
5.
Machine code
Note: Be careful to distinguish between machine code and assembler code. Assembler
code is a very low level code that can easily be translated into machine code by a program
called an assembler. Although this code is difficult to understand, it is designed for
humans (not the CPU) to read.
6.
(c)
7.
False
Note: It is in fact the other way round.
8.
Compilers and interpreters
9.
(b)
10.
(b)
11.
Booting
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 18
12.
4  1 024 bytes = 4 096 bytes
13.
No, the moisture and dirt in his pocket could ruin the disk.
14.
Yes, the graphite in the pencil can corrupt the data stored on the disk.
15.
60 000
16.
Tape streamer
17.
Ink jet printer
18.
Mean time between failures
19.
ms (millisecond)
20.
(a)
21.
(c)
22.
(c)
Note: The world's most powerful computers are needed for film special effects.
23.
Laser
24.
True
25.
5 000 000
26.
(b), (d), (e)
27.
Peripherals
28.
True
29.
Pixels
30.
True
31.
72 H3
32.
Electromagnetic
33.
Active
34.
The flicker causes eye strain.
35.
(a)
36.
Optical character recognition or OCR
37.
3 5000 000
38.
Yes
39.
No, the screen would appear to flicker.
40.
The dot matrix prints one character at a time while a line printer prints an entire line at a
time.
41.
No
42.
(a)
43.
(e)
44.
64 Mb, but the minimum is constantly changing. Soon computers will have 128 Mb as an
entry standard.
45.
12 ms
46.
No, for that amount of money you could get a second-hand machine with a far better
specification.
47.
(c), (d)
48.
(a)
49.
O
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 19
50.
3 200 000
51.
(c)
52.
(e)
53.
(c)
54.
American Standard Code for Information Interchange
55.
Uni-code
56.
It can represent all the alphabets of the world.
57.
(b)
58.
Single In-line Memory Module
59.
Dual In-line Memory Module
60.
(b)
61.
False
62.
True
Note: A loudspeaker has a strong magnetic field.
63.
False
Note: It has moving parts.
64.
False
Note: It is electronic. It has no moving parts.
65.
Yes
66.
True
67.
False
Note: It is very similar.
68.
(d)
69.
(c)
Note: A DVD has a capacity of about 4 Gb.
70.
(c)
71.
(b)
72.
(c)
73.
(a)
74.
(c)
75.
(d)
76.
(c)
77.
(b)
78.
(c), (d)
79.
Read Only Memory
80.
Random Access Memory
81.
Central Processing Unit
82.
MIPS
Note: This stands for Millions of Instructions Per Second.
83.
(d)
84.
(b)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 20
85.
(a)
86.
(a)
87.
(c)
88.
(a)
89.
(a), (d)
90.
(a), (d)
91.
(b), (e)
92.
True
Note: This is because technology is changing so quickly.
93.
Supercomputer
94.
ALU
95.
MHz
96.
Input devices
97.
Back-up data
98.
Yes
99.
(c)
100. (a)
101. (a)
102. (c)
103. (c)
104. (a), (e)
105. (b), (d)
Assignment 1
Once you are familiar with the material covered in Study Sessions One and Two, you
should do Assignment 1 and send it to the College for marking. Only then carry on
with Study Session Three.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 21
ASSIGNMENT 1
_____________________________________________________________________________
Subject: Concepts of Management Computing
Assignment Code: D20059581-A Edition: 1
_____________________________________________________________________________
Time allowed: 25 min
Total marks: 30
_____________________________________________________________________________
INSTRUCTIONS
1.
Please fill in a blank Assignment Cover sheet, which you should have received with your
study material. If you have only one Assignment Cover sheet left and more assignments
to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download
the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za.
Click on General Info, then under Study Skills, click on Assignments.
2.
Please transfer the following information onto the cover of your Assignment Cover sheet:








your student number;
your name and surname;
postal address;
postal code;
telephone number;
subject name;
assignment/test code (which you will find at the top of this page); and
the total number of pages of your assignment (excluding the cover sheet).
3.
You should send this assignment to the College for marking only if it is shown in your
Study Programme under 'Assignments for Submission'.
4.
Answer the questions in your own words. Marks will be deducted if you copy directly from
your study material.
5.
You can post or e-mail your assignment answers to us.
Post:

You can post your assignment answers to Damelin Correspondence College,
PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment
answers, ensure that you have paid sufficient postage – otherwise your answers will
be returned unmarked.


Draw a margin on the right-hand side of each page for your tutor to award marks
and write comments. Also, please leave two lines open after each question for
further comments.
You can answer the questions in any order, but make sure that you staple them
together in the correct order. Handing in neat work will be to your advantage.
E-mail:

Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please
include the assignment/test code, your name and your student number in the subject
heading of your e-mail. You can download the Assignment Cover form as a Word
document from the Damelin Correspondence website: www.dcc.edu.za. Click on
General Info, then under Study Skills, click on Assignments. Remember to attach the
Word document and your assignment file to your e-mail.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 22
Additional instructions

Please indicate on your tests which edition of the study guide you are using. Certain
information and page references differ from edition to edition.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 23
Section A
1.
Which of the following is not a trend in the nature of work and commerce in the
21st century?
(a)
(b)
(c)
(d)
(e)
2.
Which of the following is an error in a computer program?
(a)
(b)
(c)
(d)
(e)
3.
Hard drive
Monitor
Joystick
Printer
DVD
What type of printer would be best for printing the accounts of a plumber? The
requirements are reliability and low cost.
(a)
(b)
(c)
(d)
(e)
6.
Highly skilled population
Protective labour legislation
Shrinking economy
Rapid population growth
Reality of AIDS
Which of the following is an input device?
(a)
(b)
(c)
(d)
(e)
5.
Gigo
Bug
Syntax
Logic
SAP
Which of the following is not true of South Africa's current situation in the
Information Age?
(a)
(b)
(c)
(d)
(e)
4.
Dot coms
Time expansion
Outsourcing
Enterprise software
B2B commerce
Inkjet
Line printer
Dot matrix
Laser
Plotter
What refresh rate is the minimum for the flicker on a monitor to be unnoticeable?
(a)
(b)
(c)
(d)
(e)
52
62
72
82
92
Hz
Hz
Hz
Hz
Hz
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 24
7.
What type of printer would you recommend that a graphic artist purchase?
(a)
(b)
(c)
(d)
(e)
8.
Which of the following is an output device?
(a)
(b)
(c)
(d)
(e)
9.
Ruggedness
High cost
Uses ink
High-quality output
Can print a wide range of graphics
Which of the following is true of a laser printer?
(a)
(b)
(c)
(d)
(e)
12.
Resolutions
Pixels
Pixies
Spots
LEDs
Which of the following is a characteristic of a dot matrix printer?
(a)
(b)
(c)
(d)
(e)
11.
Monitor
Keyboard
DVD
OCR
RAM
What are the small dots of light on a computer monitor called?
(a)
(b)
(c)
(d)
(e)
10.
Inkjet
Line printer
Dot matrix
Laser
Plotter
Noisy
Toner cartridge uses a type of powder
Cheap to run
Limited set of type faces
Not very good when it comes to printing graphics
How many kHz in 3,56 GHz?
(a)
(b)
(c)
(d)
(e)
356
3 560
35 600
356 000
3 560 000
13.
The clock speed of the CPU is usually measured in:
14.
(a)
kHz
(b) MHz
(c)
MIPS
(d) bps
(e)
bin
1s and 0s are called:
(a)
(b)
(c)
(d)
bits
bytes
ASCII
Uni-code
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 25
(e)
15.
Which of the following is volatile?
(a)
(b)
(c)
(d)
(e)
16.
Specifications
Benchmarks
Guidelines
Monitors
Limits
Which type of memory is most closely associated with the operation of the CPU?
(a)
(b)
(c)
(d)
(e)
20.
Floppy disk
Rewritable CD
Tape
ROM
Removable hard drive
Standards for comparing computers are called:
(a)
(b)
(c)
(d)
(e)
19.
s
ms
s
ns
ps
Which of the following cannot be used for backing up data?
(a)
(b)
(c)
(d)
(e)
18.
DVD
ROM
Hard drive
RAM
CD
The access time of modern hard drives is measured in:
(a)
(b)
(c)
(d)
(e)
17.
RAM
Cache
RAM
ROM
Flash
CMOS
Select the missing word:
Modern CPUs contain _____ of components.
(a)
(b)
(c)
(d)
(e)
21.
tens
thousands
hundreds of thousands
millions
trillions
What type of device would you use to input a graphic image into your computer?
(a)
(b)
(c)
(d)
(e)
Optical reader
Scanner
Monitor
Plotter
Mouse
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 26
22.
Electromagnetic radiation from a monitor could be a problem for:
(a)
(b)
(c)
(d)
(e)
23.
The main circuit board on a computer is called the:
(a)
(b)
(c)
(d)
(e)
24.
Adding
Sorting
Printing
Averaging
Selecting
Which of the following is an example of outsourcing?
(a)
(b)
(c)
(e)
(e)
29.
office automation software
enterprise software
applications software
decision support software
an information system
Which of the following is not an example of processing?
(a)
(b)
(c)
(d)
(e)
28.
ISA
AGP
PCMCIA
ASCII
Serial
Software that links all aspects of a company's operation is called:
(a)
(b)
(c)
(d)
(d)
27.
Alternate Standard Code for Information Interchange
American Standard Code for Information Interchange
African Standard Code for Information Interchange
American Standard Caller Information Intermix
American Standard Code for International Interchanges
Cards that plug into a notebook computer are called:
(a)
(b)
(c)
(d)
(e)
26.
motherboard
fatherboard
bus
IC
slotboard
ASCII is an abbreviation for:
(a)
(b)
(c)
(d)
(e)
25.
sufferers from arthritis
pregnant women
older workers
young workers
people who also use cell phones
Employing a new secretary
Getting a company in to clean your windows
Discarding unwanted files
Firing a company director
Hiring a large number of new staff
Strategic decisions are:
(a)
(b)
(c)
long-term decisions
tactical decisions
day-to-day decisions
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 27
(d)
(e)
30.
short-term decisions
decisions made on the basis of what has happened in the past
Someone who is efficient:
(a)
(b)
(c)
(d)
(e)
works quickly and always does the correct things.
works quickly but may sometimes do the wrong things.
always does the correct things but may sometimes work slowly.
works quickly but always does the wrong things.
None of the above statements is true of an efficient person.
TOTAL: [30]
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 28
STUDY SESSION THREE – COMPUTER SOFTWARE
Learning outcomes
When you have completed Study Session Three, you should be able to do the following:





