Rea d Stu this Gui dy de f irst CONCEPTS OF MANAGEMENT COMPUTING Study Guide D20059581 Edition 1 *D20059581-E1* D20059581-E1 CONCEPTS OF MANAGEMENT COMPUTING Study Guide CONTENTS PAGE How to work through this study unit 1 Introduction 4 How to use this study guide 6 Your study schedule 8 Study Session one – introduction 11 Study Session two – computer hardware 15 Assignment 1 22 Study Session three – computer software 29 Study Session four – databases 36 Assignment 2 43 Study Session five – networks 49 Study Session six – computer security 54 Study Session seven – an introduction to the internet 59 Assignment 3 66 _____________________________________________________________________________ Concepts of Management Computing / © ICG PRINTING HISTORY 1st Edition March 2014 INTERNATIONAL COLLEGES GROUP (ICG) PTY. LTD. 2014 29 Martin Hammerschlag Way, Foreshore, Cape Town, 8000, South Africa _____________________________________________________________________________ This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, electronically stored or transmitted, or translated without the written permission of ICG. _____________________________________________________________________________ Concepts of Management Computing / © ICG / (ii) HOW TO WORK THROUGH THIS STUDY UNIT The icons used in this study unit Read through the descriptions of icons below. Look out for these icons as you work through the study unit. They will show you at a glance where you need to work through activities, definitions, self-assessment questions, and so on. Icon Description Learning outcomes: This signals the learning outcomes of the unit. You must be able to show competence in the outcomes after you have worked through the study unit. Competence means that you must be able to demonstrate that you can meet the outcome with skill and knowledge. Definition: This signals an important definition that you should understand and remember. Mathematical formula: This is a formula that you will use in calculations. It is important that you know what values to substitute into the formula. Important statement: This signals an important point that you must grasp before you continue with the rest of the lesson. It could also signal an interesting snippet of information. R Revision: This signals work that you need to revise in order to proceed to the next section or complete an activity, self-assessment question or assignment. Self-assessment questions: This signals the questions that will help you to analyse your understanding of the theory that was covered in the lesson. We conclude each lesson with a set of self-assessment questions. Answers to self-assessment questions: This signals the suggested answers to the self-assessment questions. Please do not look at the answers before you have tried to answer the questions yourself. Competence checklist: This signals a checklist to help you discover whether you can meet all the assessment criteria in the lesson. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 1 The best way to study To ensure that you get the full benefit of this study unit, we recommend that you do the following: Read the next section carefully, called Introduction to this Study Unit. It provides you with the learning outcomes for each of the lessons in the study unit. Carefully and diligently work through each lesson, keeping in mind the outcomes that you have to achieve. Ensure that you complete all the activities in the lessons. Ensure that you answer all the self-assessment questions in the lessons. Compare your answers to those provided in this study unit. If you encounter any words that you do not understand, make a list of these, then look up their meanings in a dictionary. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 2 Learning Objectives On completion of this course, you should be able to do the following: communicate meaningfully with IT professionals; interact intelligently with the computer as an end-user; and understand the basis on which IT decisions are made; make an informed decision about your future studies in IT. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 3 INTRODUCTION Welcome to your Concepts of Management Computing course. Computers are affecting every aspect of our lives. Although our primary concern in this course is the use of the computer in the business world, it is important to realise that the computer has become more than just a business tool. Your understanding of the computer in a business situation will help you realise how it can enrich your personal life, whether you use it for education, communication or entertainment. The rapid developments in computer technology are changing the nature of work itself. You have the choice of being part of these exciting advances and developing marketable skills or being left behind and becoming alienated from the possibilities. We hope this course will excite and inspire you to develop your knowledge and skills. After working through the course you will have an overview of the different aspects of information technology. Within this wide range, you may decide on one aspect of information technology to make your special interest. Please keep in mind that this course is not meant to be a practical hands-on course that teaches you specific skills. It is a conceptual course. This means a couple of things: This course will introduce you to the language of information technology. In other words, it will help you to communicate with specialists in the field. When they talk to you using technical language, you should have some understanding of what they are talking about. This course will introduce you to the theory. The theory deals with the way things work. As an analogy, think of the motor car. You can learn to drive, which is the practical skill in use, or learn how the car works, which is the theory. Both theory and practice have their place. Ideally, you should be developing practical skills along with the theory. Take every opportunity to speak to professionals who work with computers. Talk to these professionals about what you have learned. Get used to using the language and vocabulary in this course. You will find that when you work practically with a computer the experience is much more meaningful. We would like you to succeed, so we will help you with your study responsibilities, by assisting you all the way. Remember that you can contact the College when you have queries or need motivation. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 4 Here are our contact details: GETTING IN TOUCH If you have a query, and you would like to contact your tutor – or even if you just need a bit of encouragement – please contact us at: Damelin Correspondence College PO Box 31001, Braamfontein, 2017, South Africa Phone: (021) 417 6622 or 0860 41 41 41 Fax: 0861 122 322 E-mail: dccsupport@damelin.edu.za VISIT US ON THE INTERNET: http://www.dcc.edu.za Make contact with fellow students following the same course and form a study group if possible. Ask the college to provide you with the names of students in your area if you are interested in forming a study group. Enjoy your course! _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 5 HOW TO USE THIS STUDY GUIDE We have compiled this study guide for you to easily understand your Concepts of Management Computing course. In this study guide you will find the following: a study schedule; study sessions; prescribed reading; activities; and tests. Study schedule The study schedule shows you what each study session consists of, where you can find the topics in your textbook, and which tests to send to the College. Study sessions You must do all the study sessions in this study guide. At the beginning of each study session you will find the outcomes for each chapter in your study guide. These outcomes provide areas of focus and explain what you need to be able to do by the end of the study session. Prescribed reading Varley, David. Fundamental Concepts of Information Technology. 2004. Third Edition. Future Managers. Your textbook, Fundamental Concepts of Information Technology, covers the syllabus. Although you are encouraged to read other books to extend your knowledge, you have to use this book as your reference point. Activities The activities at the end of each study session form an integral part of the study methodology. After you have done the activities at the end of each assignment, check your answers against the answers provided. Do not look at the answers until you have completed the entire activity. The answers contain additional notes on the study material as well as important points on interpreting and understanding the questions. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 6 Assignments After you have worked through Study Session Two, Four and Seven, we will test you on the work you have done. Assignments in this study guide are for your own benefit and will show you and us whether you understand the work. Although the tests will focus on the latest work you have covered, they will also include questions from previous sections. This will help to make you familiar with your study material. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 7 YOUR STUDY SCHEDULE The study schedule shows you what each assignment consists of, where you can find the topics in your textbook, and which tests to send to the College. STUDY SESSIONS ONE CHAPTER TOPICS INTRODUCTION TWO THREE Pages 1.1 to 1.11 The information age Information systems Future trends in white-collar work The future of computer systems Pages 2.1 to 2.32 Assignment 1 Introduction Input devices Output devices CPU and related components Primary memory Secondary memory Connecting peripherals and devices to a computer Power of a computer Classification of computers COMPUTER SOFTWARE SUBMIT THESE TESTS TO THE COLLEGE What is a computer? COMPUTER HARDWARE PAGE IN TEXTBOOK Pages 3.1 to 3.28 The concept of a program The classification of software Systems software Applications software Word processors Spreadsheets Office automation Enterprise software _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 8 STUDY SESSIONS FOUR CHAPTER TOPICS DATABASES FIVE SIX Assignment 2 Database systems Some basic database concepts More about fields Records and tables Relational databases Normalisation of databases Other database design issues Other types of databases Large database systems Personnel Security issues Pages 5.1 to 5.19 Introduction Protocols Types of networks Servers Network operating systems Communications between networks COMPUTER SECURITY Pages 4.1 to 4.30 SUBMIT THESE TESTS TO THE COLLEGE Introduction NETWORKS PAGE IN TEXTBOOK Pages 6.1 to 6.19 Threats to computer systems Computer viruses Types of viruses and related programs Computer crime Computer ethics Physical dangers Physical protection of systems Software security Backups Legal issues _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 9 STUDY SESSIONS SEVEN CHAPTER TOPICS AN INTRODUCTION TO THE INTERNET PAGE IN TEXTBOOK Page 7.1 to 7.29 SUBMIT THESE TESTS TO THE COLLEGE Assignment 3 What is the Internet? A brief history of the Internet A TCP/IP primer Ports and sockets The DNS system The World Wide Web Internet Service Providers Mail Mail protocols Browsing Searching the web FTP Telnet Newsgroups E-commerce Recreational use of the Internet _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 10 STUDY SESSION ONE – INTRODUCTION Learning outcomes When you have completed Study Session One, you should be able to do the following: give examples of tasks a computer can carry out; describe the components of an information system; and explain how Information Age technology is changing the nature of white-collar work. Prescribed reading Please study the following in Chapter 1 of your textbook: What is a computer? (page 1.1) The Information Age (page 1.2) Information systems (page 1.3) Future trends in white-collar work (page 1.5) The future of computer systems (page 1.8) How to approach each chapter Look at the headings of the four sections mentioned above. What is the theme of Chapter 1? What is the link between the sections? Here is one view: we have this modern machine called a computer. The aspect of the computer that has become extremely important in the modern world is the creation of information. This became so important that the current period of history has become known as the Information Age. The ability to work with and communicate vast amounts of information is changing the nature of office work. The concepts that are covered in each paragraph appear in the left-hand margin of the textbook. Scan these concepts to get a feel of the details of the chapter. Some concepts may be familiar. When you read the chapter, your brain will be aware of these words and it will be easier to grasp the ideas. Now read the chapter quickly. Do not worry if you do not understand everything. Next time you return to the chapter, you will begin your detailed study. Start with the first section and study each of the concepts in turn. Repeat the process with each subsequent section. Note that you have to apply this approach to each chapter in your textbook. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 11 Building your understanding of Chapter 1 Now work through the following: Write down your own examples about things a computer can do. Why is the computer a general purpose machine? What is the difference between hardware and software? What factors have contributed to the Information Age? What is the difference between efficiency and effectiveness? Give an example of each. Why are information systems so useful? Write down some examples of processing other than those listed in the book. Give an example of capital-intensive production and labour-intensive production. The textbook gives one example of time compression. Think of others. Explain Toffler's idea of future shock in your own words. List some examples of tasks that a company could outsource. What are the problems and opportunities of the Information Age for Africa? List of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: computer general purpose machine program computer system hardware software end-user information information age purpose of information systems efficiency effectiveness data input processing storage output gigo _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 12 debugging decision support systems white-collar work skills of the information age labour intensive capital intensive dot coms B2C enterprise software outsourcing B2B the Web time compression future shock the African concept Activity 1 Answer the questions at the end of Chapter 1 of the textbook. Do not look at the answers until you have completed the activity. Note: Question 11 should read: 'What are logical errors in a program called? Answers 1. (a) 2. (c) 3. (d) 4. False 5. (c) 6. (b) 7. Garbage in garbage out 8. (b) 9. (a) 10. (b) 11. bugs 12. (a) Note: In other words, skills are only valid for a while. As new technologies emerge, new skills need to be learned and old ones discarded. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 13 13. dot coms Note: The general name for business conducted over the Internet is e-commerce. When businesses do business between themselves it is called B2B. The companies themselves are called dot coms 14. (c) Note: It takes less time for things to happen. In other words, things happen more quickly. Be careful of (a) and (b) – time itself does not change. Perhaps this question is a bit confusing since people might speak colloquially of time running faster. When you get a multiple-choice question, it can happen that you could justify more than one answer. Read all options carefully and choose the option that is best. 15. (a) Note: Multiple-choice questions are usually made up of options that are plausible but incorrect. These are called detractors. You need to know your work to know which is correct. 16. (b) 17. (c) Note: Make sure you read the question carefully. The word modern is very important. The modern economy is global and companies operate across the world wherever it is most profitable, in other words where it is possible to achieve high productivity and have low costs. 18. (c) Note: Again, be careful of the wording, in particular the word not. The question implies that three options are true and one is false. You need to determine which statement is false. 19. Enterprise software 20. False Note: The truth is the other way around. The modern trend is from labour intensive to capital intensive. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 14 STUDY SESSION TWO – COMPUTER HARDWARE Learning outcomes When you have completed Study Session Two, you should be able to do the following: identify the major hardware components of a computer and their functions; make appropriate hardware choices, particularly with regard to monitors, printers and disk drives; choose appropriate units to measure different aspects of computer power and to convert between units; and distinguish between different types of computers and their areas of application. Prescribed reading Please study the following in Chapter 2 of your textbook: Introduction (page 2.1) Input devices (page 2.2) Output devices (page 2.5) The CPU and related components (page 2.9) Primary memory (page 2.12) Secondary memory (page 2.13) Connecting peripherals and devices to a computer (page 2.17) Power of computers (page 2.19) Classification of computers (page 2.21) Building your understanding of Chapter 2 Now work through the following: Compare the uses of RAM and ROM. Write down the characteristics of an ideal monitor. Draw up a table comparing the advantages and disadvantages of dot matrix, inkjet and laser printers. Draw up a table showing examples of the uses of dot matrix, inkjet and laser printers. What do we mean by machine code? How does this relate to binary code? Explain what a CPU does. Compare the nature and function of primary and secondary memory. What different methods can be used for making copies of important data? What are the advantages and disadvantages of each? _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 15 Draw up a table giving examples of the uses of the different types of computers. List of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. Carefully study these key concepts in your textbook. Once you have done this, check that you have covered all the outcomes as set out at the beginning of this study session. The list of concepts is as follows: hardware peripherals input device keyboard mouse joystick microphone optical reader bar-code reader light-sensitive pen scanner output device monitor pixel screen resolution refresh rate eye problems stress problems electromagnetic radiation LED screens active and passive screens hard copy printer dot matrix printer advantages and disadvantages of dot matrix printers line printers inkjet printers advantages and disadvantages of inkjet printers laser printers advantages and disadvantages of laser printers _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 16 IC CPU machine code binary code clock MHz types of CPU motherboard bus slots video cards ISA cards PCMCIA cards AGP cards primary memory, purpose of primary memory bits bytes ASCII uni-code kb/Mb/Gb RAM volatility of RAM booting ROM comparison of RAM and ROM cache memory secondary storage floppy disks hard disks capacity of disks hard-disk characteristics vulnerability of data tape streamers CD-ROM drives rewritable CDs CDs as back-up devices DVD drives flash memory power of computers _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 17 benchmarks MHz MIPS classification of computers personal computers laptop and notebook computers mini-computers mainframes supercomputers firewire Bluetooth infrared Do Activity 2 below and check your answers against those provided. Activity 2 Answer the questions at the end of Chapter 2. Do not look at the answers until you have completed the activity. You may find a couple of questions that do not have the answers in the text of the book. This is intentional, as the questions are also meant to extend your knowledge. Having an unanswered question in one's mind often makes the absorption of new ideas easier. Answers 1. True Note: This software is becoming more and more accurate. Speech-recognition software enables us to give commands to computers and enter data. 2. Dot matrix 3. True 4. 0 and 1 5. Machine code Note: Be careful to distinguish between machine code and assembler code. Assembler code is a very low level code that can easily be translated into machine code by a program called an assembler. Although this code is difficult to understand, it is designed for humans (not the CPU) to read. 6. (c) 7. False Note: It is in fact the other way round. 8. Compilers and interpreters 9. (b) 10. (b) 11. Booting _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 18 12. 4 1 024 bytes = 4 096 bytes 13. No, the moisture and dirt in his pocket could ruin the disk. 14. Yes, the graphite in the pencil can corrupt the data stored on the disk. 15. 60 000 16. Tape streamer 17. Ink jet printer 18. Mean time between failures 19. ms (millisecond) 20. (a) 21. (c) 22. (c) Note: The world's most powerful computers are needed for film special effects. 23. Laser 24. True 25. 5 000 000 26. (b), (d), (e) 27. Peripherals 28. True 29. Pixels 30. True 31. 72 H3 32. Electromagnetic 33. Active 34. The flicker causes eye strain. 35. (a) 36. Optical character recognition or OCR 37. 3 5000 000 38. Yes 39. No, the screen would appear to flicker. 40. The dot matrix prints one character at a time while a line printer prints an entire line at a time. 41. No 42. (a) 43. (e) 44. 64 Mb, but the minimum is constantly changing. Soon computers will have 128 Mb as an entry standard. 45. 12 ms 46. No, for that amount of money you could get a second-hand machine with a far better specification. 47. (c), (d) 48. (a) 49. O _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 19 50. 3 200 000 51. (c) 52. (e) 53. (c) 54. American Standard Code for Information Interchange 55. Uni-code 56. It can represent all the alphabets of the world. 57. (b) 58. Single In-line Memory Module 59. Dual In-line Memory Module 60. (b) 61. False 62. True Note: A loudspeaker has a strong magnetic field. 63. False Note: It has moving parts. 64. False Note: It is electronic. It has no moving parts. 65. Yes 66. True 67. False Note: It is very similar. 68. (d) 69. (c) Note: A DVD has a capacity of about 4 Gb. 70. (c) 71. (b) 72. (c) 73. (a) 74. (c) 75. (d) 76. (c) 77. (b) 78. (c), (d) 79. Read Only Memory 80. Random Access Memory 81. Central Processing Unit 82. MIPS Note: This stands for Millions of Instructions Per Second. 83. (d) 84. (b) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 20 85. (a) 86. (a) 87. (c) 88. (a) 89. (a), (d) 90. (a), (d) 91. (b), (e) 92. True Note: This is because technology is changing so quickly. 