Thursday, January 17, 2013

Answers of Chapter 15 "Discovering Computers 2011 : Living in a Digital World"


True/False
1. True
2. False
3. True
4. True
5. True
6. False
7. True
8. True
9. True
10. False

Multiple Choice
1.a
2.c
3.c
4.a
5.d
6.b
7.a
8.b

Matching
1.e
2.d
3.j
4.g
5.h
6.b
7.f
8.i
9.a
10.c

Short Answers
1. The advantage of attending trade school is time saving in learning something, because in trade school, they teach focusly on what you choose.
We should consider curricula, laboratory facilities, instructors, and the types of jobs the school's graduates have obtained, before attending the trade school.

2. Participating in professional growth and continuing study, we can get specific information of equipment, software, services, and issues affecting the computer industry.
The ways to keep knowing the growth of industry trends and technologies are professional organizations
and personal networks, professional growth and continuing education activities, computer publications and Web sites, and certification

3. The how-to when choosing certification :
(1) see again your career goals and interests
(2) assess your background knowledge and experiences
(3) find the best certification that suites you

The four options when preparing certification:
(1) self study : study by yourself using all medias available right now
(2) online trainning classes : allows users to interact and study in the online class using the Internet facility
(3) Instructor-led training : the training held by a instructor through different types of seminars, trainings
(4) web resources : study from the links given that will help you understand more about the material

4. The programmer/developer certification mainly focuses on the ability of the programmer to code / make a program. Other type of certification that may be beneficial too is in networking and Web design certification.

People who might interested in programmer/developer certification :
• Java programmers
• Mobile application developers
• Oracle database managers
• Programming consultants
• SQL programmers
• Web software developers
• XML developers

5. Hardware certifications test whether the candidates have the ability to repair certain hardware and also to identify the computing needs of a company while the at same time, introducing the solution for the needs.

People who might interested in programmer/developer certification:
• Cable installation technicians
• Computer repair technicians
• Corporate trainers
• Help desk specialists
• IT consultants
• System engineers and administrators

Answers of Chapter 14 "Discovering Computers 2011 : Living in a Digital World"


True/False
1. True
2. False
3. True
4. True
5. False
6. False
7. True
8. True
9. True
10. True

Multiple Choice

1.c
2.b
3.a
4.b
5.a
6.d
7.a
8.d


Matching
1.h
2.f
3.b
4.e
5.d
6.g
7.a
8.j
9.i
10.c


Short Answers
1. Managers's responsibilities are in coordinating and controlling the resources of an organization.
The activities done by manager to coordinate the resources of an organization : planning, organizing, leading, controlling.

2. CMS is an information system that combines databases, softwares, and procedures that allow users to access to many forms of files.
Types of content that may be processed by CMS : images, multimetida datas, security controls, metadata.

3. Server virtualization : can divide physical servers to many virtual servers, and storage virtualization : can combine many physical storage devices into single logical storage.
Cloud computing is a service using Internet to give computer needs to users. Grid computing is the networking, which combines many servers and/or PC into one large computer.

4. E-retail, finance, travel, health, and entertainment and health.
E-retail : occurs when users want to sell their product online. Health : websites providing up-to-date medicines, health information, exercises to the world. Travel : websites allowing users to know how-to reach certain places from their current place, or to book a flight.

5. Backup plan should contain the location of alternate computer facility in case of the organization's event normal location is destroyed.

The aspects contributing to the success of a backup plan : backing up all important resources, numbers of people trained in the backup and recovery procedures.

Wednesday, January 16, 2013

Answers of Chapter 13 "Discovering Computers 2011 : Living in a Digital World"

True/False
1. True
2. True
3. True
4. True
5. True
6. False
7. False
8. True
9. False
10. False

Multiple Choice

1.b
2.c
3.c
4.a
5.a
6.c
7.b
8.b


Matching
1.g
2.d
3.j
4.i
5.c
6.e
7.a
8.h
9.b
10.f

Short Answers
1. Compiler is a program that converts all source program to machine language before executes it. Interpreter is a program that converts a statement of a program to machine language before executes it.

Advantage of intepreter : when errors are found, it directly gives feedback to user. The disadvantage of it is that it runs slower than compiled progams.

