Chapter 15 – Computer Careers and Certification

Chapter 15 – Computer Careers and Certification

True/False

  1. T
  2. F
  3. T
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. T

Multiple Choice

  1. A
  2. C
  3. C
  4. A
  5. D
  6. B
  7. D
  8. B

Matching

  1. E
  2. D
  3. J
  4. G
  5. H
  6. B
  7. F
  8. I
  9. A
  10. C

Short Answer

  1. An advantage of attending a trade school is saves time, learns only specific skills instead of broad range of courses. We should consider the number of courses available, accreditation of the trade school, financial aids available, licensing of courses and programs.
  2. The benefits of professional growth and continuing education are helps us informed about equipment, software, and issues affecting the computer industry, improves knowledge over time after graduation from education programs, gives materials / knowledge unavailable in formal educations. These are some ways keep up to date about industry trends and technologies : participate in seminars, workshop, conferences, conversions and trade shows.
  3. Consider about career goals and interests, think about long-term career path, assess background of our knowledge and expericence.four options for preparing for certification : 

         -self-study = a self-study session allows a professional to learn about materials at their own pace, but with designed materials given by the provider of the class.

         -online training classes = allows the students to learn at their own pace, but with designed materials given by the provider of the classes.

        -Instructor-led training = This training has many forms, for example seminars, which is usually held for several days a week, boot camps, where students are given intense training for up to two weeks and academic style classes, which lasts for weeks / months.

 4. it focuses about programming capabilities, Networking and Web Design Certifications are beneficial for those who are interested in programmer / developer certification.

 Java Programmers, mobile application developers, Oracle database managers, Programming consultants, SQL programmers, Web Software developers, XML developers.

 5. It is a certification that focuses or emphasizes on the repair of a device that is connected to the integrated hardware solution that addresses a company’s current and future computing needs

 Cable Installation technicians, Computer repair technicians, Corporate trainers, Help desk specialists, IT consultants, System engineers and administrators

Chapter 9 – Communications and Networks

PTI Assignment – Chapter 9 Communications and Networks

Name  : Aloysius Michael Tansy

NIM    : 1601216515

Class   : 01PBT

True/False

  1. T
  2. F
  3. T
  4. F
  5. T
  6. T
  7. F
  8. T
  9. F
  10. T
  11. T

Multiple Choice

  1. C
  2. C
  3. C
  4. D
  5. B
  6. A
  7. D
  8. B

Matching

  1. E
  2. J
  3. H
  4. D
  5. F
  6. A
  7. G
  8. B
  9. C
  10. I

 

Short Answer

  1. Text messaging : A mobile device with which also called SMS(Short Message service) ,capability allows users to send and receive short text messages, typically than 300 characters, on a phone or other mobile device or computer.

            Text messaging services typically provide users with several options for sending and          receiving messages :

  • Mobile to Mobile : send a message from your mobile device to another mobile device.
  • Mobile to E-Mail : send a message from your mobile device to an e-mail address anywhere in the world.
  • Web to Mobile : send a message from a text messaging Web site to a mobile device, or request that a Web site alert a mobile device with messages of breaking news and other updates, such as sports scores, stock prices, and weather forecasts.
  • Mobile to Provider : send a message by entering a common short code(CSC), which is a four- or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes.

2. GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS receiver. GPS receiver (such as in a car, a wearable device, a smart phone, a handheld device, or a collar) determines its location on Earth by analyzing at least 3 separate satellite signals from the 24 satellites in orbit. Individuals use GPS technology by using smart phones or GPS receiver.

3. LAN is a network that connects computers and devices in a limited geographical area such as a home ,school ,computer laboratory office building, or closely positioned group of buildings. MAN (Metropolitan area network) is a high-speed network that connects local area networks(LAN) in a metropolitan area such as a city or town and handles the bulk of communications activity across the region. WAN(Wide Area Network) is a network that covers a large geographic area like a city, country, or world, using a communications channel; that combines many type of media such as telephone lines, cables, and radio waves.

            Wireless LAN is  a LAN that use no physical wires.

4. Network topology refers to the layout of the computers and devices in a communications network.

            5 types of digital dedicated lines : ISDN lines, DSL, FTTP,T-carrier lines, and ATM.

