True/False
1. True
2. True
3. True
4. True
5. True
6. False
7. False
8. True
9. False
10. False
Multiple Choice
1.b
2.c
3.c
4.a
5.a
6.c
7.b
8.b
Matching
1.g
2.d
3.j
4.i
5.c
6.e
7.a
8.h
9.b
10.f
Short Answers
1. Compiler is a program that converts all source program to machine language before executes it. Interpreter is a program that converts a statement of a program to machine language before executes it.
Advantage of intepreter : when errors are found, it directly gives feedback to user. The disadvantage of it is that it runs slower than compiled progams.
2. The major benefit of OOP is that we can reuse and edit existing objects.
RAD enable users not to write the whole code for the whole program, instead, just by using the tools to create the objects of the program will give a great shortcut to the user in developing the program.
3. Integrated Development Environment includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.
Visual Basic (VB) is used to create a complex task-oriented object-based system. Visual C++ is a programming languange which based on C++. Visual C# is a programming language that combines the C++ features, but with greater speed and efficiency.
4. XML is used to show different displays of certain websites on different devices, like PDA, tablets, smartphone, etc.
Two applications of XML are RSS 2.0 and ATOM. Both of them allow users to distribute their website's contents (either new or old ones) to their website's subscribers.
5. Two activities of documenting solution : (1) review the program code : to see wheter there are still unused codes that are making the program running slowly.
(2) review all the documentation : programmer gives all documentation to system analyst.
Proper documentation is important because it will help the programmer easier to debug in future and also can help new programmer to understand the program faster.
Wednesday, January 16, 2013
Monday, January 14, 2013
Answers of Chapter 12 "Discovering Computers : Living in a Digital World"
True/False
1. True
2. True
3. False
4. False
5. False
6. True
7. False
8. False
9. True
10. True
11. False
Multiple Choice
1.a
2.b
3.c
4.a
5.c
6.d
7.a
8.d
Matching
1.h
2.e
3.a
4.b
5.i
6.g
7.f
8.j
9.c
10.k
Short Answers
1. System development is the activities creating an information system.
The five phases of system development life cycle (SDLC):
- Planning : plan all things that are going to be used in the information system development
- Analysis : analyze the current system that needs development
- Design : find the hardwares and softwares needed
- Implementation : design new program or better program and train users
- Operation, Support, and Security : keep maintenancing the program
2. The four feasibilities assessment :
- operational feasibility : determines how well the system will work
- schedule feasibility : determines whether the deadline of the system is logical
- technical feasibility : determines the company has the ability to use that system
- economic feasibility : determines whether the system will return greater benefits that its cost
To gather data and information, we can review documentation, observe, survey, interview, participate in joint-application design ( JAD) sessions, and research.
3. UML has been used as the standard for object modelling and development in big companies.
A use case diagram shows how users interact with the system, while class diagram shows the system into classes and sub-classes
4. Those three major activities of operation, support, and security phase : (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
Three types of maintenance :
- corrective maintenance : corrects the wrong sector of the information system
- adaptive maintenance : includes new features to the system
- perfective maintenance : investigates and makes the system more flexible and reliable
5. Computer security plan is the safeguard to protects all the important information of a company.
Three things that a computer security plan should do :
- identify all information assets of an organization
- identify all security risks
- identify all safeguard solutions for each security risk
1. True
2. True
3. False
4. False
5. False
6. True
7. False
8. False
9. True
10. True
11. False
Multiple Choice
1.a
2.b
3.c
4.a
5.c
6.d
7.a
8.d
Matching
1.h
2.e
3.a
4.b
5.i
6.g
7.f
8.j
9.c
10.k
Short Answers
1. System development is the activities creating an information system.
The five phases of system development life cycle (SDLC):
- Planning : plan all things that are going to be used in the information system development
- Analysis : analyze the current system that needs development
- Design : find the hardwares and softwares needed
- Implementation : design new program or better program and train users
- Operation, Support, and Security : keep maintenancing the program
2. The four feasibilities assessment :
- operational feasibility : determines how well the system will work
- schedule feasibility : determines whether the deadline of the system is logical
- technical feasibility : determines the company has the ability to use that system
- economic feasibility : determines whether the system will return greater benefits that its cost
To gather data and information, we can review documentation, observe, survey, interview, participate in joint-application design ( JAD) sessions, and research.