2. The major benefit of OOP is that we can reuse and edit existing objects.
RAD enable users not to write the whole code for the whole program, instead, just by using the tools to create the objects of the program will give a great shortcut to the user in developing the program.

3. Integrated Development Environment includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.
Visual Basic (VB) is used to create a complex task-oriented object-based system. Visual C++ is a programming languange which based on C++. Visual C# is a programming language that combines the C++ features, but with greater speed and efficiency.

4. XML is used to show different displays of certain websites on different devices, like PDA, tablets, smartphone, etc.
Two applications of XML are RSS 2.0 and ATOM. Both of them allow users to distribute their website's contents (either new or old ones) to their website's subscribers.

5. Two activities of documenting solution :  (1) review the program code : to see wheter there are still unused codes that are making the program running slowly.
(2) review all the documentation : programmer gives all documentation to system analyst.

Proper documentation is important because it will help the programmer easier to debug in future and also can help new programmer to understand the program faster.

Monday, January 14, 2013

Answers of Chapter 12 "Discovering Computers : Living in a Digital World"

True/False
1. True
2. True
3. False
4. False
5. False
6. True
7. False
8. False
9. True
10. True
11. False

Multiple Choice
1.a
2.b
3.c
4.a
5.c
6.d
7.a
8.d


Matching
1.h
2.e
3.a
4.b
5.i
6.g
7.f
8.j
9.c
10.k

Short Answers
1. System development is the activities creating an information system.
The five phases of system development life cycle (SDLC):
- Planning : plan all things that are going to be used in the information system development
- Analysis : analyze the current system that needs development
- Design : find the hardwares and softwares needed
- Implementation : design new program or better program and train users
- Operation, Support, and Security : keep maintenancing the program

2. The four feasibilities assessment :
- operational feasibility : determines how well the system will work
- schedule feasibility : determines whether the deadline of the system is logical
- technical feasibility : determines the company has the ability to use that system
- economic feasibility : determines whether the system will return greater benefits that its cost

To gather data and information, we can review documentation, observe, survey, interview, participate in joint-application design ( JAD) sessions, and research.

3. UML has been used as the standard for object modelling and development in big companies.
A use case diagram shows how users interact with the system, while class diagram shows the system into classes and sub-classes

4. Those three major activities of operation, support, and security phase : (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
Three types of maintenance :
- corrective maintenance : corrects the wrong sector of the information system
- adaptive maintenance : includes new features to the system
- perfective maintenance :  investigates and makes the system more flexible and reliable

5. Computer security plan is the safeguard to protects all the important information of a company.
Three things that a computer security plan should do :
- identify all information assets of an organization
- identify all security risks
- identify all safeguard solutions for each security risk

Answers of Chapter 11 "Discovering Computers 2011 : Living in a Digital World"

True/False
1. False
2. True
3. False
4. True
5. False
6. True
7. True
8. True
9. True
10. False
11. True
12. True

Multiple Choice
1.b
2.d
3.a
4.c
5.c
6.d
7.d
8.c


Matching
1.j
2.d
3.e
4.g
5.i
6.c
7.b
8.a
9.h
10.f

Short Answers
1. Antivirus protects the computer by identifying and deleting viruses in all storage of the computer.
Virus hoax is the e-mail that tries to tell unexisted virus to the recipients.

2. Energy Star is a program that creates the concept of energy-efficient computing, which when computers are not in use, they should not consume many electricity by turning it to sleep mode or other modes.
Users should not store obsolete computers in their house, instead, they can send itu to manufactures to reuse those computers to create furnitures.

3. Information privacy is the rights of the individuals or companies to restrict the use of their information.
To protect our information, we can use : encryption, digital certificates, transport layer security, secure HTTP, and VPN.

4. By using phishing filter and not clicking on phishing emails.
Clickjacking happens when users click on an object in the web, like buttons, images, then it will generates some events that is not beneficial to users.

5. Companies and schools use content filtering.
The rating of content filtering works on whether certain website passes the limits or not. If it has not passed the limit, it still can be shown to users. This facility applied in Yahoo!, AOL, etc. Another rating is through the Web filtering software that creates firewall to computers for the content filtering.