 

 5. 3 different types of digital modems :

  • ISDN modem sends digital data and information from a computer to an ISDN line and receives  digital data and information from ans ISDN line
  • DSL modem sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line.
  • Cable modem is a digital modem that sends and receives digital data over the cable television network.

 

Chapter 14 – Enteprise Computing

Chapter 14 – Enteprise Computing

True/False

  1. T
  2. F
  3. F
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. F

Multiple Choice

  1. C
  2. B
  3. A
  4. B
  5. A
  6. D
  7. A
  8. D

Matching

  1. H
  2. F
  3. B
  4. E
  5. D
  6. G
  7. A
  8. J
  9. I
  10. C

Short Answer

  1. The responsibilities of managers :  Coordinating and controlling an organization’s resources. resources include people,money,materials and information.
     coordinate resources by performing planning,organizing,leading,controlling activities.
  2. Content Management System (CMS) is a combination of databases, software, and procedures which organizes and allows access to various forms of documents and files. it allows publishing,editing,and modifying content as well as maintenance from a central interface. Type of content may be processed by a content management system are images, documents, multimedia content.
  3. Two types of virtualization : – server virtualization = it provides the capability to divide a physical server logically into many virtual servers
     – storage virtualization = it provides the capability to create a single logical stograge device from many physical storage devices.

      Cloud computing : an internet service provides computing needs to computer users.

      Grid computing : often used in research environment , it combines many servers and personal computers on a network to act as one large computer. Companies use these new technology because it serves flexibility and massive online computing power.

4. 5 types of E-commerce : -E-Retail : occurs when retailers use the Web to sell their products and services. e.g. : Amazon.com, shopzilla.com
 -Finance : Online banking allows users to pay bills from their computer or mobile device, that is, transfer money electronically from their account to a paee’s account such as the electric company or telephone company. e.g. : vanguard.com, e-trade.com
 -Travel : provides many travel related services. while you need directions, you can enter your starting point and destination. e.g. : kayak.com, orbitz.com
 -Entertainment and Media : music,videos,news,sporting events, and 3-D multiplayer games are a growing part of the Web’s future. Newsprint on the Web is not replacing the newspaper. e.g. : itunes.com, youtube.com.
 -Health : Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. e.g. : health.gov, drugstore.com
 5. backup plan contains location of backed-up data, supplies, and equipment, the personal responsible for gathering backup resources and transporting them to the alternate computer facility, and a schedule indicating the order.
 The factors that contribute to the success of a backup plan are critical resources, hardware and software, and the operator.

Chapter 13 – Programming Languages and Program Development

Chapter 13 – Programming Languages and Program Development

True/False

  1. T
  2. T
  3. T
  4. T
  5. T
  6. F
  7. F
  8. T
  9. F
  10. F

Multiple Choice

  1. B
  2. C
  3. C
  4. A
  5. A
  6. C
  7. D
  8. B

Matching Match

  1. g
  2. d
  3. j
  4. i
  5. c
  6. e
  7. a
  8. h
  9. b
  10. f

1.Short AnswerIt translates an entire program before executing. By contrast, an interpreter translates and executes one statement at a time. A compiler instructions are actual CPU instructions or it can happen through an interpreter. The interpreter thus takes instructions (which are typically not native CPU instructions), amd performs the actions associated with the instruction. The intepreter is thus in charge of the execution of the program instructions.

The Advantages of an interpreter : when it finds errors, it displays immediately so that it will help the programmer to correct the error before the interpreter translates the next line of code.

The disadvantages of an interpreter : interpreted programs don’t run as fast as compiled programs.

2.Major benefit of object oriented programming is the ability to reuse and modify existing objects.

RAD(Rapid Application Development) is a method of developing software in which a programmer writes and implements a program in segments instead of waiting until the entire program is completed. Users begin working with sections of the program as they are completed. The important concept in RAD is the use of pre-built components.

3.IDE (Intergrated Development Environment) includes tools for building graphical user interfaces, an editor for entering program code, a compiler and\or interpret and a debugger. Some IDE’s work with a single programming language.

Visual Basic : allows programmers easily to build complex task-oriented object-based programs.

Visual C++ : OOP language enables programmers to write Windows, .NET, and so on quickly and efficiently.

Visual C# : it combines programming elements of C++ with and easier, rapid development environment.

4.XML is used to elaborate a website, it defines a set of rules for encoding documents in a format that is both human readable and machine readable.