3. UML has been used as the standard for object modelling and development in big companies.
A use case diagram shows how users interact with the system, while class diagram shows the system into classes and sub-classes
4. Those three major activities of operation, support, and security phase : (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
Three types of maintenance :
- corrective maintenance : corrects the wrong sector of the information system
- adaptive maintenance : includes new features to the system
- perfective maintenance : investigates and makes the system more flexible and reliable
5. Computer security plan is the safeguard to protects all the important information of a company.
Three things that a computer security plan should do :
- identify all information assets of an organization
- identify all security risks
- identify all safeguard solutions for each security risk
Answers of Chapter 11 "Discovering Computers 2011 : Living in a Digital World"
True/False
1. False
2. True
3. False
4. True
5. False
6. True
7. True
8. True
9. True
10. False
11. True
12. True
Multiple Choice
1.b
2.d
3.a
4.c
5.c
6.d
7.d
8.c
Matching
1.j
2.d
3.e
4.g
5.i
6.c
7.b
8.a
9.h
10.f
Short Answers
1. Antivirus protects the computer by identifying and deleting viruses in all storage of the computer.
Virus hoax is the e-mail that tries to tell unexisted virus to the recipients.
2. Energy Star is a program that creates the concept of energy-efficient computing, which when computers are not in use, they should not consume many electricity by turning it to sleep mode or other modes.
Users should not store obsolete computers in their house, instead, they can send itu to manufactures to reuse those computers to create furnitures.
3. Information privacy is the rights of the individuals or companies to restrict the use of their information.
To protect our information, we can use : encryption, digital certificates, transport layer security, secure HTTP, and VPN.
4. By using phishing filter and not clicking on phishing emails.
Clickjacking happens when users click on an object in the web, like buttons, images, then it will generates some events that is not beneficial to users.
5. Companies and schools use content filtering.
The rating of content filtering works on whether certain website passes the limits or not. If it has not passed the limit, it still can be shown to users. This facility applied in Yahoo!, AOL, etc. Another rating is through the Web filtering software that creates firewall to computers for the content filtering.
1. False
2. True
3. False
4. True
5. False
6. True
7. True
8. True
9. True
10. False
11. True
12. True
Multiple Choice
1.b
2.d
3.a
4.c
5.c
6.d
7.d
8.c
Matching
1.j
2.d
3.e
4.g
5.i
6.c
7.b
8.a
9.h
10.f
Short Answers
1. Antivirus protects the computer by identifying and deleting viruses in all storage of the computer.
Virus hoax is the e-mail that tries to tell unexisted virus to the recipients.
2. Energy Star is a program that creates the concept of energy-efficient computing, which when computers are not in use, they should not consume many electricity by turning it to sleep mode or other modes.
Users should not store obsolete computers in their house, instead, they can send itu to manufactures to reuse those computers to create furnitures.
3. Information privacy is the rights of the individuals or companies to restrict the use of their information.
To protect our information, we can use : encryption, digital certificates, transport layer security, secure HTTP, and VPN.
4. By using phishing filter and not clicking on phishing emails.
Clickjacking happens when users click on an object in the web, like buttons, images, then it will generates some events that is not beneficial to users.
5. Companies and schools use content filtering.
The rating of content filtering works on whether certain website passes the limits or not. If it has not passed the limit, it still can be shown to users. This facility applied in Yahoo!, AOL, etc. Another rating is through the Web filtering software that creates firewall to computers for the content filtering.
Thursday, December 20, 2012
Answers of Chapter 10 "Discovering Computers 2011 : Living in a Digital World"
True/False
1. True
2. True
3. False
4. True
5. False
6. False
7. True
8. True
9. True
10. True
Multiple Choice
1. b
2.a
3.d
4.b
5.a
6.b
7.b
8.a
Matching
1.e
2.g
3.c
4.b
5.j
6.a
7.i
8.d
9.h
10.f
Short Answers
1. Validation is the process of comparing data with a set of rules or values to see if the data is correct.
The five types of validation checks : alphabetic checks, numeric checks, range checks, consistency checks, and completeness checks.
2. Because data redundancy will make the process of inputting new data longer and also increase the chance of errors.
Because isolated datas will limit the access of data that is actually needed for certain purposes since different data are stored in different file.
3. A program to share the data in database.
The 5 strength of database approach : reduced data redundancy, improved data integrity, shared data, easier access, reduced development time.
4. I might use the Simple Query Wizard to search the information I need from a database so it will cut my time more.
Query by example is a feature that has a graphical user interface to assist users with retrieving data.
5. Object-oriented databases have several advantages compared with relational databases: they can store more types of data, access this data faster, and allow programmers to reuse objects.
Examples of applications appropriate for an object-oriented database include the following:
• A multimedia database stores images, audio clips, and/or video clips. For example, a GIS (geographic
information system) database stores maps and other geographic data. A voice mail system database stores audio messages. A television news station database stores audio and video clips.