explain the concept of a computer program;
distinguish between systems software and applications software;
list the tasks carried out by the operating system;
choose the appropriate type of software for a specific task; and
identify the features of different types of programming languages.
Prescribed reading
Please study the following in Chapter 3 of your textbook:








The concept of a program (page 3.1)
Classification of software (page 3.4)
Systems software (page 3.4)
Applications software (page 3.11)
Word processors (page 3.12)
Spreadsheets (page 3.15)
Office automation (page 3.18)
Enterprise software (page 3.19)
Building your understanding of Chapter 3
Now work through the following:










Using the example on page 3.1 as a guide, write a sequence of instructions (a
program) that explains in detail how to perform an everyday task.
Write a paragraph to explain what an operating system does.
Describe the main differences between high and low level languages.
List the main features of high level languages.
What is the difference between a 3GL and a 5GL?
How do compilers and interpreters differ?
Give six examples of applications programs.
In what ways is a word processor superior to a typewriter for creating
documents?
Explain the concept of merging.
What features of a spreadsheet make it particularly useful for an accountant?
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 29

What is the difference between office automation software and enterprise
software?
List of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related. The list
of concepts is as follows:
































computer program
logical errors
syntactical errors
stored program concept
machine code
applications software
systems software
operating systems
utilities
booting
control of hardware (video, disk drives)
MS-DOS
Windows 95/98/Millennium
Windows NT / 2000
Unix
Linux
text-based operating systems
GUI
programming languages
high level languages
low level languages
features of high level languages
language generations (1GL, 2GL, 3GL, 4GL, 5GL)
compiler
interpreter
word processor
merge
merge document
data source
common word processors (MS Word, WordPerfect, Amipro)
spreadsheet
automatic recalculation
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 30











what if?
common spreadsheets (MS Excel, Lotus, QuattroPro)
decision support systems
operational, tactical and strategic decisions
office automation
artificial intelligence
paperless office
efficiency
effectiveness
integrated office applications
enterprise software
Activity 3
Answer the questions at the end of Chapter 3. Do not look at the answers until you have
completed the activity.
Answers
1.
(c)
2.
(a)
3.
(b)
4.
(a)
5.
(c), (d)
6.
(c), (d)
7.
(b), (c)
8.
(c), (d)
9.
False
10.
True
11.
True
12.
False
Note: It is actually the other way round.
13.
Utilities
14.
Stored program concept
15.
Expert system
Note: This is not covered in the text. An expert system uses what is called artificial
intelligence to assist in providing answers to questions that can not be phrased very
concisely. Expert systems attempt to simulate human intuition.
16.
(d)
17.
(b)
18.
(d)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 31
19.
(a)
Note: This is not covered in the text. The statement is more or less a definition of a JCL.
20.
(c)
21.
(b)
22.
(b)
23.
(b), (d)
24.
(a), (e)
Note: This is new information. An assembler command could look something like this:
ADD X
ADD is the opcode or instruction and X is the operand. The operand is the data the
opcode uses.
25.
(e), (e)
26.
(b), (d)
27.
True
28.
False
29.
True
30.
False
Note: The unit point measures the height of the font.
31.
End-user
32.
Installation
33.
Font
34.
John von Neumann
35.
True
36.
True
37.
False
38.
True
39.
(a), (c)
40.
True
41.
False
42.
False
43.
True
44.
True
45.
(a)
46.
True
47.
Formatting
Note: A new disk must be prepared before use. This involves a two-stage process: (a)
partitioning; and (b) formatting.
48.
Presentation package
49.
Database
50.
(a)
In an integrated package, the data can be easily exchanged between the
applications.
(b)
In an integrated package, each of the applications will have a similar interface.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 32
51.
52.
(a)
word processor;
(b)
spreadsheet;
(c)
presentation package; and
(d)
database.
High level language.
Note: Low level languages are extremely difficult to learn.
53.
A GUI uses icons (symbols) to represent its functions. In the case of a text base system
you have to type out the command. This means you have more to remember.
54.
Graphical User Interface
55.
No
Note: Windows 2000 has very demanding hardware requirements. It will only run on very
modern computers. The 486 is now obsolete and by today's standards, crude, even
though in its day (only a few years ago) it was state of the art.
Also keep in mind that Windows 2000 is a completely different operating system to
Windows 95/98. Their GUIs are very similar though.
56.
Yes
Note: Although Linux is a very powerful operating system it has far more modest hardware
requirements than Windows 2000.
57.
Spreadsheet
58.
False
59.
Operating system
60.
False
61.
False
Note: Although it may not sound it, low level languages are actually the most powerful,
since anything that can be done by a high level language has to be ultimately translated
into a low level language.
62.
True
Note: High level languages are designed for human use.
63.
True
64.
False
Note: The statement describes how an interpreter functions.
65.
True
Note: You would, however, require enormous dedication and patience to do so.
66.
Formatting
67.
False
68.
(a)
69.
(c)
70.
(e)
71.
(c)
72.
(c)
Note: This is because operating systems do not usually contain anti-virus software.
Additional functionality is supplied by utilities.
73.
(b)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 33
74.
bug
Note: In the very early days of computers (1940s), a computer was found to be
malfunctioning. The problem was eventually traced to an insect that had got into the
electronics.
75.
mouse
76.
Compiler
Note: Although it is more trouble to compile a program, the benefit is that the program
runs faster. If you are going to use a program repeatedly, it is worth the initial effort to
compile it.
77.
(d)
78.
(b)
Note: The statement explains the relation between Linux and Unix.
79.
(a)
80.
(d)
81.
(a)
82.
(c)
83.
(d)
Note: Although you could use a word processor, a DTP (Desk Top Publishing) package is
designed for producing things like newspapers, newsletters and magazines.
84.
False
Note: You have to be able to distinguish between efficiency and effectiveness.
85.
False
86.
(b)
87.
(a)
88.
Decision support systems
89.
Enterprise software
90.
Data recovery
Note: Hard drives are electromechanical devices and can therefore fail. Users often fail to
realise this. When the drive fails, users loose their data. There are special data-recovery
programs that can attempt to recover the data, but they are not always successful. It is
also an expensive process.
91.
False
92.
(b)
Note: Strictly speaking, C++ could also be used, but it is not specifically designed for
scientific problems. It is a general-purpose language because it can be used for a variety
of purposes.
93.
(a), (d)
Note: Both are correct.
94.
(e)
Note: This is one of the reasons Java was developed.
95.
(d)
Note: Visual Basic is a general-purpose language. It is quite easy to start with, but can
become very involved and complex if you delve deeply into it.
96.
True
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 34
97.
False
Note: You have to be very logical in your thinking to program.
98.
False
99.
False
100. False
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 35
STUDY SESSION FOUR – DATABASES
Learning outcomes
When you have completed Study Session Four, you should be able to do the following:












distinguish between data and information;
describe the functions databases can perform;
explain the difference between fields, records, tables and databases;
choose appropriate field types for data;
distinguish between the different record access methods;
describe the structure of a relational database;
determine when different types of relations are used;
explain the purpose of normalisation;
explain database design issues and how they are dealt with;
identify other types of databases (flat, hierarchical and network);
describe the structure of large database systems; and
distinguish between the tasks carried out by database professionals.
Prescribed reading
Please study the following in Chapter 4 of your textbook:












Introduction (page 4.2)
Database systems (page 4.3)
Some database concepts (page 4.4)
More about fields (page 4.5)
Records and tables (page 4.6)
Relational databases (page 4.10)
Normalisation of databases (page 4.12)
Other database design issues (page 4.13)
Other types of databases (page 4.14)
Large database systems (page 4.16)
Personnel (page 4.18)
Security issues (page 4.19)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 36
Building your understanding of Chapter 4
Now work through the following:










List as many processes as you can think of that convert data into information
(one example would be selecting).
Describe very briefly the essential differences between fields, records, tables and
databases.
Consider each of the field types listed in the textbook. Write down a few examples
of the type of data that would be stored using each of the field types. (For
example, in a currency-type field you could store salary data.)
What is the difference between a range constraint and a format constraint?
On page 4.10 of the textbook there is a diagram illustrating a relational database.
Construct a similar diagram using a different example.
Explain in a couple of sentences why we normalise databases.
On page 4.15 there is a diagram illustrating a hierarchical database. Construct a
similar diagram, using a different example.
List the components of a large database system and describe each of them in a
single sentence.
List the professionals that would work on database systems. In a single sentence,
describe what each of them does.
What are the problems associated with database systems and how are they
solved?
List of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related. The list
of concepts is as follows:















database
data
information
reports, report writers
tables
records
fields
files
field types
range constraints
record structure
record access methods
sequential access
random access
indexed sequential access
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 37





































relational databases
relations
one-to-one
one-to-many
many-to-one
many-to-many
normalisation
redundancy
integrity
verification
integrity constraints
format constraints
unique keys
foreign keys
flat databases
hierarchical databases
network model
DBMS
data dictionary
DDL
DML
SQL
security software
archiving software
DBA
systems analyst
programmer
operator
end-users
access control
authorisation
passwords
access rights
user views
audit trails
encryption
encryption algorithms and keys
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 38
Activity 4
Answer the questions at the end of Chapter 4. Do not look at the answers until you have
completed the activity.
Note: Question 4 should read: 'Field is to column as table is to _____'
As with the previous activities, you may come across some questions to which you cannot find
the answers in the text. The questions and answers are sometimes used to extend your
knowledge.
Answers
1.
True
2.
(b)
3.
Record
4.
Database
5.
Boolean
Note: The first letter of Boolean should always be in upper case (a capital letter).
6.
(c)
Note: A bit of background first. Numeric data is sub-divided into a number of categories,
two of which are integer and floating point. Integers are basically whole numbers, while
floating point numbers have a fractional part. The computer does arithmetic with these two
types of data in very different ways.
This is quite a tricky question. Although 7. and 7.0 look like integers (whole numbers),
because of the decimal points the computer works with them like floating point numbers
and not integers.
7.
Floating point
Note: See the previous explanation.
8.
False
9.
False
Note: It is data that is converted into information, not the other way around.
10.
(b)
11.
(a)
Note: The technical use of the word is rather different to its everyday use. This is common
with computer terminology and can be quite confusing if you are trying to guess meanings.
12.
(c)
13.
(b), (c)
Note: Be careful with (e). Data, not information, is stored in records.
14.
(b), (c)
Note: The word string is often used interchangeably with the word text in describing field
types.
15.
(b), (c)
16.
(a), (d)
17.
(d), (e)
Note: The others are physical security methods.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 39
18.
(a), (e)
19.
(b), (d)
20.
True
21.
False
22.
True
23.
True
24.
False
Note: It is an abbreviation for Information Technology.
25.
True
26.
True
27.
Data dictionary
28.
DBA or database administrator
29.
Encryption
30.
Fields
31.
Foreign
Note: The link is between the unique key in the first table and the foreign key in the
second table.
32.
Range constraint
33.
(d)
34.
(a)
35.
(c), (d)
36.
(c), (e)
37.
(a), (b)
Note: The others are examples of the type of data you would store in a field.
38.
(c), (e)
39.
(a), (e)
Note: Sometimes the best way to answer a question such as this is to eliminate the
options that are clearly wrong.
40.
False
Note: The opposite is true.
41.
False
42.
True
43.
False
Note: It is an abbreviation for 'information system'.
44.
True
45.
True
46.
False
Note: It links different tables.
47.
False
48.
True
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 40
49.
Database Management System
Note: Many people use the abbreviation 'db' to refer to a database.
50.
Relation
51.
Integrity
52.
Unique key
53.
Format constraint
54.
Encryption
55.
False
56.
(c)
Note: Be careful. Because there are many orders for each customer the relation from
order to customer is many-to-one. If we had said from customer to order, it would be oneto-many. Be sure you understand the difference.
57.
True
58.
(a)
59.
Audit trail
60.
Access control, user views
Note: These two phrases mean virtually the same thing.
61.
SQL
62.
(b)
63.
(d)
64.
Hard copy
65.
Report writer
66.
(b)
Note: This is the way date arithmetic is performed. Also if you subtract one date from
another, the system will give you the number of days between the dates.
67.
(a)
Note: Be careful. Many might answer (b) but you would only use numeric fields when you
intend to do arithmetic on the contents. Since you never use a telephone number in
calculations, always store it in a text field.
68.
Range constraint
69.
Format
Note: You might require that the first letter is upper case (a capital letter).
70.
3 670
71.
0
72.
Indexed sequential access method
73.
True
74.
(b)
75.
(b)
76.
Redundancy
77.
(a), (d)
78.
Conforms
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 41
79.
(c)
Note: This actually violates the principles of integrity.
80.
(d)
81.
(a)
82.
(c)
83.
(a)
84.
(a)
85.
True
86.
True
87.
DBA or database administrator
88.
(c)
89.
(b)
90.
(d)
Note: The best password is the one that is the hardest to guess. One way of doing so is to
mix upper- and lower-case letters, as well as numbers.
91.
True
92.
(a)
93.
False
Note: You need both user ID and password to be valid and to match each other. In other
words, a different password is associated with each user ID.
94.
False
Note: There are more threats to a system than hackers. There are, for example, physical
threats.
95.
(a)
96.
(c)
97.
(e)
98.
Access
99.
Access
100. SQL
Assignment 2
Once you are familiar with the material covered in Study Session One to Four, you
should do Assignment 2 and send it to the College for marking. Only then carry on
with Study Session Five.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 42
ASSIGNMENT 2
_____________________________________________________________________________
Subject: Concepts of Management Computing
Assignment Code: D20059581-B Edition: 1
_____________________________________________________________________________
Time allowed: 1½ hours
Total marks: 100
_____________________________________________________________________________
1.
Please fill in a blank Assignment Cover sheet, which you should have received with your
study material. If you have only one Assignment Cover sheet left and more assignments
to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download
the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za.
Click on General Info, then under Study Skills, click on Assignments.
2.
Please transfer the following information onto the cover of your Assignment Cover sheet:








your student number;
your name and surname;
postal address;
postal code;
telephone number;
subject name;
assignment/test code (which you will find at the top of this page); and
the total number of pages of your assignment (excluding the cover sheet).
3.
You should send this assignment to the College for marking only if it is shown in your
Study Programme under 'Assignments for Submission'.
4.
Answer the questions in your own words. Marks will be deducted if you copy directly from
your study material.
5.
You can post or e-mail your assignment answers to us.
Post:

You can post your assignment answers to Damelin Correspondence College,
PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment
answers, ensure that you have paid sufficient postage – otherwise your answers will
be returned unmarked.