Two applications of XML :

-RSS 2.0 : stands for Really Simple Syndication

-ATOM : the content aggregators use to distribute content to subscribers.

5.Two activities performed by the programmer when documenting a solution are review the program that has been coded and review documentation.

Proper documentation is imporant because it greatly reduces the amount of time a new programmer spends learning about existing programs.

Chapter 12 – Information System Development

Chapter 12 – Information System Development

TRUE/FALSE

  1. F
  2. T
  3. T
  4. F
  5. F
  6. F
  7. F
  8. F
  9. T
  10. T
  11. T

Multiple Choice

  1. A
  2. D
  3. C
  4. A
  5. C
  6. D
  7. A
  8. D

Matching

  1. D
  2. E
  3. A
  4. B
  5. I
  6. G
  7. F
  8. J
  9. C
  10. K

Short Answer

  1. System Development is a set of activities used to build an information system.

5 phases of the system development life cycle (SDLC) :

-Planning : the objective of the project is determined and the requirements to produce the product are considered.
-Analysis : the project team determines the end-user requirements. The project team documents all of the user requirements and gets a sign-off from the client and management to move forward with system design.
-Design : Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode , and other documentation.
-Implementation : if necessary it can develop programs, install and test new system, train usersm and convert to new system.
-Operation, support, and security : perform maintenance activities , assess system security, monitor system performance.

2. Four types of feasibility, and what does each measure   :

  • Operational feasibility. It measures how well the proposed system will work.
  • Schedule feasibility. It measures whether established project deadlines are reasonable.
  • Technical feasibility. It measures whether the organization has or can obtain the hardware, software, and people to deliver and then support the system.
  • Economic / cost / benefit feasibility. It measures whther the lifetime benefits of the proposed system will be greater than its lifetime costs.

Six techniques to gather data and information   :

  • Review Documentation. The system analysts will learn about the history of a project by reviewing documentation. Documentation provides information about the organization such as its operations, weaknesses, and strengths.
  • Observe. This technique helps system analysts understand how they perform a task.
  • Survey.  The system analysts will obtain data and information from a large number of people in this technique.
  • Interview. This is the most important data and information gathering technique. It allow the system analyst to clarify responses and probe during face to face feedback.
  • JAD sessions. Beside of a single one on one interview, analysts often use joint-application design sessions to gather data and information.
  • Research. These sources can provide the system analyst with the information such as the latest hardware and software products and explanation of new processes and procedures.

 

3.UML is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intesive system under development.

The different between case diagram and class diagram is the class diagram is a static diagram where graphically shows classes and one or more lower levels, called subclasses, in a system. The case diagram is a dynamic diagram where graphically show how actors interact with the information system.

4.They perform maintenance activities, monitor system performance, and assess system security.

-perform maintenance activities : is series of actions taken to prolog the system’s life, either by improving the system, or repairing a bug / error in system logic.

-monitor system performance : is an action of observing how well the system is running, whether there are problems with the system, effectivity of the costs etc.
-assess system security : is to decide whether the security of a system is safe enough to keep sensitive datas from being stolen.

5.A computer security is a plan which summarizes in writing all safeguards that protect the organization’s information assets.

Three things should a computer security plan :

-identify all information assets of an organization.

-identify all security risks that may cause an information asset loss.

-for each risk, identify the safeguards that exist to detect, prevent, recover from a loss.

Chapter 11 – Computer Security and Safety, Ethics, and Privacy

Chapter  11 – Computer Security and Safety, Ethics, and Privacy

True\False

  1. False
  2. True
  3. False
  4. True
  5. False
  6. True
  7. True
  8. True
  9. False
  10. False
  11. True
  12. False