93. Supercomputer 94. ALU 95. MHz 96. Input devices 97. Back-up data 98. Yes 99. (c) 100. (a) 101. (a) 102. (c) 103. (c) 104. (a), (e) 105. (b), (d) Assignment 1 Once you are familiar with the material covered in Study Sessions One and Two, you should do Assignment 1 and send it to the College for marking. Only then carry on with Study Session Three. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 21 ASSIGNMENT 1 _____________________________________________________________________________ Subject: Concepts of Management Computing Assignment Code: D20059581-A Edition: 1 _____________________________________________________________________________ Time allowed: 25 min Total marks: 30 _____________________________________________________________________________ INSTRUCTIONS 1. Please fill in a blank Assignment Cover sheet, which you should have received with your study material. If you have only one Assignment Cover sheet left and more assignments to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. 2. Please transfer the following information onto the cover of your Assignment Cover sheet: your student number; your name and surname; postal address; postal code; telephone number; subject name; assignment/test code (which you will find at the top of this page); and the total number of pages of your assignment (excluding the cover sheet). 3. You should send this assignment to the College for marking only if it is shown in your Study Programme under 'Assignments for Submission'. 4. Answer the questions in your own words. Marks will be deducted if you copy directly from your study material. 5. You can post or e-mail your assignment answers to us. Post: You can post your assignment answers to Damelin Correspondence College, PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment answers, ensure that you have paid sufficient postage – otherwise your answers will be returned unmarked. Draw a margin on the right-hand side of each page for your tutor to award marks and write comments. Also, please leave two lines open after each question for further comments. You can answer the questions in any order, but make sure that you staple them together in the correct order. Handing in neat work will be to your advantage. E-mail: Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please include the assignment/test code, your name and your student number in the subject heading of your e-mail. You can download the Assignment Cover form as a Word document from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. Remember to attach the Word document and your assignment file to your e-mail. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 22 Additional instructions Please indicate on your tests which edition of the study guide you are using. Certain information and page references differ from edition to edition. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 23 Section A 1. Which of the following is not a trend in the nature of work and commerce in the 21st century? (a) (b) (c) (d) (e) 2. Which of the following is an error in a computer program? (a) (b) (c) (d) (e) 3. Hard drive Monitor Joystick Printer DVD What type of printer would be best for printing the accounts of a plumber? The requirements are reliability and low cost. (a) (b) (c) (d) (e) 6. Highly skilled population Protective labour legislation Shrinking economy Rapid population growth Reality of AIDS Which of the following is an input device? (a) (b) (c) (d) (e) 5. Gigo Bug Syntax Logic SAP Which of the following is not true of South Africa's current situation in the Information Age? (a) (b) (c) (d) (e) 4. Dot coms Time expansion Outsourcing Enterprise software B2B commerce Inkjet Line printer Dot matrix Laser Plotter What refresh rate is the minimum for the flicker on a monitor to be unnoticeable? (a) (b) (c) (d) (e) 52 62 72 82 92 Hz Hz Hz Hz Hz _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 24 7. What type of printer would you recommend that a graphic artist purchase? (a) (b) (c) (d) (e) 8. Which of the following is an output device? (a) (b) (c) (d) (e) 9. Ruggedness High cost Uses ink High-quality output Can print a wide range of graphics Which of the following is true of a laser printer? (a) (b) (c) (d) (e) 12. Resolutions Pixels Pixies Spots LEDs Which of the following is a characteristic of a dot matrix printer? (a) (b) (c) (d) (e) 11. Monitor Keyboard DVD OCR RAM What are the small dots of light on a computer monitor called? (a) (b) (c) (d) (e) 10. Inkjet Line printer Dot matrix Laser Plotter Noisy Toner cartridge uses a type of powder Cheap to run Limited set of type faces Not very good when it comes to printing graphics How many kHz in 3,56 GHz? (a) (b) (c) (d) (e) 356 3 560 35 600 356 000 3 560 000 13. The clock speed of the CPU is usually measured in: 14. (a) kHz (b) MHz (c) MIPS (d) bps (e) bin 1s and 0s are called: (a) (b) (c) (d) bits bytes ASCII Uni-code _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 25 (e) 15. Which of the following is volatile? (a) (b) (c) (d) (e) 16. Specifications Benchmarks Guidelines Monitors Limits Which type of memory is most closely associated with the operation of the CPU? (a) (b) (c) (d) (e) 20. Floppy disk Rewritable CD Tape ROM Removable hard drive Standards for comparing computers are called: (a) (b) (c) (d) (e) 19. s ms s ns ps Which of the following cannot be used for backing up data? (a) (b) (c) (d) (e) 18. DVD ROM Hard drive RAM CD The access time of modern hard drives is measured in: (a) (b) (c) (d) (e) 17. RAM Cache RAM ROM Flash CMOS Select the missing word: Modern CPUs contain _____ of components. (a) (b) (c) (d) (e) 21. tens thousands hundreds of thousands millions trillions What type of device would you use to input a graphic image into your computer? (a) (b) (c) (d) (e) Optical reader Scanner Monitor Plotter Mouse _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 26 22. Electromagnetic radiation from a monitor could be a problem for: (a) (b) (c) (d) (e) 23. The main circuit board on a computer is called the: (a) (b) (c) (d) (e) 24. Adding Sorting Printing Averaging Selecting Which of the following is an example of outsourcing? (a) (b) (c) (e) (e) 29. office automation software enterprise software applications software decision support software an information system Which of the following is not an example of processing? (a) (b) (c) (d) (e) 28. ISA AGP PCMCIA ASCII Serial Software that links all aspects of a company's operation is called: (a) (b) (c) (d) (d) 27. Alternate Standard Code for Information Interchange American Standard Code for Information Interchange African Standard Code for Information Interchange American Standard Caller Information Intermix American Standard Code for International Interchanges Cards that plug into a notebook computer are called: (a) (b) (c) (d) (e) 26. motherboard fatherboard bus IC slotboard ASCII is an abbreviation for: (a) (b) (c) (d) (e) 25. sufferers from arthritis pregnant women older workers young workers people who also use cell phones Employing a new secretary Getting a company in to clean your windows Discarding unwanted files Firing a company director Hiring a large number of new staff Strategic decisions are: (a) (b) (c) long-term decisions tactical decisions day-to-day decisions _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 27 (d) (e) 30. short-term decisions decisions made on the basis of what has happened in the past Someone who is efficient: (a) (b) (c) (d) (e) works quickly and always does the correct things. works quickly but may sometimes do the wrong things. always does the correct things but may sometimes work slowly. works quickly but always does the wrong things. None of the above statements is true of an efficient person. TOTAL: [30] _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 28 STUDY SESSION THREE – COMPUTER SOFTWARE Learning outcomes When you have completed Study Session Three, you should be able to do the following: explain the concept of a computer program; distinguish between systems software and applications software; list the tasks carried out by the operating system; choose the appropriate type of software for a specific task; and identify the features of different types of programming languages. Prescribed reading Please study the following in Chapter 3 of your textbook: The concept of a program (page 3.1) Classification of software (page 3.4) Systems software (page 3.4) Applications software (page 3.11) Word processors (page 3.12) Spreadsheets (page 3.15) Office automation (page 3.18) Enterprise software (page 3.19) Building your understanding of Chapter 3 Now work through the following: Using the example on page 3.1 as a guide, write a sequence of instructions (a program) that explains in detail how to perform an everyday task. Write a paragraph to explain what an operating system does. Describe the main differences between high and low level languages. List the main features of high level languages. What is the difference between a 3GL and a 5GL? How do compilers and interpreters differ? Give six examples of applications programs. In what ways is a word processor superior to a typewriter for creating documents? Explain the concept of merging. What features of a spreadsheet make it particularly useful for an accountant? _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 29 What is the difference between office automation software and enterprise software? List of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: computer program logical errors syntactical errors stored program concept machine code applications software systems software operating systems utilities booting control of hardware (video, disk drives) MS-DOS Windows 95/98/Millennium Windows NT / 2000 Unix Linux text-based operating systems GUI programming languages high level languages low level languages features of high level languages language generations (1GL, 2GL, 3GL, 4GL, 5GL) compiler interpreter word processor merge merge document data source common word processors (MS Word, WordPerfect, Amipro) spreadsheet automatic recalculation _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 30 what if? common spreadsheets (MS Excel, Lotus, QuattroPro) decision support systems operational, tactical and strategic decisions office automation artificial intelligence paperless office efficiency effectiveness integrated office applications enterprise software Activity 3 Answer the questions at the end of Chapter 3. Do not look at the answers until you have completed the activity. Answers 1. (c) 2. (a) 3. (b) 4. (a) 5. (c), (d) 6. (c), (d) 7. (b), (c) 8. (c), (d) 9. False 10. True 11. True 12. False Note: It is actually the other way round. 13. Utilities 14. Stored program concept 15. Expert system Note: This is not covered in the text. An expert system uses what is called artificial intelligence to assist in providing answers to questions that can not be phrased very concisely. Expert systems attempt to simulate human intuition. 16. (d) 17. (b) 18. (d) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 31 19. (a) Note: This is not covered in the text. The statement is more or less a definition of a JCL. 20. (c) 21. (b) 22. (b) 23. (b), (d) 24. (a), (e) Note: This is new information. An assembler command could look something like this: ADD X ADD is the opcode or instruction and X is the operand. The operand is the data the opcode uses. 25. (e), (e) 26. (b), (d) 27. True 28. False 29. True 30. False Note: The unit point measures the height of the font. 31. End-user 32. Installation 33. Font 34. John von Neumann 35. True 36. True 37. False 38. True 39. (a), (c) 40. True 41. False 42. False 43. True 44. True 45. (a) 46. True 47. Formatting Note: A new disk must be prepared before use. This involves a two-stage process: (a) partitioning; and (b) formatting. 