Draw a margin on the right-hand side of each page for your tutor to award marks
and write comments. Also, please leave two lines open after each question for
further comments.
You can answer the questions in any order, but make sure that you staple them
together in the correct order. Handing in neat work will be to your advantage.
E-mail:

Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please
include the assignment/test code, your name and your student number in the subject
heading of your e-mail. You can download the Assignment Cover form as a Word
document from the Damelin Correspondence website: www.dcc.edu.za. Click on
General Info, then under Study Skills, click on Assignments. Remember to attach the
Word document and your assignment file to your e-mail.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 43
Additional instructions

Please indicate on your tests which edition of the study guide you are using. Certain
information and page references differ from edition to edition.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 44
Section A
1. _____________________________________________________ Write down the missing word:
If a row is a record then a column is a _____.
2.
What process is used to create an optimal structure for a relational database?
3.
Select two statements that are true of a laser printer:
(a)
(b)
(c)
(d)
(e)
4.
Which two of the following are examples of systems software?
(a)
(b)
(c)
(d)
5.
Word processors
Operating systems
Spreadsheets
Utilities
Which of the following programming languages is most suitable for commercial
applications?
(a)
(b)
(c)
(d)
6.
A laser printer cartridge contains ink.
A laser printer provides very cheap hard copy.
A laser printer is the best choice for printing graphics.
Laser printers are quiet.
Laser printers can only print a limited number of fonts.
COBOL
FORTRAN
Assembler
C++
True or false?
A DBA and a systems analyst do the same work.
7.
True or false?
Sequential access is faster than random access.
8.
True or false?
SQL is an example of a DML.
9.
What type of constraint is used to check that data conforms to certain rules after
it has been updated or changed?
10.
Which of the following tracks changes and makes changes to data?
(a)
(b)
(c)
(d)
Audit trails
Encryptions
User views
Access rights
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 45
11.
Which of the following field types would be most suitable for storing serial
numbers of equipment?
(a)
(b)
(c)
(d)
(e)
12.
Numeric
Text
Boolean
Currency
Date
Write down the missing word:
A database is a collection of _____.
13.
B2B refers to:
(a)
(b)
(c)
(d)
14.
Which two of the following are low level languages?
(a)
(b)
(c)
(d)
(e)
15.
back-to-back printing
transactions between businesses using the Internet
a type of CPU
a software package
C++
Assembler
5GL
Machine code
COBOL
Which of the following translates source code line by line during execution?
(a)
(b)
(c)
(e)
Compiler
Interpreter
C++
5GL
16.
What is the psychological stress caused by rapid technological change often
called?
17.
Write down two benefits to a company of outsourcing?
18.
Which two of the following are not output devices?
(a)
(b)
(c)
(d)
(e)
Printer
Monitor
Mouse
Joystick
Loudspeaker
19.
How many MHz in 3,7 GHz?
20.
What are the standardised tests called that measure the performance of a
computer under specific circumstances?
21.
What part of the motherboard carries the signals between the CPU, RAM and
video cards?
22.
Which of the following is not an example of secondary memory?
(a)
(b)
(c)
Hard drive
Floppy drive
DVD
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 46
(d)
RAM
23.
Give an example of the use of ROM.
24.
How many kb in 128 Mb?
25.
True or false?
Uni-code allows for the representation of many more different alphabets than
does ASCII.
26.
What unit of time is commonly used to measure the access time of a hard drive?
27.
Give two examples of types of application software. (Do not give trade names.)
28.
Give any two examples of tasks or functions carried out by the operating system.
29.
What is a GUI?
30.
Give two examples of how a high level language differs from a low level language.
31.
In order to perform a merge with a word processor, you first need to produce two
documents, each of which has a different function. What are these two
documents?
32.
Referring to Question 31, write down in a single sentence the function of each
document.
33.
Which of the following statements is not true of a spreadsheet.
(a)
(b)
(c)
(d)
34.
Oracle is an example of a spreadsheet package.
Spreadsheets enable users to carry out 'what if?' calculations.
A spreadsheet is a type of decision support system.
'Automatic recalculation' is a feature of spreadsheets.
What type of decisions do middle managers usually carry out?
(a)
(b)
(c)
(d)
Operational
Tactical
Strategic
Everyday
35.
36.
Give the trade names of any two well-known database systems.
What is the correct word that is used to describe the formatted output from a
database system?
37.
Describe in a single sentence why we normalise relational databases.
38.
Redundancy refers to:
(a)
(b)
(c)
(d)
39.
unwanted data
duplicate data
missing data
incorrect data
The relational database represents one model. Write down any other two
database models.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 47
40.
Suppose we require telephone numbers to be entered in the form (999)
999999999 where '9' stands for any digit. This is an example of:
(a)
(b)
(c)
(d)
41.
an integrity constraint
a format constraint
a unique key
verification
True or false?
SQL is an example of a DDL.
42.
Write down any two advantages that using a data dictionary brings to a database
system.
43.
Which of the following professionals is responsible for the overall design of a
system?
(a)
(b)
(c)
(d)
DBA
Programmer
Systems analyst
Operator
44.
You are required to produce a small database in a short space of time. It is
unlikely to be developed beyond its initial requirements. What model would you
use?
45.
Encryption algorithms make use of long sequences of characters to scramble
data. What are these sequences of characters called?
46.
What is COBOL an abbreviation for?
47.
Write down any two examples of office automation in practice.
48.
Which of the following is not a goal of office automation?
49.
(a)
Well-ordered filing cabinets
(b) Efficiency
(c)
Effectiveness
(d) Integration of activities
Which of the following is a highly technical general-purpose language that makes
more use of symbols than words?
(a)
(b)
(c)
(d)
50.
COBOL
BASIC
FORTRAN
C++
Which of the following is associated with Assembler?
(a)
(b)
(c)
(d)
(e)
1GL
2GL
3GL
4GL
5GL
[50 × 2 = 100]
TOTAL: [100]
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 48
STUDY SESSION FIVE – NETWORKS
Learning outcomes
When you have completed Study Session Five, you should be able to do the following:







explain the advantages of linking computers on a network;
distinguish between the different transmission media;
explain the concept of a protocol;
identify different types of network;
describe each of the different types of network server;
describe the purpose and function of a network operating system; and
determine the network and computer numbers if you are given the IP address.
Prescribed reading
Please study the following in Chapter 5 of your textbook:






Introduction (page 5.1)
Protocols (page 5.6)
Types of networks (page 5.7)
Servers (page 5.9)
Network operating systems (page 5.10)
Communications between networks (page 5.11)
Building your understanding of Chapter 5
Work out your own answers to the following questions.