Multiple Choice

  1. B
  2. D
  3. A
  4. C
  5. C
  6. D
  7. D
  8. C

Matching

  1. J
  2. D
  3. E
  4. G
  5. I
  6. C
  7. B
  8. A
  9. H
  10. F

Short Answer

  1. – We can use scan for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. The antivirus programs use to identify a virus is to look for virus signatures. Virus signature, also called a virus definition, is a known specific pattern of virus code. Computer users should update their antivirus program’s signature files regularly. Another technique to detect viruses is to inoculate existing program files. To inoculate a program file, the antivirus program records information such as the file size and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file. If an antivirus program indetifies an infected file, it attempts to remove the malware. If the antivirus program cannot remove the infection, it often quarantines the infected file. A quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed, it ensures other files will not become infected. A virus Hoax is an e-mail message that warns users of a nonexistent virus or other malware.
  2. – The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy efficient devices that require little power when they are not in use. For example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours. Computers and devices that meet the ENERGY STAR guidelines display an ENERGY STAR label. Users should not store obsolete computers and devices in their basement, storage room, attic, warehouse, or any other location. Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. In a landfill, these materials release into the environment. Recycling and refurbishing old equipment are much safer alternatives for the environment. Manufacturers can use the millions of pounds of recycled raw materials to make products such as outdoor furniture and automotive parts.
  3. – Information privacy refers to the right of individuals and companies to deny or restrict the cillection and use of information about them.

5 ways to safeguard personal information :

-Fill in only necessary information on rebate, warranty, and registration forms.

-Do not preprint your telephone number or Social Security number on personal checks

-Have an unlisted or unpublished telephone number.
-If caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
-Don’t write your telephone number on charge or credit receipts.

4.Install a phising filter and never click a link in an e-mail message; instead, retype the web address in your browser. By clickjacking an object that can be clicked on a Website, such as a button, immage,or link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur.

5.Many Businesses use content filterig to limit employees Web access. These businesses argue that employees are unproductive when visiting inappropriate or objectionable websites. Some schools,libraries,and parents use content filtering to restrict acces to minors. One approach to content filtering is through a rating system of the internet content rating asscociation (ICRA), which is similar to those used for movies and videos. Major Websites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA, if content athte Website goes beyond the rating limits set in the web browser software, a user cannot access the website. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.

PTI Chapter 11 Computer Security and Safety, Ethics, and Privacy

True\False

  1. False
  2. True
  3. False
  4. True
  5. False
  6. True
  7. True
  8. True
  9. False
  10. False
  11. True
  12. False

Multiple Choice

  1. B
  2. D
  3. A
  4. C
  5. C
  6. D
  7. D
  8. C

Matching

  1. J
  2. D
  3. E
  4. G
  5. I
  6. C
  7. B
  8. A
  9. H
  10. F

Short Answer

  1. We can use scan for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. The antivirus programs use to identify a virus is to look for virus signatures. Virus signature, also called a virus definition, is a known specific pattern of virus code. Computer users should update their antivirus program’s signature files regularly.

Another technique to detect viruses is to inoculate existing program files. To inoculate a program file, the antivirus program records information such as the file size and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file. If an antivirus program indetifies an infected file, it attempts to remove the malware. If the antivirus program cannot remove the infection, it often quarantines the infected file. A quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed, it ensures other files will not become infected.

A virus Hoax is an e-mail message that warns users of a nonexistent virus or other malware.

  1. The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This program encourages manufacturers to create energy efficient devices that require little power when they are not in use. For example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours. Computers and devices that meet the ENERGY STAR guidelines display an ENERGY STAR label. Users should not store obsolete computers and devices in their basement, storage room, attic, warehouse, or any other location. Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. In a landfill, these materials release into the environment. Recycling and refurbishing old equipment are much safer alternatives for the environment. Manufacturers can use the millions of pounds of recycled raw materials to make products such as outdoor furniture and automotive parts.’
  2. Information privacy refers to the right of individuals and companies to deny or restrict the cillection and use of information about them.

5 ways to safeguard personal information :

  • Fill in only necessary information on rebate, warranty, and registration forms.
  • Do not preprint your telephone number or Social Security number on personal checks
  • Have an unlisted or unpublished telephone number.
  • If caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
  • Don’t write your telephone number on charge or credit receipts.
  1.  Install a phising filter and never click a link in an e-mail message; instead, retype the web address in your browser. By clickjacking an object that can be clicked on a Website, such as a button, immage,or link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur.
  2. Many Businesses use content filterig to limit employees Web access. These businesses argue that employees are unproductive when visiting inappropriate or objectionable websites. Some schools,libraries,and parents use content filtering to restrict acces to minors. One approach to content filtering is through a rating system of the internet content rating asscociation (ICRA), which is similar to those used for movies and videos. Major Websites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA, if content athte Website goes beyond the rating limits set in the web browser software, a user cannot access the website. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.