48. Presentation package 49. Database 50. (a) In an integrated package, the data can be easily exchanged between the applications. (b) In an integrated package, each of the applications will have a similar interface. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 32 51. 52. (a) word processor; (b) spreadsheet; (c) presentation package; and (d) database. High level language. Note: Low level languages are extremely difficult to learn. 53. A GUI uses icons (symbols) to represent its functions. In the case of a text base system you have to type out the command. This means you have more to remember. 54. Graphical User Interface 55. No Note: Windows 2000 has very demanding hardware requirements. It will only run on very modern computers. The 486 is now obsolete and by today's standards, crude, even though in its day (only a few years ago) it was state of the art. Also keep in mind that Windows 2000 is a completely different operating system to Windows 95/98. Their GUIs are very similar though. 56. Yes Note: Although Linux is a very powerful operating system it has far more modest hardware requirements than Windows 2000. 57. Spreadsheet 58. False 59. Operating system 60. False 61. False Note: Although it may not sound it, low level languages are actually the most powerful, since anything that can be done by a high level language has to be ultimately translated into a low level language. 62. True Note: High level languages are designed for human use. 63. True 64. False Note: The statement describes how an interpreter functions. 65. True Note: You would, however, require enormous dedication and patience to do so. 66. Formatting 67. False 68. (a) 69. (c) 70. (e) 71. (c) 72. (c) Note: This is because operating systems do not usually contain anti-virus software. Additional functionality is supplied by utilities. 73. (b) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 33 74. bug Note: In the very early days of computers (1940s), a computer was found to be malfunctioning. The problem was eventually traced to an insect that had got into the electronics. 75. mouse 76. Compiler Note: Although it is more trouble to compile a program, the benefit is that the program runs faster. If you are going to use a program repeatedly, it is worth the initial effort to compile it. 77. (d) 78. (b) Note: The statement explains the relation between Linux and Unix. 79. (a) 80. (d) 81. (a) 82. (c) 83. (d) Note: Although you could use a word processor, a DTP (Desk Top Publishing) package is designed for producing things like newspapers, newsletters and magazines. 84. False Note: You have to be able to distinguish between efficiency and effectiveness. 85. False 86. (b) 87. (a) 88. Decision support systems 89. Enterprise software 90. Data recovery Note: Hard drives are electromechanical devices and can therefore fail. Users often fail to realise this. When the drive fails, users loose their data. There are special data-recovery programs that can attempt to recover the data, but they are not always successful. It is also an expensive process. 91. False 92. (b) Note: Strictly speaking, C++ could also be used, but it is not specifically designed for scientific problems. It is a general-purpose language because it can be used for a variety of purposes. 93. (a), (d) Note: Both are correct. 94. (e) Note: This is one of the reasons Java was developed. 95. (d) Note: Visual Basic is a general-purpose language. It is quite easy to start with, but can become very involved and complex if you delve deeply into it. 96. True _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 34 97. False Note: You have to be very logical in your thinking to program. 98. False 99. False 100. False _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 35 STUDY SESSION FOUR – DATABASES Learning outcomes When you have completed Study Session Four, you should be able to do the following: distinguish between data and information; describe the functions databases can perform; explain the difference between fields, records, tables and databases; choose appropriate field types for data; distinguish between the different record access methods; describe the structure of a relational database; determine when different types of relations are used; explain the purpose of normalisation; explain database design issues and how they are dealt with; identify other types of databases (flat, hierarchical and network); describe the structure of large database systems; and distinguish between the tasks carried out by database professionals. Prescribed reading Please study the following in Chapter 4 of your textbook: Introduction (page 4.2) Database systems (page 4.3) Some database concepts (page 4.4) More about fields (page 4.5) Records and tables (page 4.6) Relational databases (page 4.10) Normalisation of databases (page 4.12) Other database design issues (page 4.13) Other types of databases (page 4.14) Large database systems (page 4.16) Personnel (page 4.18) Security issues (page 4.19) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 36 Building your understanding of Chapter 4 Now work through the following: List as many processes as you can think of that convert data into information (one example would be selecting). Describe very briefly the essential differences between fields, records, tables and databases. Consider each of the field types listed in the textbook. Write down a few examples of the type of data that would be stored using each of the field types. (For example, in a currency-type field you could store salary data.) What is the difference between a range constraint and a format constraint? On page 4.10 of the textbook there is a diagram illustrating a relational database. Construct a similar diagram using a different example. Explain in a couple of sentences why we normalise databases. On page 4.15 there is a diagram illustrating a hierarchical database. Construct a similar diagram, using a different example. List the components of a large database system and describe each of them in a single sentence. List the professionals that would work on database systems. In a single sentence, describe what each of them does. What are the problems associated with database systems and how are they solved? List of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: database data information reports, report writers tables records fields files field types range constraints record structure record access methods sequential access random access indexed sequential access _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 37 relational databases relations one-to-one one-to-many many-to-one many-to-many normalisation redundancy integrity verification integrity constraints format constraints unique keys foreign keys flat databases hierarchical databases network model DBMS data dictionary DDL DML SQL security software archiving software DBA systems analyst programmer operator end-users access control authorisation passwords access rights user views audit trails encryption encryption algorithms and keys _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 38 Activity 4 Answer the questions at the end of Chapter 4. Do not look at the answers until you have completed the activity. Note: Question 4 should read: 'Field is to column as table is to _____' As with the previous activities, you may come across some questions to which you cannot find the answers in the text. The questions and answers are sometimes used to extend your knowledge. Answers 1. True 2. (b) 3. Record 4. Database 5. Boolean Note: The first letter of Boolean should always be in upper case (a capital letter). 6. (c) Note: A bit of background first. Numeric data is sub-divided into a number of categories, two of which are integer and floating point. Integers are basically whole numbers, while floating point numbers have a fractional part. The computer does arithmetic with these two types of data in very different ways. This is quite a tricky question. Although 7. and 7.0 look like integers (whole numbers), because of the decimal points the computer works with them like floating point numbers and not integers. 7. Floating point Note: See the previous explanation. 8. False 9. False Note: It is data that is converted into information, not the other way around. 10. (b) 11. (a) Note: The technical use of the word is rather different to its everyday use. This is common with computer terminology and can be quite confusing if you are trying to guess meanings. 12. (c) 13. (b), (c) Note: Be careful with (e). Data, not information, is stored in records. 14. (b), (c) Note: The word string is often used interchangeably with the word text in describing field types. 15. (b), (c) 16. (a), (d) 17. (d), (e) Note: The others are physical security methods. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 39 18. (a), (e) 19. (b), (d) 20. True 21. False 22. True 23. True 24. False Note: It is an abbreviation for Information Technology. 25. True 26. True 27. Data dictionary 28. DBA or database administrator 29. Encryption 30. Fields 31. Foreign Note: The link is between the unique key in the first table and the foreign key in the second table. 32. Range constraint 33. (d) 34. (a) 35. (c), (d) 36. (c), (e) 37. (a), (b) Note: The others are examples of the type of data you would store in a field. 38. (c), (e) 39. (a), (e) Note: Sometimes the best way to answer a question such as this is to eliminate the options that are clearly wrong. 40. False Note: The opposite is true. 41. False 42. True 43. False Note: It is an abbreviation for 'information system'. 44. True 45. True 46. False Note: It links different tables. 47. False 48. True _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 40 49. Database Management System Note: Many people use the abbreviation 'db' to refer to a database. 50. Relation 51. Integrity 52. Unique key 53. Format constraint 54. Encryption 55. False 56. (c) Note: Be careful. Because there are many orders for each customer the relation from order to customer is many-to-one. If we had said from customer to order, it would be oneto-many. Be sure you understand the difference. 57. True 58. (a) 59. Audit trail 60. Access control, user views Note: These two phrases mean virtually the same thing. 61. SQL 62. (b) 63. (d) 64. Hard copy 65. Report writer 66. (b) Note: This is the way date arithmetic is performed. Also if you subtract one date from another, the system will give you the number of days between the dates. 67. (a) Note: Be careful. Many might answer (b) but you would only use numeric fields when you intend to do arithmetic on the contents. Since you never use a telephone number in calculations, always store it in a text field. 68. Range constraint 69. Format Note: You might require that the first letter is upper case (a capital letter). 70. 3 670 71. 0 72. Indexed sequential access method 73. True 74. (b) 75. (b) 76. Redundancy 77. (a), (d) 78. Conforms _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 41 79. (c) Note: This actually violates the principles of integrity. 