• A groupware database stores documents such as schedules, calendars, manuals, memos, and reports. Users perform queries to search the document contents. For example, you can search people’s schedules for available meeting times.
• A computer-aided design (CAD) database stores data about engineering, architectural, and scientific designs. Data in the database includes a list of components of the item being designed, the relationship among the components, and previous versions of the design drafts.
• A hypertext database contains text links to other types of documents. A hypermedia database contains text, graphics, video, and sound. The Web contains a variety of hypertext and hypermedia databases. You can search these databases for items such as documents, graphics, audio and video clips, and links to Web pages.
1. True
2. True
3. False
4. True
5. False
6. False
7. True
8. True
9. True
10. True
Multiple Choice
1. b
2.a
3.d
4.b
5.a
6.b
7.b
8.a
Matching
1.e
2.g
3.c
4.b
5.j
6.a
7.i
8.d
9.h
10.f
Short Answers
1. Validation is the process of comparing data with a set of rules or values to see if the data is correct.
The five types of validation checks : alphabetic checks, numeric checks, range checks, consistency checks, and completeness checks.
2. Because data redundancy will make the process of inputting new data longer and also increase the chance of errors.
Because isolated datas will limit the access of data that is actually needed for certain purposes since different data are stored in different file.
3. A program to share the data in database.
The 5 strength of database approach : reduced data redundancy, improved data integrity, shared data, easier access, reduced development time.
4. I might use the Simple Query Wizard to search the information I need from a database so it will cut my time more.
Query by example is a feature that has a graphical user interface to assist users with retrieving data.
5. Object-oriented databases have several advantages compared with relational databases: they can store more types of data, access this data faster, and allow programmers to reuse objects.
Examples of applications appropriate for an object-oriented database include the following:
• A multimedia database stores images, audio clips, and/or video clips. For example, a GIS (geographic
information system) database stores maps and other geographic data. A voice mail system database stores audio messages. A television news station database stores audio and video clips.
• A groupware database stores documents such as schedules, calendars, manuals, memos, and reports. Users perform queries to search the document contents. For example, you can search people’s schedules for available meeting times.
• A computer-aided design (CAD) database stores data about engineering, architectural, and scientific designs. Data in the database includes a list of components of the item being designed, the relationship among the components, and previous versions of the design drafts.
• A hypertext database contains text links to other types of documents. A hypermedia database contains text, graphics, video, and sound. The Web contains a variety of hypertext and hypermedia databases. You can search these databases for items such as documents, graphics, audio and video clips, and links to Web pages.
Answers of Chapter 9 "Discovering Computers 2011 : Living in a Digital World"
True/False
1. True
2. False
3. True
4. False
5. True
6. True
7. False
8. True
9. True
10. True
Multiple Choice
1.c
2.c
3.c
4.c
5.b
6.a
7.d
8.b
Matching
1.e
2.j
3.h
4.d
5.f
6.a
7.g
8.b
9.c
10.i
Short Answers
1. Text messaging allows users to send and receive short text messages, typically fewer than 300 characters, on a phone or other mobile device or computer.
Options for text messaging :
• Mobile to Mobile: send a message from your mobile device to another mobile device
• Mobile to E-Mail: send a message from your mobile device to an e-mail address
• Web to Mobile: send a message from a text messaging Web site to a mobile device, or request that a Web site alert a mobile device with messages of breaking news and other updates
• Mobile to Provider: send a message by entering a common short code (CSC), which is a four- or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes.
2. GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS receiver, which determines its location on Earth by analyzing at least 3 separate satellite signals from the 24 satellites in orbit.
Individuals use the GPS in their mobile phone, vehicle, or may be to know their children's location, so they put the receiver on the children's bag, etc.
3. A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building. A metropolitan area network (MAN) is
a high-speed network that connects local area networks in a city or town and handles the bulk of communications activity across that region. A wide area network (WAN) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
A wireless LAN (WLAN) is a LAN that is wireless.
4. A network topology refers to the layout of the computers and devices in a communications network. Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM.
5. Three types of digital modems are ISDN modems, DSL modems, and cable modems.
An ISDN modem sends digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line. A DSL modem sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line.A cable modem, sometimes called a
broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network.
1. True
2. False
3. True
4. False
5. True
6. True
7. False
8. True
9. True
10. True
Multiple Choice
1.c
2.c
3.c
4.c
5.b
6.a
7.d
8.b
Matching
1.e
2.j
3.h
4.d
5.f
6.a
7.g
8.b
9.c
10.i
Short Answers
1. Text messaging allows users to send and receive short text messages, typically fewer than 300 characters, on a phone or other mobile device or computer.