Compare fibre optic to copper as a channel medium.
Contrast analogue and digital signals.
Describe how a signal is transmitted from one computer to another over a
telephone line. (Use the concepts of digital and analogue signals.)
Explain what is meant by a protocol.
Draw up a table showing the different types of network server and the tasks that
each performs.
Describe the function of a network operating system.
Explain how IP addressing works.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 49
List of key concepts
Make sure that you can describe each of the following concepts in a single sentence.
You can do this in your mind or write each explanation down. Once you have described
these concepts, explain how they are related. The list of concepts is as follows:



































computer network
sharing of resources
source
destination
channel
channel medium
copper wire
co-ax
twisted pair
fibre optic
microwave
radio
infra-red
analogue
digital
modem
telephone links
ISDN
Diginet
ADSL
data transfer rate
T1 and T3 lines
bandwidth
protocol
IPX/SPX
NetBUI
TCP/IP
LAN
MAN
WAN
Internet
topology
bus
star
server
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 50
























workstation
file server
print server
communication server
application server
SQL server
client-server network
peer-to-peer network
NOS
Windows
Novell
Unix
Linux
hybrid networks
IP address
network number
computer number
subnet mask
IP packets
IP packet headers
broadcasts
routing
routers
firewalls
Activity 5
Answer the questions at the end of Chapter 5. Do not look at the answers until you have
completed the activity.
As with the previous activities, you may come across some questions to which you cannot find
the answers in the text. The questions and answers are sometimes used to extend your
knowledge.
Answers
1.
Modulation
2.
Demodulation
3.
Modem
4.
(b)
5.
Analogue – the quality of the signal does not deteriorate as it does in the case of digital.
6.
(a)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 51
7.
(a)
Note: NetBUI is ideal for small networks as it is very simple to set up. Unfortunately, the
way it functions does not make it suitable for large networks. Technically, we say that it
'does not scale well'.
8.
(c)
Note: Novell uses IPX/SPX, small Windows networks use NetBUI while large Windows
networks, as well as Unix and Linux, use TCP/IP.
9.
(b)
Note: Although a bus network is easy to set up it is not very robust. If one part fails, the
entire network could fail since all computers share a common communication cable. Star
topologies isolate the different computers from each other since each has its own cable.
10.
(a), (c)
11.
(b), (d)
12.
(c)
13.
False
14.
Bandwidth
15.
(c)
16.
(c)
17.
Protocol
18.
(e)
19.
False
20.
False
21.
True
22.
False
23.
True
24.
(a)
25.
True
26.
212
27.
156.27.58
28.
212.255.255.255
Note: If you replace the computer number of the IP address you get the broadcast
address of the network.
29.
Network Operating System
30.
Hybrid
31.
Peer-to-peer
32.
(b)
33.
All computers on the same network.
34.
True
35.
The quality of the signal deteriorates over distance.
36.
It has more than two levels.
37.
207.193.15
38.
189
39.
207.193.15.255
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 52
40.
Client-server
41.
Store data (or files)
42.
(c)
43.
The cost of such a line would be out of the reach of most small companies.
44.
Router
45.
Topology
46.
Microwave
Note: Microwave is used to connect installations where an ordinary cable would be
difficult to install. Microwave would provide a much faster connection than a telephone.
47.
False
48.
True
Note: The important word here is 'directly'. It is possible to connect to the Internet
indirectly through another computer. There are various ways that this can be done.
Technically, these computers are gateways or proxy servers.
49.
(a), (e)
50.
False
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 53
STUDY SESSION SIX – COMPUTER SECURITY
Learning outcomes
When you have completed Study Session Six, you should be able to do the following:








explain the nature and actions of computer viruses;
take adequate precautions to protect a computer system against viruses;
describe the different types of computer crime, their consequences and steps that can be
taken to protect systems against crime;
distinguish between criminal and ethical issues relating to the misuse of software and
data;
identify common physical threats to computer installations and list the precautions that
need to be taken to physically protect systems;
explain common power problems and how a UPS can reduce the dangers they pose;
explain the nature of back-ups and specify a back-up schedule; and
explain legal issues relating to communication and data.
Prescribed reading
Please study the following in Chapter 6 of your textbook:









Threats to computer systems (page 6.2)
Computer viruses (page 6.2)
Types of viruses and related programs (page 6.4)
Computer crime (page 6.5)
Computer ethics (page 6.9)
Physical dangers (page 6.10)
Physical protection of systems (page 6.11)
Software security (page 6.12)
Back-ups (page 6.12)
Building your understanding of Chapter 6
Now work through the following:





Explain what computer viruses are and the problems they present to users.
What steps can you take to protect your computer system against computer
viruses?
Compare the nature and action of different kinds of viruses.
What is software piracy and why is it damaging to the software industry?
Compare the different types of computer crime.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 54




What is hacking and how do hackers access systems?
How can data be misused?
Describe the different software methods through which data can be protected?
Give an example of a back-up schedule.
Summary of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related. The list
of concepts is as follows:



























threats to computers
computer virus
actions of computer viruses
spreading viruses
avoiding viruses
anti-virus software
virus signatures
action of anti-virus software
memory resident anti-virus programs
updating anti-virus software
repair, quarantine or delete files
legal issues
macro viruses
worms
time bombs
logic bombs
Trojan horses
computer crime: theft
computer crime: piracy, licensing, consequences of piracy
computer crime: fraud, data diddling, salami slicing, CNP transaction fraud
computer crime: hacking, handshaking, password crackers, brute force password
crackers, sniffer programs, Internet underworld, motives for hacking
computer crime: data theft
computer ethics: misuse of data
physical dangers: natural disasters, physical security, duplication of facilities
physical dangers: criminal and political activity, security measures
physical dangers: system problems, component failure, power supply problems,
blackouts, brownouts, surges, UPS, smart UPS
physical protection of systems
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 55



software security: limited access, passwords, guidelines for password usage, user
rights
tape back-ups
CD-writers
Activity 6
Answer the questions at the end of Chapter 6. Do not look at the answers until you have
completed the activity.
Answers
1.
(d)
2.
False
3.
(d)
4.
True
5.
False
6.
(b)
7.
False
Note: No anti-virus software can guarantee to offer 100% all the time. Other protective
measures still need to be taken.
8.
(c)
9.
(d)
10.
(a)
11.
(Software) piracy
12.
No
Note: Normally when you buy a program you are purchasing a license to install it on one
machine only. The exception is if you buy a number of licenses at the time of purchase.
13.
A license to use the software
Note: This might seem quite strange. The actual program is the developer's intellectual
property. Part of the license agreement usually incorporates a clause prohibiting
modification of the program.
14.
(a)
15.
(b)
16.
(c)
17.
Handshaking
18.
(a)
Note: Be careful of sites whose names end in a z – they often contain illegal or unethical
material. Any of the options could be true, but the first is the most general.
19.
Sniffer program
20.
Password cracker
21.
(a)
Note: Some people would argue that (c) is true since passing on any information about
people is unethical. If the company had wanted the buying habits as well, then the
answer would definitely be (c).
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 56
22.
Create a duplicate installation
Note: In the case of critically important computer systems, they are often duplicated in
places quite far apart. If one system fails, the other can take over. The situation is
complex since if a change is made to data it must be made to both systems. We say that
the two systems need to be 'synchronised'.
23.
(d)
24.
(a)
25.
(c)
26.
Logic bomb
27.
True
Note: These are a major factor in the spread of viruses.
28.
Time bomb
29.
(a)
Note: Simply because it is easy to steal the entire system.
30.
(a), (b)
Note: Be careful as (d) might appear true, but the consequences of piracy will ultimately
be bad.
31.
(b)
32.
True
33.
False
34.
No. The virus signatures would be out of date. Virus signatures need to be updated at
least every week.
35.
True
Note: Although it is rare, there are some viruses that can actually damage by causing
hardware to overwork.
36.
(d)
Note: A meaningless collection of upper- and lower-case letters and digits is the best.
37.
(b)
38.
Macro viruses
39.
Card Not Present
40.
Blackmail; gain competitive advantage over other businesses.
41.
UPS (Uninterruptible Power Supply)
42.
Smart or intelligent UPS
43.
Use high-quality components; make back-ups of data; and have duplicate hardware
system.
44.
(c)
45.
Air-conditioner
46.
(a)
47.
(d)
48.
(c)
Note: Back-ups should be kept off-site.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 57
49.
(b)
Note: CDs are reliable, but they have quite limited capacity measured against the needs
of businesses.
50.
(c)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 58
STUDY SESSION SEVEN – AN INTRODUCTION TO THE INTERNET
Learning outcomes
When you have completed Study Session Seven, you should be able to do the following:



outline the development of the Internet;
describe key theoretical concepts relating to the Internet; and
distinguish between the different services that are provided by the Internet.
Prescribed reading
Please study the following in Chapter 7 of your textbook.