80. (d) 81. (a) 82. (c) 83. (a) 84. (a) 85. True 86. True 87. DBA or database administrator 88. (c) 89. (b) 90. (d) Note: The best password is the one that is the hardest to guess. One way of doing so is to mix upper- and lower-case letters, as well as numbers. 91. True 92. (a) 93. False Note: You need both user ID and password to be valid and to match each other. In other words, a different password is associated with each user ID. 94. False Note: There are more threats to a system than hackers. There are, for example, physical threats. 95. (a) 96. (c) 97. (e) 98. Access 99. Access 100. SQL Assignment 2 Once you are familiar with the material covered in Study Session One to Four, you should do Assignment 2 and send it to the College for marking. Only then carry on with Study Session Five. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 42 ASSIGNMENT 2 _____________________________________________________________________________ Subject: Concepts of Management Computing Assignment Code: D20059581-B Edition: 1 _____________________________________________________________________________ Time allowed: 1½ hours Total marks: 100 _____________________________________________________________________________ 1. Please fill in a blank Assignment Cover sheet, which you should have received with your study material. If you have only one Assignment Cover sheet left and more assignments to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. 2. Please transfer the following information onto the cover of your Assignment Cover sheet: your student number; your name and surname; postal address; postal code; telephone number; subject name; assignment/test code (which you will find at the top of this page); and the total number of pages of your assignment (excluding the cover sheet). 3. You should send this assignment to the College for marking only if it is shown in your Study Programme under 'Assignments for Submission'. 4. Answer the questions in your own words. Marks will be deducted if you copy directly from your study material. 5. You can post or e-mail your assignment answers to us. Post: You can post your assignment answers to Damelin Correspondence College, PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment answers, ensure that you have paid sufficient postage – otherwise your answers will be returned unmarked. Draw a margin on the right-hand side of each page for your tutor to award marks and write comments. Also, please leave two lines open after each question for further comments. You can answer the questions in any order, but make sure that you staple them together in the correct order. Handing in neat work will be to your advantage. E-mail: Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please include the assignment/test code, your name and your student number in the subject heading of your e-mail. You can download the Assignment Cover form as a Word document from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. Remember to attach the Word document and your assignment file to your e-mail. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 43 Additional instructions Please indicate on your tests which edition of the study guide you are using. Certain information and page references differ from edition to edition. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 44 Section A 1. _____________________________________________________ Write down the missing word: If a row is a record then a column is a _____. 2. What process is used to create an optimal structure for a relational database? 3. Select two statements that are true of a laser printer: (a) (b) (c) (d) (e) 4. Which two of the following are examples of systems software? (a) (b) (c) (d) 5. Word processors Operating systems Spreadsheets Utilities Which of the following programming languages is most suitable for commercial applications? (a) (b) (c) (d) 6. A laser printer cartridge contains ink. A laser printer provides very cheap hard copy. A laser printer is the best choice for printing graphics. Laser printers are quiet. Laser printers can only print a limited number of fonts. COBOL FORTRAN Assembler C++ True or false? A DBA and a systems analyst do the same work. 7. True or false? Sequential access is faster than random access. 8. True or false? SQL is an example of a DML. 9. What type of constraint is used to check that data conforms to certain rules after it has been updated or changed? 10. Which of the following tracks changes and makes changes to data? (a) (b) (c) (d) Audit trails Encryptions User views Access rights _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 45 11. Which of the following field types would be most suitable for storing serial numbers of equipment? (a) (b) (c) (d) (e) 12. Numeric Text Boolean Currency Date Write down the missing word: A database is a collection of _____. 13. B2B refers to: (a) (b) (c) (d) 14. Which two of the following are low level languages? (a) (b) (c) (d) (e) 15. back-to-back printing transactions between businesses using the Internet a type of CPU a software package C++ Assembler 5GL Machine code COBOL Which of the following translates source code line by line during execution? (a) (b) (c) (e) Compiler Interpreter C++ 5GL 16. What is the psychological stress caused by rapid technological change often called? 17. Write down two benefits to a company of outsourcing? 18. Which two of the following are not output devices? (a) (b) (c) (d) (e) Printer Monitor Mouse Joystick Loudspeaker 19. How many MHz in 3,7 GHz? 20. What are the standardised tests called that measure the performance of a computer under specific circumstances? 21. What part of the motherboard carries the signals between the CPU, RAM and video cards? 22. Which of the following is not an example of secondary memory? (a) (b) (c) Hard drive Floppy drive DVD _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 46 (d) RAM 23. Give an example of the use of ROM. 24. How many kb in 128 Mb? 25. True or false? Uni-code allows for the representation of many more different alphabets than does ASCII. 26. What unit of time is commonly used to measure the access time of a hard drive? 27. Give two examples of types of application software. (Do not give trade names.) 28. Give any two examples of tasks or functions carried out by the operating system. 29. What is a GUI? 30. Give two examples of how a high level language differs from a low level language. 31. In order to perform a merge with a word processor, you first need to produce two documents, each of which has a different function. What are these two documents? 32. Referring to Question 31, write down in a single sentence the function of each document. 33. Which of the following statements is not true of a spreadsheet. (a) (b) (c) (d) 34. Oracle is an example of a spreadsheet package. Spreadsheets enable users to carry out 'what if?' calculations. A spreadsheet is a type of decision support system. 'Automatic recalculation' is a feature of spreadsheets. What type of decisions do middle managers usually carry out? (a) (b) (c) (d) Operational Tactical Strategic Everyday 35. 36. Give the trade names of any two well-known database systems. What is the correct word that is used to describe the formatted output from a database system? 37. Describe in a single sentence why we normalise relational databases. 38. Redundancy refers to: (a) (b) (c) (d) 39. unwanted data duplicate data missing data incorrect data The relational database represents one model. Write down any other two database models. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 47 40. Suppose we require telephone numbers to be entered in the form (999) 999999999 where '9' stands for any digit. This is an example of: (a) (b) (c) (d) 41. an integrity constraint a format constraint a unique key verification True or false? SQL is an example of a DDL. 42. Write down any two advantages that using a data dictionary brings to a database system. 43. Which of the following professionals is responsible for the overall design of a system? (a) (b) (c) (d) DBA Programmer Systems analyst Operator 44. You are required to produce a small database in a short space of time. It is unlikely to be developed beyond its initial requirements. What model would you use? 45. Encryption algorithms make use of long sequences of characters to scramble data. What are these sequences of characters called? 46. What is COBOL an abbreviation for? 47. Write down any two examples of office automation in practice. 48. Which of the following is not a goal of office automation? 49. (a) Well-ordered filing cabinets (b) Efficiency (c) Effectiveness (d) Integration of activities Which of the following is a highly technical general-purpose language that makes more use of symbols than words? (a) (b) (c) (d) 50. COBOL BASIC FORTRAN C++ Which of the following is associated with Assembler? (a) (b) (c) (d) (e) 1GL 2GL 3GL 4GL 5GL [50 × 2 = 100] TOTAL: [100] _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 48 STUDY SESSION FIVE – NETWORKS Learning outcomes When you have completed Study Session Five, you should be able to do the following: explain the advantages of linking computers on a network; distinguish between the different transmission media; explain the concept of a protocol; identify different types of network; describe each of the different types of network server; describe the purpose and function of a network operating system; and determine the network and computer numbers if you are given the IP address. Prescribed reading Please study the following in Chapter 5 of your textbook: Introduction (page 5.1) Protocols (page 5.6) Types of networks (page 5.7) Servers (page 5.9) Network operating systems (page 5.10) Communications between networks (page 5.11) Building your understanding of Chapter 5 Work out your own answers to the following questions. Compare fibre optic to copper as a channel medium. Contrast analogue and digital signals. Describe how a signal is transmitted from one computer to another over a telephone line. (Use the concepts of digital and analogue signals.) Explain what is meant by a protocol. Draw up a table showing the different types of network server and the tasks that each performs. Describe the function of a network operating system. Explain how IP addressing works. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 49 List of key concepts Make sure that you can describe each of the following concepts in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: computer network sharing of resources source destination channel channel medium copper wire co-ax twisted pair fibre optic microwave radio infra-red analogue digital modem telephone links ISDN Diginet ADSL data transfer rate T1 and T3 lines bandwidth protocol IPX/SPX NetBUI TCP/IP LAN MAN WAN Internet topology bus star server _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 50 workstation file server print server communication server application server SQL server client-server network peer-to-peer network NOS Windows Novell Unix Linux hybrid networks IP address network number computer number subnet mask IP packets IP packet headers broadcasts routing routers firewalls Activity 5 Answer the questions at the end of Chapter 5. Do not look at the answers until you have completed the activity. As with the previous activities, you may come across some questions to which you cannot find the answers in the text. The questions and answers are sometimes used to extend your knowledge. Answers 1. Modulation 2. Demodulation 3. Modem 4. (b) 5. Analogue – the quality of the signal does not deteriorate as it does in the case of digital. 