Options for text messaging :
• Mobile to Mobile: send a message from your mobile device to another mobile device
• Mobile to E-Mail: send a message from your mobile device to an e-mail address
• Web to Mobile: send a message from a text messaging Web site to a mobile device, or request that a Web site alert a mobile device with messages of breaking news and other updates
• Mobile to Provider: send a message by entering a common short code (CSC), which is a four- or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes.
2. GPS satellites orbit Earth. Every thousandth of a second, each satellite sends a signal that indicates its current position to the GPS receiver, which determines its location on Earth by analyzing at least 3 separate satellite signals from the 24 satellites in orbit.
Individuals use the GPS in their mobile phone, vehicle, or may be to know their children's location, so they put the receiver on the children's bag, etc.
3. A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building. A metropolitan area network (MAN) is
a high-speed network that connects local area networks in a city or town and handles the bulk of communications activity across that region. A wide area network (WAN) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
A wireless LAN (WLAN) is a LAN that is wireless.
4. A network topology refers to the layout of the computers and devices in a communications network. Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM.
5. Three types of digital modems are ISDN modems, DSL modems, and cable modems.
An ISDN modem sends digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line. A DSL modem sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line.A cable modem, sometimes called a
broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network.
Sunday, December 16, 2012
Answers of Chapter 8 "Discovering Computers 2011 : Living in a Digital World"
True/False
1. False
2. False
3. True
4. True
5. True
6. True
7. True
8. True
9. False
10. True
Multiple Choice
1.b
2.b
3.c
4.a
5.c
6.d
7.c
8.a
Matching
1.f
2.c
3.g
4.d
5.e
6.h
7.a
8.b
9.i
10.j
Short Answers
1. When turning on a computer that has been powered off completely, you are performing a cold boot. A warm boot is the process of using the operating system to restart a computer.
The kernel is memory resident, which means it remains in memory while the computer is running. Other parts of the operating system are nonresident, that is, these instructions remain on a storage medium until they are needed.
2. A user interface controls how you enter data and instructions and how information is displayed on the screen.
With a graphical user interface (GUI), you interact with menus and visual images such as buttons and other graphical objects to issue commands. While to configure devices, manage system resources, and troubleshoot network connections, network administrators and other advanced users work with a command-line interface.
3. With an operating system, you can download and install important operating system and utility updates. updates can include fixes to program bugs, or errors, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games, and even updates to application software on the computer such as a Web browser or an e-mail program, and the automatic update feature automatically alert users when an update is available; further, it can be configured to download and install the update automatically.
4. During the back up process, the utility monitors progress and alerts you if it needs additional media, such as another disc.
Because they are compressed, you usually cannot use backup files in their backed up form. If you need to use a backup file, a restore utility reverses the process and returns backed up files to their original form. Backup utilities work with a restore utility.
5. Popular embedded operating systems include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. Windows Embedded CE is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality. Windows Mobile, an operating system based on Windows Embedded CE, provides a user interface designed for specifi c types of smart phones and PDAs. Palm OS is an operating system used on smart phones and PDAs. iPhone OS,
The BlackBerry operating system runs on handheld devices supplied by RIM. Google Android is an operating system developed by Google for mobile devices. Embedded Linux is a scaled-down Linux operating system for smart phones, PDAs, portable media players, and other devices requiring an embedded operating system. Symbian OS is an open source multitasking operating system designed for smart phones.
1. False
2. False
3. True
4. True
5. True
6. True
7. True
8. True
9. False
10. True
Multiple Choice
1.b
2.b
3.c
4.a
5.c
6.d
7.c
8.a
Matching
1.f
2.c
3.g
4.d
5.e
6.h
7.a
8.b
9.i
10.j
Short Answers
1. When turning on a computer that has been powered off completely, you are performing a cold boot. A warm boot is the process of using the operating system to restart a computer.
The kernel is memory resident, which means it remains in memory while the computer is running. Other parts of the operating system are nonresident, that is, these instructions remain on a storage medium until they are needed.
2. A user interface controls how you enter data and instructions and how information is displayed on the screen.
With a graphical user interface (GUI), you interact with menus and visual images such as buttons and other graphical objects to issue commands. While to configure devices, manage system resources, and troubleshoot network connections, network administrators and other advanced users work with a command-line interface.
3. With an operating system, you can download and install important operating system and utility updates. updates can include fixes to program bugs, or errors, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games, and even updates to application software on the computer such as a Web browser or an e-mail program, and the automatic update feature automatically alert users when an update is available; further, it can be configured to download and install the update automatically.