What is the Internet? (page 7.1)
A brief history of the Internet (page 7.3)
A TCP/IP Primer (page 7.5)
(omit the section on Ports and Sockets)
The DNS system (page 7.10)
The World Wide Web (page 7.11)
Internet Service Providers (page 7.13)
Mail (page 7.15)
Mail protocols (page 7.17)
Browsing (page 7.19)
Searching the Web (page 7.21)
FTP (page 7.23)
Telnet and Newsgroups (page 7.24)
E-Commerce (page 7.24)
Recreational uses of the Internet (page 7.28)
Building your understanding of Chapter 7
Work out your own answers to the following questions.







Write a couple of paragraphs explaining what the Internet is.
Describe how commerce can be conducted over the Internet.
How would you assess the quality of an Internet connection?
Explain how hyperlinks are used in a browser to move from site to site.
Describe the relationship between HTML, HTTP and web browsers.
What is DNS and how does it relate to IP addressing?
What is a search engine and how would you use it?
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 59






Explain briefly how you would use an FTP client to transfer files from a remote
computer to your own.
What are the advantages and disadvantages of CNP transactions?
What functions does an e-mail client perform?
What is an e-mail attachment?
Explain the difference between e-commerce and B2B transactions.
List the recreational uses of the Internet.
Summary of key concepts
Go through the following list of concepts. Make sure that you can describe each
concept in a single sentence. You can do this in your mind or write each explanation
down. Once you have described these concepts, explain how they are related. The list
of concepts is as follows:



























Internet
channels
ARPA
packets
ARPANET
TCP/IP
MILNET
NFSNET
backbone
protocols
datagrams
IP address
subnetmask
address classes
subnetting
broadcasts
time-to-live
gateways
CIDR
ports
multiplexing
sockets
DNS servers
zones
www
hypertext
HTML
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 60
































HTTP
browsers
FTP
URL
ISP
ISP accounts
quality of connection
bandwidth
e-mail clients
attachments
web-based e-mail
PoP3
IMAP
SMTP
UUCP
hyperlinks
web authoring
URL
search engines
FTP
FTP server
FTP client
Telnet
E-commerce
newsgroups
CNP
SSL
PSP
dot coms
B2C
B2B
on-line music
Activity 7
Answer the questions at the end of Chapter 7. Do not look at the answers until you have
completed the activity.
Section A covers basic knowledge, while Section B is more technical.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 61
Answers
Section A
1.
(c)
2.
PSP
Note: Some Internet merchants do not have sufficient standing to get an Internet
merchant account from a bank which would enable them to carry out CNP transactions
and debit a buyer's account. In such a case they make use of a PSP (Payment Service
Provider). For a percentage of the transaction the PSP makes the deduction from the
buyer's credit card and transfers cash into the seller's account. Note that the PSP has to
be in good standing with the banks in order to be able to provide the service.
3.
(c)
4.
(a)
5.
(b)
6.
(a)
7.
Card Not Present
8.
(a)
9.
www
Note: The first item of the URL is the name of the server. If the URL had been
chance.game.com then the name of the server would have been chance.
10.
com
11.
Universal Resource Locator
12.
(a)
13.
(c)
14.
Internet Service Provider
15.
(a)
16.
(a)
Note: SSL (Secure Sockets Layer) is a technique for sending encrypted information
across the Internet using the TCP/IP protocol.
17.
HyperText Transfer Protocol
18.
Domain Name System
19.
False
20.
(c)
21.
(b)
22.
The address
23.
ping 197.153.149.182
The ping command is useful for testing connections. It sends a small packet of data to a
remote machine (in this case 197.153.149.182) with an instruction to send a reply. Ping
indicates how long the communication took for each packet to travel to the remote
machine and back.
24.
PSP
25.
File Transfer Protocol
26.
Search engine
27.
Surfing
28.
(a)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 62
29.
Abuse of information; theft of information by employees; interception of credit-card
details by hackers; the seller may accept credit card details of a card that is being used
fraudulently by the purchaser.
30.
(d)
31.
(a)
32.
(b)
33.
B2B
34.
Mp3
Note: Just as documents can be coded in various ways so can video and audio files.
Each of these formats has a name.
35.
(a)
36.
It uses hyphens () instead of periods (.)
37.
(a), (c)
Note: These are browsers.
38.
(c)
39.
Tools
40.
True
Note: Although many South African sites end in .za, many use international domains
such as com, org and net.
41.
Encryption or SSL
Note: Encryption is the general term for scrambling data and SSL is a particular
technique.
42.
Domain Name System
43.
(a)
44.
(b)
45.
(a)
Note: No part of the IP address can be greater than 255.
46.
True
Note: This is called Internet banking.
47.
True
48.
(a)
49.
Zimbabwe
50.
True
Note: Some countries allow this. It is not always possible to tell which country a
business is located in by looking at its address. For example, you could live in South
Africa and purchase a domain name ending in co.uk.
Section B
1.
Advanced Research Projects Agency (ARPA)
2.
False
3.
ARPANET and MILNET
4.
TCP/IP
5.
United States National Science Foundation
6.
It provided faster links between sites.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 63
7.
Internet backbone
8.
Transmission Control Protocol/Internet Protocol
9.
Destination and source
10.
(c)
11.
Class
Network number
(a)
A
124
15.67.109
(b)
A
53
27.18.213
(c)
B
165.17 217.94
(d)
B
133.147
97.196
(e)
C
199.199.204
13
(f)
C
215.2.34
137
12.
(A)
13.
(c)
14.
(B)
15.
It is discarded.
16.
Gateways
17.
(c)
Computer number
The answers to questions 18 to 21 are for your interest:
18.
(a)
80
(b)
21
(c)
25
19.
215.77.88.214:77
20.
Socket, Sockets, Connection
21.
Server, Client
22.
Domain Name System
23.
URL, IP
24.
ICANN
25.
(B)
26.
NGO (Non-governmental organisation)
27.
False
Note: There is no connection between similar IP addresses and domains.
28.
False
Note: The WWW is in fact part of the Internet.
29.
Universal Resource Locator
30.
(B)
31.
Browser
32.
POP3 and IMAP
33.
SMTP
34.
SMTP
35.
UUCP
36.
File Transfer Protocol
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 64
37.
Anonymous
38.
Telnet
39.
False
40.
SSL
41.
Card Not Present
42.
B2B
43.
ISP (Internet Service Provider)
44.
PSP (Payment Service Provider)
45.
Dot coms
Assignment 3
Once you are familiar with all your study material, you should do Assignment 3 and
send it to the College for marking.
FOR YOUR NOTES
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 65
ASSIGNMENT 3
_____________________________________________________________________________
Subject: Concepts of Management Computing
Assignment Code: D20059581-C Edition: 1
_____________________________________________________________________________
Time allowed: 1½ hours
Total marks: 100
_____________________________________________________________________________
INSTRUCTIONS
1.
Please fill in a blank Assignment Cover sheet, which you should have received with your
study material. If you have only one Assignment Cover sheet left and more assignments
to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download
the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za.
Click on General Info, then under Study Skills, click on Assignments.
2.
Please transfer the following information onto the cover of your Assignment Cover sheet:








your student number;
your name and surname;
postal address;
postal code;
telephone number;
subject name;
assignment/test code (which you will find at the top of this page); and
the total number of pages of your assignment (excluding the cover sheet).
3.
You should send this assignment to the College for marking only if it is shown in your
Study Programme under 'Assignments for Submission'.
4.
Answer the questions in your own words. Marks will be deducted if you copy directly from
your study material.
5.
You can post or e-mail your assignment answers to us.
Post:

You can post your assignment answers to Damelin Correspondence College,
PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment
answers, ensure that you have paid sufficient postage – otherwise your answers will
be returned unmarked.