6. (a) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 51 7. (a) Note: NetBUI is ideal for small networks as it is very simple to set up. Unfortunately, the way it functions does not make it suitable for large networks. Technically, we say that it 'does not scale well'. 8. (c) Note: Novell uses IPX/SPX, small Windows networks use NetBUI while large Windows networks, as well as Unix and Linux, use TCP/IP. 9. (b) Note: Although a bus network is easy to set up it is not very robust. If one part fails, the entire network could fail since all computers share a common communication cable. Star topologies isolate the different computers from each other since each has its own cable. 10. (a), (c) 11. (b), (d) 12. (c) 13. False 14. Bandwidth 15. (c) 16. (c) 17. Protocol 18. (e) 19. False 20. False 21. True 22. False 23. True 24. (a) 25. True 26. 212 27. 156.27.58 28. 212.255.255.255 Note: If you replace the computer number of the IP address you get the broadcast address of the network. 29. Network Operating System 30. Hybrid 31. Peer-to-peer 32. (b) 33. All computers on the same network. 34. True 35. The quality of the signal deteriorates over distance. 36. It has more than two levels. 37. 207.193.15 38. 189 39. 207.193.15.255 _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 52 40. Client-server 41. Store data (or files) 42. (c) 43. The cost of such a line would be out of the reach of most small companies. 44. Router 45. Topology 46. Microwave Note: Microwave is used to connect installations where an ordinary cable would be difficult to install. Microwave would provide a much faster connection than a telephone. 47. False 48. True Note: The important word here is 'directly'. It is possible to connect to the Internet indirectly through another computer. There are various ways that this can be done. Technically, these computers are gateways or proxy servers. 49. (a), (e) 50. False _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 53 STUDY SESSION SIX – COMPUTER SECURITY Learning outcomes When you have completed Study Session Six, you should be able to do the following: explain the nature and actions of computer viruses; take adequate precautions to protect a computer system against viruses; describe the different types of computer crime, their consequences and steps that can be taken to protect systems against crime; distinguish between criminal and ethical issues relating to the misuse of software and data; identify common physical threats to computer installations and list the precautions that need to be taken to physically protect systems; explain common power problems and how a UPS can reduce the dangers they pose; explain the nature of back-ups and specify a back-up schedule; and explain legal issues relating to communication and data. Prescribed reading Please study the following in Chapter 6 of your textbook: Threats to computer systems (page 6.2) Computer viruses (page 6.2) Types of viruses and related programs (page 6.4) Computer crime (page 6.5) Computer ethics (page 6.9) Physical dangers (page 6.10) Physical protection of systems (page 6.11) Software security (page 6.12) Back-ups (page 6.12) Building your understanding of Chapter 6 Now work through the following: Explain what computer viruses are and the problems they present to users. What steps can you take to protect your computer system against computer viruses? Compare the nature and action of different kinds of viruses. What is software piracy and why is it damaging to the software industry? Compare the different types of computer crime. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 54 What is hacking and how do hackers access systems? How can data be misused? Describe the different software methods through which data can be protected? Give an example of a back-up schedule. Summary of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: threats to computers computer virus actions of computer viruses spreading viruses avoiding viruses anti-virus software virus signatures action of anti-virus software memory resident anti-virus programs updating anti-virus software repair, quarantine or delete files legal issues macro viruses worms time bombs logic bombs Trojan horses computer crime: theft computer crime: piracy, licensing, consequences of piracy computer crime: fraud, data diddling, salami slicing, CNP transaction fraud computer crime: hacking, handshaking, password crackers, brute force password crackers, sniffer programs, Internet underworld, motives for hacking computer crime: data theft computer ethics: misuse of data physical dangers: natural disasters, physical security, duplication of facilities physical dangers: criminal and political activity, security measures physical dangers: system problems, component failure, power supply problems, blackouts, brownouts, surges, UPS, smart UPS physical protection of systems _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 55 software security: limited access, passwords, guidelines for password usage, user rights tape back-ups CD-writers Activity 6 Answer the questions at the end of Chapter 6. Do not look at the answers until you have completed the activity. Answers 1. (d) 2. False 3. (d) 4. True 5. False 6. (b) 7. False Note: No anti-virus software can guarantee to offer 100% all the time. Other protective measures still need to be taken. 8. (c) 9. (d) 10. (a) 11. (Software) piracy 12. No Note: Normally when you buy a program you are purchasing a license to install it on one machine only. The exception is if you buy a number of licenses at the time of purchase. 13. A license to use the software Note: This might seem quite strange. The actual program is the developer's intellectual property. Part of the license agreement usually incorporates a clause prohibiting modification of the program. 14. (a) 15. (b) 16. (c) 17. Handshaking 18. (a) Note: Be careful of sites whose names end in a z – they often contain illegal or unethical material. Any of the options could be true, but the first is the most general. 19. Sniffer program 20. Password cracker 21. (a) Note: Some people would argue that (c) is true since passing on any information about people is unethical. If the company had wanted the buying habits as well, then the answer would definitely be (c). _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 56 22. Create a duplicate installation Note: In the case of critically important computer systems, they are often duplicated in places quite far apart. If one system fails, the other can take over. The situation is complex since if a change is made to data it must be made to both systems. We say that the two systems need to be 'synchronised'. 23. (d) 24. (a) 25. (c) 26. Logic bomb 27. True Note: These are a major factor in the spread of viruses. 28. Time bomb 29. (a) Note: Simply because it is easy to steal the entire system. 30. (a), (b) Note: Be careful as (d) might appear true, but the consequences of piracy will ultimately be bad. 31. (b) 32. True 33. False 34. No. The virus signatures would be out of date. Virus signatures need to be updated at least every week. 35. True Note: Although it is rare, there are some viruses that can actually damage by causing hardware to overwork. 36. (d) Note: A meaningless collection of upper- and lower-case letters and digits is the best. 37. (b) 38. Macro viruses 39. Card Not Present 40. Blackmail; gain competitive advantage over other businesses. 41. UPS (Uninterruptible Power Supply) 42. Smart or intelligent UPS 43. Use high-quality components; make back-ups of data; and have duplicate hardware system. 44. (c) 45. Air-conditioner 46. (a) 47. (d) 48. (c) Note: Back-ups should be kept off-site. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 57 49. (b) Note: CDs are reliable, but they have quite limited capacity measured against the needs of businesses. 50. (c) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 58 STUDY SESSION SEVEN – AN INTRODUCTION TO THE INTERNET Learning outcomes When you have completed Study Session Seven, you should be able to do the following: outline the development of the Internet; describe key theoretical concepts relating to the Internet; and distinguish between the different services that are provided by the Internet. Prescribed reading Please study the following in Chapter 7 of your textbook. What is the Internet? (page 7.1) A brief history of the Internet (page 7.3) A TCP/IP Primer (page 7.5) (omit the section on Ports and Sockets) The DNS system (page 7.10) The World Wide Web (page 7.11) Internet Service Providers (page 7.13) Mail (page 7.15) Mail protocols (page 7.17) Browsing (page 7.19) Searching the Web (page 7.21) FTP (page 7.23) Telnet and Newsgroups (page 7.24) E-Commerce (page 7.24) Recreational uses of the Internet (page 7.28) Building your understanding of Chapter 7 Work out your own answers to the following questions. Write a couple of paragraphs explaining what the Internet is. Describe how commerce can be conducted over the Internet. How would you assess the quality of an Internet connection? Explain how hyperlinks are used in a browser to move from site to site. Describe the relationship between HTML, HTTP and web browsers. What is DNS and how does it relate to IP addressing? What is a search engine and how would you use it? _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 59 Explain briefly how you would use an FTP client to transfer files from a remote computer to your own. What are the advantages and disadvantages of CNP transactions? What functions does an e-mail client perform? What is an e-mail attachment? Explain the difference between e-commerce and B2B transactions. List the recreational uses of the Internet. Summary of key concepts Go through the following list of concepts. Make sure that you can describe each concept in a single sentence. You can do this in your mind or write each explanation down. Once you have described these concepts, explain how they are related. The list of concepts is as follows: Internet channels ARPA packets ARPANET TCP/IP MILNET NFSNET backbone protocols datagrams IP address subnetmask address classes subnetting broadcasts time-to-live gateways CIDR ports multiplexing sockets DNS servers zones www hypertext HTML _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 60 HTTP browsers FTP URL ISP ISP accounts quality of connection bandwidth e-mail clients attachments web-based e-mail PoP3 IMAP SMTP UUCP hyperlinks web authoring URL search engines FTP FTP server FTP client Telnet E-commerce newsgroups CNP SSL PSP dot coms B2C B2B on-line music Activity 7 Answer the questions at the end of Chapter 7. Do not look at the answers until you have completed the activity. Section A covers basic knowledge, while Section B is more technical. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 61 Answers Section A 1. (c) 2. PSP Note: Some Internet merchants do not have sufficient standing to get an Internet merchant account from a bank which would enable them to carry out CNP transactions and debit a buyer's account. In such a case they make use of a PSP (Payment Service Provider). For a percentage of the transaction the PSP makes the deduction from the buyer's credit card and transfers cash into the seller's account. Note that the PSP has to be in good standing with the banks in order to be able to provide the service. 