4. During the back up process, the utility monitors progress and alerts you if it needs additional media, such as another disc.
Because they are compressed, you usually cannot use backup files in their backed up form. If you need to use a backup file, a restore utility reverses the process and returns backed up files to their original form. Backup utilities work with a restore utility.
5. Popular embedded operating systems include Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, embedded Linux, and Symbian OS. Windows Embedded CE is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality. Windows Mobile, an operating system based on Windows Embedded CE, provides a user interface designed for specifi c types of smart phones and PDAs. Palm OS is an operating system used on smart phones and PDAs. iPhone OS,
The BlackBerry operating system runs on handheld devices supplied by RIM. Google Android is an operating system developed by Google for mobile devices. Embedded Linux is a scaled-down Linux operating system for smart phones, PDAs, portable media players, and other devices requiring an embedded operating system. Symbian OS is an open source multitasking operating system designed for smart phones.
Friday, December 14, 2012
Answers of Chapter 7 "Discovering Computers 2011 : Living in a Digital World"
True/False
1. True
2. False
3. False
4. False
5. False
6. True
7. False
8. True
9. False
10. True
11. False
12. False
13. True
Multiple Choice
1.b
2.c
3.d
4.d
5.a
6.c
7.b
8.b
Matching
1.h
2.c
3.a
4.e
5.f
6.j
7.d
8.b
9.i
10.g
Short Answers
1. A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage.
Six Terabytes and more.
2. Advantages of SAS over parallel SCSI include thinner, longer cables, reduced interference, less expensive, support for many more connected devices at once, and faster speeds.
SAS interfaces support connections to optical disc drives, printers, scanners, digital cameras, and other devices.
3. Multisession disc means we can write on part of the disc at one time and another part at a later time.
Many people use archive discs and picture discs to preserve their photos.
4. People use memory cards because memory cards enable mobile users easily to transport digital photos, music, or files to and from mobile devices and computers or other devices.
Common types of memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, micro SDHC. CompactFlash (CF) is used on digital cameras, smart phones, PDAs, photo printers, portable media players, notebook computers, desktop computers. Secure Digital (SD) is used on digital cameras, digital video cameras, smart phones, PDAs, photo printers, portable media players. Secure Digital High Capacity (SDHC) is used on digital cameras. The microSD is used on Smart phones, portable media players, handheld game consoles, handheld navigation devices. The micro SDCH is used on Smart phones, portable media players, handheld game consoles, handheld navigation devices.
5. The difference is the size ; Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4x6 inches.
Libraries use these media to store back issues of newspapers, magazines, and genealogy records. Some large organizations use microfilm and microfiche to archive inactive files. Some banks use them to store transactions and canceled checks. The U.S. Army uses them to store personnel records.
1. True
2. False
3. False
4. False
5. False
6. True
7. False
8. True
9. False
10. True
11. False
12. False
13. True
Multiple Choice
1.b
2.c
3.d
4.d
5.a
6.c
7.b
8.b
Matching
1.h
2.c
3.a
4.e
5.f
6.j
7.d
8.b
9.i
10.g
Short Answers
1. A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage.
Six Terabytes and more.
2. Advantages of SAS over parallel SCSI include thinner, longer cables, reduced interference, less expensive, support for many more connected devices at once, and faster speeds.
SAS interfaces support connections to optical disc drives, printers, scanners, digital cameras, and other devices.
3. Multisession disc means we can write on part of the disc at one time and another part at a later time.
Many people use archive discs and picture discs to preserve their photos.
4. People use memory cards because memory cards enable mobile users easily to transport digital photos, music, or files to and from mobile devices and computers or other devices.
Common types of memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, micro SDHC. CompactFlash (CF) is used on digital cameras, smart phones, PDAs, photo printers, portable media players, notebook computers, desktop computers. Secure Digital (SD) is used on digital cameras, digital video cameras, smart phones, PDAs, photo printers, portable media players. Secure Digital High Capacity (SDHC) is used on digital cameras. The microSD is used on Smart phones, portable media players, handheld game consoles, handheld navigation devices. The micro SDCH is used on Smart phones, portable media players, handheld game consoles, handheld navigation devices.
5. The difference is the size ; Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4x6 inches.
Libraries use these media to store back issues of newspapers, magazines, and genealogy records. Some large organizations use microfilm and microfiche to archive inactive files. Some banks use them to store transactions and canceled checks. The U.S. Army uses them to store personnel records.
Subscribe to:
Comments (Atom)