Draw a margin on the right-hand side of each page for your tutor to award marks
and write comments. Also, please leave two lines open after each question for
further comments.
You can answer the questions in any order, but make sure that you staple them
together in the correct order. Handing in neat work will be to your advantage.
E-mail:

Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please
include the assignment/test code, your name and your student number in the subject
heading of your e-mail. You can download the Assignment Cover form as a Word
document from the Damelin Correspondence website: www.dcc.edu.za. Click on
General Info, then under Study Skills, click on Assignments. Remember to attach the
Word document and your assignment file to your e-mail.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 66
Additional instructions

Please indicate on your tests which edition of the study guide you are using. Certain
information and page references differ from edition to edition.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 67
Section A
1.
True or False?
A computer is a general-purpose machine.
2.
Commerce transacted over the Internet between large corporations is referred to
specifically as:
(a)
(b)
(c)
(d)
3.
You wish to set up an account with an ISP. Which of the following would be the
best choice?
(a)
(b)
(c)
(d)
4.
Dot matrix printer
Line printer
Inkjet printer
Laser printer
Dot matrix printer
Line printer
Inkjet printer
Laser printer
Your secretary complains that his eyes are getting sore from all the typing he has
to do on the word processor. What solution do you choose?
(a)
(b)
(c)
(d)
7.
low bandwidth ISP
wide bandwidth ISP
first level ISP
bottom tier ISP
The accounts department hear that you are knowledgeable about printers. They
need a high-speed but low-cost printer for printing accounts. Which type do you
recommend?
(a)
(b)
(c)
(d)
6.
A
A
A
A
You have been asked by your departmental manager to help decide which type of
printer the company should buy. The requirements are high speed and high
quality. Which of the following do you recommend?
(a)
(b)
(c)
(d)
5.
B2B commerce
E-commerce
CorpCom
E-CorpCom
Replace
Replace
Replace
Replace
his
his
his
his
monitor
monitor
monitor
monitor
with
with
with
with
one
one
one
one
with
with
with
with
a
a
a
a
better screen resolution.
lower screen resolution.
higher refresh rate.
lower refresh rate.
Your department needs to set up a small network, as the process of passing
floppy disks to each other is very inefficient. Funds are very limited. What
solution do you recommend?
(a)
(b)
(c)
(d)
A
A
A
A
peer-to-peer network using a bus topology.
client-server network using a bus topology.
peer-to-peer network using a star topology.
client-server network using a star topology.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 68
8.
You need to connect Simphiwe's computer to the Internet. Which protocol will
you need to install on Simphiwe's computer?
(a)
(b)
(c)
(d)
9.
Michelle asks for your advice on which monitor she should buy. Which do you
recommend?
(a)
(b)
(c)
(d)
10.
NetBUI
IPX/SPX
TCP/IP
AppleTalk
640×480
800×600
640×480
800×600
60
60
75
75
Hz
Hz
Hz
Hz
Which of the following is binary code?
(a)
(b)
(c)
(d)
6853201
A3F1
10110
AFCD
11.
How many kHz in 15 Mhz?
12.
How many ns in 23 ms?
13.
The small interface cards that are used in notebook computers are called:
(a)
(b)
(c)
(d)
ISA cards
PCMCIA cards
AGP cards
Socket-7 cards
14.
Which form of coding is replacing ASCII, enabling all the alphabets of the world to
be represented?
15.
The type of memory that stores the start-up routines on a computer is called:
(a)
(b)
(c)
(d)
16.
Which of the following is not an example of secondary memory?
(a)
(b)
(c)
(d)
17.
ROM
RAM
Cache
Flash
Floppy disk
Hard disk
Cache
DVD
Choose the correct statement:
(a)
(b)
(c)
(d)
RAM is volatile and its contents cannot be changed
RAM is volatile and its contents can be changed
ROM is volatile and its contents cannot be changed
ROM is volatile and its contents can be changed
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 69
18.
The access time of modern hard disks is measured in which unit?
(a)
(b)
(c)
(d)
19.
The speed of modern CPUs is measured in which unit?
(a)
(b)
(c)
(d)
(e)
20.
(b)
(c)
(d)
Translate a program a line at a time and pass the result to the processor.
They are slower than interpreters are.
Translate a program a line at a time and pass the result to the processor.
They are faster than interpreters are.
Translate an entire program before execution. The result is a slower
program than would be obtained using an interpreter.
Translate an entire program before execution. The result is a faster program
than would be obtained using an interpreter.
Web pages are best created using:
(a)
(b)
(c)
(d)
25.
an application program
a utility
an operating system
a database system
Compilers:
(a)
24.
Utility program
Application software
Systems software
Database software
Linux is:
(a)
(b)
(c)
(d)
23.
Assembler code.
Machine code.
Low level code.
High level code.
The operating system of a computer is a type of:
(a)
(b)
(c)
(d)
22.
Hz
kHz
MHz
GHz
MHz and GHz
C++ is an example of:
(a)
(b)
(c)
(d)
21.
s
ms
s
ns
an operating system
an HTML editor
a word processor
a text editor
Which type of field would be best for storing a telephone number?
(a)
(b)
(c)
(d)
Integer
Text
Float
Memo
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 70
26.
The process of making data unintelligible without a key is called:
(a)
(b)
(c)
(d)
27.
A user of a database can read data but not change it. This is an example of:
(a)
(b)
(c)
(d)
28.
sniffer program
cracker program
hacker's key
pirate's lock
HTTP
FTP
URL
ISP
The use of a credit card to purchase over the Internet is an example of:
(a)
(b)
(c)
(d)
34.
a
a
a
a
The address of a web site is referred to as its:
(a)
(b)
(c)
(d)
33.
Data diddling
Salami slicing
Hacking
Piracy
A program that monitors network traffic is called:
(a)
(b)
(c)
(d)
32.
Macro virus
Worm
Trojan horse
Logic bomb
The process of illegally transferring tiny amounts from a large number of
accounts into another account is called:
(a)
(b)
(c)
(d)
31.
Windows 2000 server
Unix
Novell
Windows Millennium
What type of virus replicates itself causing the system to run more and more
slowly?
(a)
(b)
(c)
(d)
30.
Encryption
An attribute
A user view
A public key
Which of the following is not an example of a network operating system?
(a)
(b)
(c)
(d)
29.
Encryption
Description
Algorithm
ASCII
a CNP transaction
a B2B transaction
an ISP transaction
a URL transaction
What is the web address of a company located in Zimbabwe likely to end in?
(What zone code describes sites in Zimbabwe?)
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 71
35.
What procedure will reveal when and where a change was made to data?
36.
A user currently has full rights to data. You wish to change this so that he cannot
make any changes but can read the data. What rights will you have to change in
the system?
37.
What is the technical term used to describe the method that is used to scramble
data?
38.
You have to create a very simple database for a colleague called Japie. There are
only a few fields that need to be recorded. The database will possibly grow to
about two thousand records. Which type of database would you create?
(a)
(b)
(c)
(d)
39.
After your successful creation of Japie's database, Harry, who is the personnel
manager, says he needs to record a wide range of information about staff from
personal details to records of staff purchases. Your company employs about 800
people. Which type of database structure would you use?
(a)
(b)
(c)
(d)
40.
Flat
Relational
Hierarchical
Network
Duplicate data in a database is referred to as:
(a)
(b)
(c)
(d)
41.
Flat
Relational
Hierarchical
Network
redundancy
normalised data
a relation
an index
Select the correct statement.
A database consists of:
(a)
(b)
(c)
(d)
Tables that are made up of fields, which are made up of records.
Records that are made up of tables, which are made up of fields.
Tables that are made up of records, which are made up of fields.
Records that are made up of tables, which are made up of fields.
42.
What is the process of creating multiple form letters from a data file and a
document outline called?
43.
What is http an abbreviation for?
44.
What is the process of scanning a code into a cashier's computer called?
(a)
(b)
(c)
(d)
45.
OCR
CPU
DVD
CNP
Which of the following represents the largest amount of memory?
(a)
(b)
257 Kb
2195 Mb
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 72
(c)
(d)
46.
1,7 Gb
786151 b
Which is the most common form of mass back-up storage?
(a)
(b)
(c)
(d)
Hard disk
Tape streamer
Floppy disk
CD-ROM
47.
Flo is having problems with her computer because the mains keep tripping,
causing her computer to crash. What type of device do you recommend she use to
protect her system?
48.
How many bits in a byte?
49.