3. (c) 4. (a) 5. (b) 6. (a) 7. Card Not Present 8. (a) 9. www Note: The first item of the URL is the name of the server. If the URL had been chance.game.com then the name of the server would have been chance. 10. com 11. Universal Resource Locator 12. (a) 13. (c) 14. Internet Service Provider 15. (a) 16. (a) Note: SSL (Secure Sockets Layer) is a technique for sending encrypted information across the Internet using the TCP/IP protocol. 17. HyperText Transfer Protocol 18. Domain Name System 19. False 20. (c) 21. (b) 22. The address 23. ping 197.153.149.182 The ping command is useful for testing connections. It sends a small packet of data to a remote machine (in this case 197.153.149.182) with an instruction to send a reply. Ping indicates how long the communication took for each packet to travel to the remote machine and back. 24. PSP 25. File Transfer Protocol 26. Search engine 27. Surfing 28. (a) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 62 29. Abuse of information; theft of information by employees; interception of credit-card details by hackers; the seller may accept credit card details of a card that is being used fraudulently by the purchaser. 30. (d) 31. (a) 32. (b) 33. B2B 34. Mp3 Note: Just as documents can be coded in various ways so can video and audio files. Each of these formats has a name. 35. (a) 36. It uses hyphens () instead of periods (.) 37. (a), (c) Note: These are browsers. 38. (c) 39. Tools 40. True Note: Although many South African sites end in .za, many use international domains such as com, org and net. 41. Encryption or SSL Note: Encryption is the general term for scrambling data and SSL is a particular technique. 42. Domain Name System 43. (a) 44. (b) 45. (a) Note: No part of the IP address can be greater than 255. 46. True Note: This is called Internet banking. 47. True 48. (a) 49. Zimbabwe 50. True Note: Some countries allow this. It is not always possible to tell which country a business is located in by looking at its address. For example, you could live in South Africa and purchase a domain name ending in co.uk. Section B 1. Advanced Research Projects Agency (ARPA) 2. False 3. ARPANET and MILNET 4. TCP/IP 5. United States National Science Foundation 6. It provided faster links between sites. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 63 7. Internet backbone 8. Transmission Control Protocol/Internet Protocol 9. Destination and source 10. (c) 11. Class Network number (a) A 124 15.67.109 (b) A 53 27.18.213 (c) B 165.17 217.94 (d) B 133.147 97.196 (e) C 199.199.204 13 (f) C 215.2.34 137 12. (A) 13. (c) 14. (B) 15. It is discarded. 16. Gateways 17. (c) Computer number The answers to questions 18 to 21 are for your interest: 18. (a) 80 (b) 21 (c) 25 19. 215.77.88.214:77 20. Socket, Sockets, Connection 21. Server, Client 22. Domain Name System 23. URL, IP 24. ICANN 25. (B) 26. NGO (Non-governmental organisation) 27. False Note: There is no connection between similar IP addresses and domains. 28. False Note: The WWW is in fact part of the Internet. 29. Universal Resource Locator 30. (B) 31. Browser 32. POP3 and IMAP 33. SMTP 34. SMTP 35. UUCP 36. File Transfer Protocol _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 64 37. Anonymous 38. Telnet 39. False 40. SSL 41. Card Not Present 42. B2B 43. ISP (Internet Service Provider) 44. PSP (Payment Service Provider) 45. Dot coms Assignment 3 Once you are familiar with all your study material, you should do Assignment 3 and send it to the College for marking. FOR YOUR NOTES _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 65 ASSIGNMENT 3 _____________________________________________________________________________ Subject: Concepts of Management Computing Assignment Code: D20059581-C Edition: 1 _____________________________________________________________________________ Time allowed: 1½ hours Total marks: 100 _____________________________________________________________________________ INSTRUCTIONS 1. Please fill in a blank Assignment Cover sheet, which you should have received with your study material. If you have only one Assignment Cover sheet left and more assignments to submit, please photocopy the Assignment Cover sheet. Alternatively, you can download the Assignment Cover sheet from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. 2. Please transfer the following information onto the cover of your Assignment Cover sheet: your student number; your name and surname; postal address; postal code; telephone number; subject name; assignment/test code (which you will find at the top of this page); and the total number of pages of your assignment (excluding the cover sheet). 3. You should send this assignment to the College for marking only if it is shown in your Study Programme under 'Assignments for Submission'. 4. Answer the questions in your own words. Marks will be deducted if you copy directly from your study material. 5. You can post or e-mail your assignment answers to us. Post: You can post your assignment answers to Damelin Correspondence College, PO Box 31001, Braamfontein, South Africa, 2017. If you post your assignment answers, ensure that you have paid sufficient postage – otherwise your answers will be returned unmarked. Draw a margin on the right-hand side of each page for your tutor to award marks and write comments. Also, please leave two lines open after each question for further comments. You can answer the questions in any order, but make sure that you staple them together in the correct order. Handing in neat work will be to your advantage. E-mail: Alternatively, you can e-mail your answers to dccassignments@damelin.edu.za. Please include the assignment/test code, your name and your student number in the subject heading of your e-mail. You can download the Assignment Cover form as a Word document from the Damelin Correspondence website: www.dcc.edu.za. Click on General Info, then under Study Skills, click on Assignments. Remember to attach the Word document and your assignment file to your e-mail. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 66 Additional instructions Please indicate on your tests which edition of the study guide you are using. Certain information and page references differ from edition to edition. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 67 Section A 1. True or False? A computer is a general-purpose machine. 2. Commerce transacted over the Internet between large corporations is referred to specifically as: (a) (b) (c) (d) 3. You wish to set up an account with an ISP. Which of the following would be the best choice? (a) (b) (c) (d) 4. Dot matrix printer Line printer Inkjet printer Laser printer Dot matrix printer Line printer Inkjet printer Laser printer Your secretary complains that his eyes are getting sore from all the typing he has to do on the word processor. What solution do you choose? (a) (b) (c) (d) 7. low bandwidth ISP wide bandwidth ISP first level ISP bottom tier ISP The accounts department hear that you are knowledgeable about printers. They need a high-speed but low-cost printer for printing accounts. Which type do you recommend? (a) (b) (c) (d) 6. A A A A You have been asked by your departmental manager to help decide which type of printer the company should buy. The requirements are high speed and high quality. Which of the following do you recommend? (a) (b) (c) (d) 5. B2B commerce E-commerce CorpCom E-CorpCom Replace Replace Replace Replace his his his his monitor monitor monitor monitor with with with with one one one one with with with with a a a a better screen resolution. lower screen resolution. higher refresh rate. lower refresh rate. Your department needs to set up a small network, as the process of passing floppy disks to each other is very inefficient. Funds are very limited. What solution do you recommend? (a) (b) (c) (d) A A A A peer-to-peer network using a bus topology. client-server network using a bus topology. peer-to-peer network using a star topology. client-server network using a star topology. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 68 8. You need to connect Simphiwe's computer to the Internet. Which protocol will you need to install on Simphiwe's computer? (a) (b) (c) (d) 9. Michelle asks for your advice on which monitor she should buy. Which do you recommend? (a) (b) (c) (d) 10. NetBUI IPX/SPX TCP/IP AppleTalk 640×480 800×600 640×480 800×600 60 60 75 75 Hz Hz Hz Hz Which of the following is binary code? (a) (b) (c) (d) 6853201 A3F1 10110 AFCD 11. How many kHz in 15 Mhz? 12. How many ns in 23 ms? 13. The small interface cards that are used in notebook computers are called: (a) (b) (c) (d) ISA cards PCMCIA cards AGP cards Socket-7 cards 14. Which form of coding is replacing ASCII, enabling all the alphabets of the world to be represented? 15. The type of memory that stores the start-up routines on a computer is called: (a) (b) (c) (d) 16. Which of the following is not an example of secondary memory? (a) (b) (c) (d) 17. ROM RAM Cache Flash Floppy disk Hard disk Cache DVD Choose the correct statement: (a) (b) (c) (d) RAM is volatile and its contents cannot be changed RAM is volatile and its contents can be changed ROM is volatile and its contents cannot be changed ROM is volatile and its contents can be changed _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 69 18. The access time of modern hard disks is measured in which unit? (a) (b) (c) (d) 19. The speed of modern CPUs is measured in which unit? (a) (b) (c) (d) (e) 20. (b) (c) (d) Translate a program a line at a time and pass the result to the processor. They are slower than interpreters are. Translate a program a line at a time and pass the result to the processor. They are faster than interpreters are. Translate an entire program before execution. The result is a slower program than would be obtained using an interpreter. Translate an entire program before execution. The result is a faster program than would be obtained using an interpreter. Web pages are best created using: (a) (b) (c) (d) 25. an application program a utility an operating system a database system Compilers: (a) 24. Utility program Application software Systems software Database software Linux is: (a) (b) (c) (d) 23. Assembler code. Machine code. Low level code. High level code. The operating system of a computer is a type of: (a) (b) (c) (d) 22. Hz kHz MHz GHz MHz and GHz C++ is an example of: (a) (b) (c) (d) 21. s ms s ns an operating system an HTML editor a word processor a text editor Which type of field would be best for storing a telephone number? (a) (b) (c) (d) Integer Text Float Memo _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 70 26. The process of making data unintelligible without a key is called: (a) (b) (c) (d) 27. A user of a database can read data but not change it. This is an example of: (a) (b) (c) (d) 28. sniffer program cracker program hacker's key pirate's lock HTTP FTP URL ISP The use of a credit card to purchase over the Internet is an example of: (a) (b) (c) (d) 34. a a a a The address of a web site is referred to as its: (a) (b) (c) (d) 33. Data diddling Salami slicing Hacking Piracy A program that monitors network traffic is called: (a) (b) (c) (d) 32. Macro virus Worm Trojan horse Logic bomb The process of illegally transferring tiny amounts from a large number of accounts into another account is called: (a) (b) (c) (d) 31. Windows 2000 server Unix Novell Windows Millennium What type of virus replicates itself causing the system to run more and more slowly? (a) (b) (c) (d) 30. Encryption An attribute A user view A public key Which of the following is not an example of a network operating system? (a) (b) (c) (d) 29. Encryption Description Algorithm ASCII a CNP transaction a B2B transaction an ISP transaction a URL transaction What is the web address of a company located in Zimbabwe likely to end in? (What zone code describes sites in Zimbabwe?) _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 71 35. What procedure will reveal when and where a change was made to data? 36. A user currently has full rights to data. You wish to change this so that he cannot make any changes but can read the data. What rights will you have to change in the system? 37. What is the technical term used to describe the method that is used to scramble data? 38. You have to create a very simple database for a colleague called Japie. There are only a few fields that need to be recorded. The database will possibly grow to about two thousand records. Which type of database would you create? (a) (b) (c) (d) 39. After your successful creation of Japie's database, Harry, who is the personnel manager, says he needs to record a wide range of information about staff from personal details to records of staff purchases. Your company employs about 800 people. Which type of database structure would you use? (a) (b) (c) (d) 40. Flat Relational Hierarchical Network Duplicate data in a database is referred to as: (a) (b) (c) (d) 41. Flat Relational Hierarchical Network redundancy normalised data a relation an index Select the correct statement. A database consists of: (a) (b) (c) (d) Tables that are made up of fields, which are made up of records. Records that are made up of tables, which are made up of fields. Tables that are made up of records, which are made up of fields. Records that are made up of tables, which are made up of fields. 42. What is the process of creating multiple form letters from a data file and a document outline called? 43. What is http an abbreviation for? 44. What is the process of scanning a code into a cashier's computer called? (a) (b) (c) (d) 45. OCR CPU DVD CNP Which of the following represents the largest amount of memory? (a) (b) 257 Kb 2195 Mb _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 72 (c) (d) 46. 1,7 Gb 786151 b Which is the most common form of mass back-up storage? (a) (b) (c) (d) Hard disk Tape streamer Floppy disk CD-ROM 47. Flo is having problems with her computer because the mains keep tripping, causing her computer to crash. What type of device do you recommend she use to protect her system? 48. How many bits in a byte? 49. The video card in your machine fails. The IT manager offers you various types of video card. Assuming your machine could take any of these, which would you choose? 50. 51. (a) ISA (b) PCI (c) AGP What is the set of tracks that is used for transmitting signals on the motherboard called? The capacity of a CD-ROM is about: (a) (b) (c) (d) 52. Faizel has just joined your department. As he is unfamiliar with computer hardware, he asks for your advice. He has been offered a choice of computers by the IT manager. Which do you recommend he choose? (a) (b) (c) (d) 53. 500 MHz Celeron 500 MHz Pentium III 486 DX4-100 XT Justine needs to create documents and prepare financial statements. She sometimes needs to import calculations into her documents. She asks for your advice on what software to get. What do you recommend? (a) (b) (c) (d) 54. 640 kb 64 Mb 640 Mb 6,4 Gb A good word-processor and spreadsheet package An integrated office application suit A top-quality operating system An enterprise software solution A legal firm decides to install a network, as partners need to be able to access and work on many common documents. Reliability and efficiency are more important than cost. You have been asked to help them make a decision on the best type of network. Which do you recommend? (a) (b) (c) (d) A A A A peer-to-peer network, using a bus topology client-server network, using a bus topology peer-to-peer network, using a star topology client-server network, using a star topology _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 73 55. The accountant for a large medical practice uses a database system for keeping track of patients' records and invoices. The patient ID is the unique key in the 'Personal details' table and the foreign key in the 'Invoices' table. What type of relational database is she using? (a) (b) (c) (d) 56. A company that has just upgraded their machines, donated 20 computers to a school with a limited budget. The principal of the school believes that it would be beneficial to link the machines on a network. The school has a teacher who teaches electrical trade theory and can do cabling. You have been asked to advise on the type of network that would best satisfy their constraints. What type of network do you recommend? (a) (b) (c) (d) 57. One-to-one One-to-many Many-to-one Many-to-many A A A A peer-to-peer network using a bus topology. client-server network using a bus topology. peer-to-peer network using a star topology. client-server network using a star topology. Complete the following sentence: Analogue is to digital as continuous is to _____. 58. Complete the following sentence: Analogue is to digital as round is to _____. 59. Which of the following is not true? (a) (b) (c) (d) (e) 60. Which of the following is false? (a) (b) (c) (d) (e) 61. A worm causes a computer to run increasingly slowly. Viruses are usually identified by their signatures. A memory-resident anti-virus program monitors computer activity. A salami slice is a type of virus. A virus can block access to the data on a floppy disk. Your company has a problem with its mains supply. Brownouts are a major problem in particular. The machines that are continuously busy with critical data need to be protected. You have been asked to assist. What type of device do you recommend the company to buy? (a) (b) (c) (d) (e) 62. A virus can destroy all data on a hard disk. A virus can be transmitted through e-mail. A virus can be transmitted through the exchange of floppy disks. Once a virus is on your system it cannot be removed. A Trojan horse is a type of virus. CPU URL UPS PCI PSU What protocol do web browsers make use of? (a) (b) TCP/IP HTTP _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 74 (c) (d) (e) 63. Which of the following is not a valid IP address? (a) (b) (c) (d) 64. Sniffer Viewer Screener Logger Server Hub Proxy IP-sharer Which is the highest quality transmission medium? (a) (b) (c) (d) 69. pirate hacker burglar cracker What device is used in a star network to connect the computers together? (a) (b) (c) (d) 68. A A A A The person referred to in the previous question makes use of which type of program to monitor signals on a network? (a) (b) (c) (d) 67. Powder Ink Ribbon Paste A person who attempts to break through network security is called: (a) (b) (c) (d) 66. 167.304.159.81 23.0.14.158 59.46.13.8 18.0.0.7 A laser printer uses which of the following to print? (a) (b) (c) (d) 65. FTP IPX/SPX NetBUI Co-ax UTP Fibre-optic Telephone cable True or false? The quality of a digital signal degrades over long distances. 70. True or false? A bus network topology is more reliable than a star topology. 71. True or false? Every computer network must have a file server. _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 75 72. What protocol is used to transfer files across the Internet? (a) (b) (c) (d) 73. Which of the following is most likely to be the web address of an NGO? (a) (b) (c) (d) 74. HTTP FTP UTP HTML www.charitysite.com www.charitysite.org www.charitysite.net www.charitysite.gov You purchase a couple of books through www.kalahari.net and pay using your credit card. This is an example of which type of transaction? (a) (b) (c) (d) COM CNP PSP ISP 75. What is URL an abbreviation for? 76. A compiler is an example of: (a) (b) (c) (d) 77. Which component is most closely associated with a CPU? (a) (b) (c) (d) 78. Bus Tram Path Slot A particular programming language has a form that is very close to natural language. Which of the following terms is best associated with such a language? (a) (b) (c) (d) (e) 80. Hard disk Monitor RAM Modem What part of the motherboard transmits signals between components? (a) (b) (c) (d) 79. an application an operating system system software a utility 5GL 1GL Compiler Interpreter High level What device is used to convert signals between digital and analogue? (a) (b) (c) (d) UPS CPU Modem Port _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 76 (e) 81. PSU True or false? Peripheral devices can communicate with a computer using infra-red signals. 82. Which of the following statements is not true of operating systems? (a) (b) (c) (d) (e) 83. Which type of application is best suited for keeping client records? (a) (b) (c) (d) 84. Word processor Spreadsheet Database Presentation A word-processor operator is able to produce documents very quickly. Unfortunately, the operator is not good at prioritising his or her tasks, with the result that he or she submits documents before they are needed or too late. Which of the following best describes the operator's work? (a) (b) (c) (d) 85. The operating system controls hard drives. Application programs make use of the operating system for some services. The efficiency of an operating system is enhanced through the use of utilities. Operating systems can be used to perform complex calculations. Unix is an example of an operating system. Efficient and effective Efficient but ineffective Inefficient but effective Inefficient and ineffective Which of the following will work even if there is an obstruction between the transmitter and receiver? (a) (b) (c) Radio waves Microwave Infra-red 86. What is the process of converting a signal from digital to analogue called and what device is used to do this? 87. What is ISDN an abbreviation for? 88. What is GIGO an acronym for? 89. What is the highest speed in kbps that can currently be obtained with an analogue dial-up telephone connection? What is MAN an abbreviation for? 90. 91. What type of virus makes use of customisation features of word-processing packages to corrupt documents? 92. When you purchase a software package, you are: (a) (b) (c) (d) 93. Purchasing the intellectual property rights to the program. Acquiring a license to make use of the software. Hiring the program for personal or business use. Purchasing the program code. What is an error in a program called? _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 77 94. Which of the following functions is not typically performed on a server? (a) (b) (c) (d) 95. Which of the following words most closely resembles the concept of a table? (a) (b) (c) (d) 96. Printing End-user computing File storage Communication field record file database Which age are we currently in? (a) (b) (c) (d) (e) Agrarian age Palaeolithic age Industrial age Information age Pleistocene age 97. What is the technical term for the capacity of a communication channel to transmit data (not the unit)? 98. What colloquial term is often used to describe e-commerce companies? 99. What is the sequence of signals called that flows between two computers when they attempt to establish a communication link? 100. What type of database server carries out processing requirements on behalf of a client and returns the results to the client? TOTAL: [100] _____________________________________________________________________________ Concepts of Management Computing / © ICG / Page 78