The video card in your machine fails. The IT manager offers you various types of
video card. Assuming your machine could take any of these, which would you
choose?
50.
51.
(a)
ISA
(b) PCI
(c)
AGP
What is the set of tracks that is used for transmitting signals on the motherboard
called?
The capacity of a CD-ROM is about:
(a)
(b)
(c)
(d)
52.
Faizel has just joined your department. As he is unfamiliar with computer
hardware, he asks for your advice. He has been offered a choice of computers by
the IT manager. Which do you recommend he choose?
(a)
(b)
(c)
(d)
53.
500 MHz Celeron
500 MHz Pentium III
486 DX4-100
XT
Justine needs to create documents and prepare financial statements. She
sometimes needs to import calculations into her documents. She asks for your
advice on what software to get. What do you recommend?
(a)
(b)
(c)
(d)
54.
640 kb
64 Mb
640 Mb
6,4 Gb
A good word-processor and spreadsheet package
An integrated office application suit
A top-quality operating system
An enterprise software solution
A legal firm decides to install a network, as partners need to be able to access
and work on many common documents. Reliability and efficiency are more
important than cost. You have been asked to help them make a decision on the
best type of network. Which do you recommend?
(a)
(b)
(c)
(d)
A
A
A
A
peer-to-peer network, using a bus topology
client-server network, using a bus topology
peer-to-peer network, using a star topology
client-server network, using a star topology
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 73
55.
The accountant for a large medical practice uses a database system for keeping
track of patients' records and invoices. The patient ID is the unique key in the
'Personal details' table and the foreign key in the 'Invoices' table. What type of
relational database is she using?
(a)
(b)
(c)
(d)
56.
A company that has just upgraded their machines, donated 20 computers to a
school with a limited budget. The principal of the school believes that it would be
beneficial to link the machines on a network. The school has a teacher who
teaches electrical trade theory and can do cabling. You have been asked to advise
on the type of network that would best satisfy their constraints. What type of
network do you recommend?
(a)
(b)
(c)
(d)
57.
One-to-one
One-to-many
Many-to-one
Many-to-many
A
A
A
A
peer-to-peer network using a bus topology.
client-server network using a bus topology.
peer-to-peer network using a star topology.
client-server network using a star topology.
Complete the following sentence:
Analogue is to digital as continuous is to _____.
58.
Complete the following sentence:
Analogue is to digital as round is to _____.
59.
Which of the following is not true?
(a)
(b)
(c)
(d)
(e)
60.
Which of the following is false?
(a)
(b)
(c)
(d)
(e)
61.
A worm causes a computer to run increasingly slowly.
Viruses are usually identified by their signatures.
A memory-resident anti-virus program monitors computer activity.
A salami slice is a type of virus.
A virus can block access to the data on a floppy disk.
Your company has a problem with its mains supply. Brownouts are a major
problem in particular. The machines that are continuously busy with critical data
need to be protected. You have been asked to assist. What type of device do you
recommend the company to buy?
(a)
(b)
(c)
(d)
(e)
62.
A virus can destroy all data on a hard disk.
A virus can be transmitted through e-mail.
A virus can be transmitted through the exchange of floppy disks.
Once a virus is on your system it cannot be removed.
A Trojan horse is a type of virus.
CPU
URL
UPS
PCI
PSU
What protocol do web browsers make use of?
(a)
(b)
TCP/IP
HTTP
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 74
(c)
(d)
(e)
63.
Which of the following is not a valid IP address?
(a)
(b)
(c)
(d)
64.
Sniffer
Viewer
Screener
Logger
Server
Hub
Proxy
IP-sharer
Which is the highest quality transmission medium?
(a)
(b)
(c)
(d)
69.
pirate
hacker
burglar
cracker
What device is used in a star network to connect the computers together?
(a)
(b)
(c)
(d)
68.
A
A
A
A
The person referred to in the previous question makes use of which type of
program to monitor signals on a network?
(a)
(b)
(c)
(d)
67.
Powder
Ink
Ribbon
Paste
A person who attempts to break through network security is called:
(a)
(b)
(c)
(d)
66.
167.304.159.81
23.0.14.158
59.46.13.8
18.0.0.7
A laser printer uses which of the following to print?
(a)
(b)
(c)
(d)
65.
FTP
IPX/SPX
NetBUI
Co-ax
UTP
Fibre-optic
Telephone cable
True or false?
The quality of a digital signal degrades over long distances.
70.
True or false?
A bus network topology is more reliable than a star topology.
71.
True or false?
Every computer network must have a file server.
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 75
72.
What protocol is used to transfer files across the Internet?
(a)
(b)
(c)
(d)
73.
Which of the following is most likely to be the web address of an NGO?
(a)
(b)
(c)
(d)
74.
HTTP
FTP
UTP
HTML
www.charitysite.com
www.charitysite.org
www.charitysite.net
www.charitysite.gov
You purchase a couple of books through www.kalahari.net and pay using your
credit card. This is an example of which type of transaction?
(a)
(b)
(c)
(d)
COM
CNP
PSP
ISP
75.
What is URL an abbreviation for?
76.
A compiler is an example of:
(a)
(b)
(c)
(d)
77.
Which component is most closely associated with a CPU?
(a)
(b)
(c)
(d)
78.
Bus
Tram
Path
Slot
A particular programming language has a form that is very close to natural
language. Which of the following terms is best associated with such a language?
(a)
(b)
(c)
(d)
(e)
80.
Hard disk
Monitor
RAM
Modem
What part of the motherboard transmits signals between components?
(a)
(b)
(c)
(d)
79.
an application
an operating system
system software
a utility
5GL
1GL
Compiler
Interpreter
High level
What device is used to convert signals between digital and analogue?
(a)
(b)
(c)
(d)
UPS
CPU
Modem
Port
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 76
(e)
81.
PSU
True or false?
Peripheral devices can communicate with a computer using infra-red signals.
82.
Which of the following statements is not true of operating systems?
(a)
(b)
(c)
(d)
(e)
83.
Which type of application is best suited for keeping client records?
(a)
(b)
(c)
(d)
84.
Word processor
Spreadsheet
Database
Presentation
A word-processor operator is able to produce documents very quickly.
Unfortunately, the operator is not good at prioritising his or her tasks, with the
result that he or she submits documents before they are needed or too late.
Which of the following best describes the operator's work?
(a)
(b)
(c)
(d)
85.
The operating system controls hard drives.
Application programs make use of the operating system for some services.
The efficiency of an operating system is enhanced through the use of
utilities.
Operating systems can be used to perform complex calculations.
Unix is an example of an operating system.
Efficient and effective
Efficient but ineffective
Inefficient but effective
Inefficient and ineffective
Which of the following will work even if there is an obstruction between the
transmitter and receiver?
(a)
(b)
(c)
Radio waves
Microwave
Infra-red
86.
What is the process of converting a signal from digital to analogue called and
what device is used to do this?
87.
What is ISDN an abbreviation for?
88.
What is GIGO an acronym for?
89.
What is the highest speed in kbps that can currently be obtained with an
analogue dial-up telephone connection?
What is MAN an abbreviation for?
90.
91.
What type of virus makes use of customisation features of word-processing
packages to corrupt documents?
92.
When you purchase a software package, you are:
(a)
(b)
(c)
(d)
93.
Purchasing the intellectual property rights to the program.
Acquiring a license to make use of the software.
Hiring the program for personal or business use.
Purchasing the program code.
What is an error in a program called?
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 77
94.
Which of the following functions is not typically performed on a server?
(a)
(b)
(c)
(d)
95.
Which of the following words most closely resembles the concept of a table?
(a)
(b)
(c)
(d)
96.
Printing
End-user computing
File storage
Communication
field
record
file
database
Which age are we currently in?
(a)
(b)
(c)
(d)
(e)
Agrarian age
Palaeolithic age
Industrial age
Information age
Pleistocene age
97.
What is the technical term for the capacity of a communication channel to
transmit data (not the unit)?
98.
What colloquial term is often used to describe e-commerce companies?
99.
What is the sequence of signals called that flows between two computers when
they attempt to establish a communication link?
100. What type of database server carries out processing requirements on behalf of a
client and returns the results to the client?
TOTAL: [100]
_____________________________________________________________________________
Concepts of Management Computing / © ICG / Page 78
Download