You are on page 1of 6

Final Exam Revision- CPT105 Term1, 2013 1. What is a database? Explain briefly with an example.

A database is a collection of related data shared by various categories of users to fulfill the information needs and requirements of an organization. E.g. Patients DB in a clinic 2. What are the different types of software that the computer user interacts with? Browsers, Word Processing, Spreadsheet, DBMS………….

3. What is the difference between artificial Intelligence (AI) and expert systems? Expert Systems: A computer application that employs a set of rules based on human knowledge to solve problems that require human expertise. Artificial Intelligence is a practical mechanism that enables computers to stimulate the human reasoning process.

4. What are computer viruses? A computer virus is a software code that can multiply and propagate itself. A virus can spread into another computer via e-mail, through the downloading of files from the Internet, or the opening of a contaminated file. It is almost impossible to completely protect a network computer from virus attacks. Programmed threats are computer programs that can create a nuisance, alter or damage data, steal information, or cripple system functions. 5. List 4 different types of Operating systems. MS-DOS, Windows, Mac OS, Linux/Unix 6. What are binary codes? Binary codes consist of only two digits (0 and 1). Data and instructions are represented electronically with binary codes.

7. What is ecommerce? Give examples.

E-commerce provides the capability of buying and selling products and information on the Internet and other online services. B2B B2C – Stelco ePay Service C2C –

give keyboard keys their special control capabilities. What are the different types of memory on the computer system? 1.e. it can only be run in Linux. Computers cannot write or code or change any data or instruction inside the ROM. explain with the help of an example. Its content changes according to changes inside the computer system. RAM is called temporary or volatile storage as everything in RAM is lost as soon as the microcomputer is turned off. This chip provides information such as the total RAM size. If this programme is compiled in Linux. Sometimes called firmware 3. The Random Access Memory (RAM) stores the programs and data being processed by the CPU. it can only be run in Windows. The ROM chip does not evaporate and cannot be changed by users. Flash memory chips can retain data even if power is disrupted. i. such as the addition of new hardware and RAM.The ROM chip contains a program that is loaded in the factory. What is direct access.8. It contains important information that is required every time the computer system is started. ROM chips typically contain special instructions for detailed computer operations. Unlike RAM its powered by a battery and does not lose its contents when the power is turned off. 9. It does not convert programmes into object code. and put characters on the screen. Read-Only means that the CPU can read or access the program written inside the ROM chip. monitor and disc drive. Read Only Memory . What is the difference between the interpreter and compiler? Source code needs to be compiled or converted into object code before it can be run in any computer. types of keyboard. The compilation process is done by the compiler. ROM chips are not volatile and cannot be changed by the user. mouse. 2. ROM instructions may start the computer. it can be run using any operating system. Interpreter functions to translate and execute programmes line by line. CMOS: The CMOS chip provides flexibility and expandability to the computer system. If it is compiled in Windows. . Programmes in the interpreter are portable. 10.

Input devices: Hardware used to provide input to the computer. Digital Camera. Originally these printers were only used in scientific labs to record data. Output devices are any hardware used to provide or to create output from the PC     Monitors Printers Plotter Speaker Printers • Ink-jet printer –Sprays small droplets of ink at high speed onto the surface of he paper. • Image Capturing Devices: Webcams. • Laser printer –Personal laser printers are less expensive and used by many single users. –Shared laser printers are more expensive and are used by a group of users.11. and Mouse. Joystick. What are the different professions in the IT industry?     Technical writers Computer trainers Computer technicians Help desk specialists 12. Sound card. Digital Notepads. • Thermal printer –Use heat elements to produce images on heat-sensitive paper. • Digitizing Devices: Graphical Tablets. –Most photo printers are special-purpose ink-jet printers designed to print photo quality images from digital cameras. Microphone. • Pointing Devices: Touch Screens. QR code Readers. Translates data into a form that the system unit can process • Audio Input Devices: Voice Recognition System. Video Camera. • Scanning Devices: Scanners. List 4 different kinds of input and output devices. Barcode Reader. .

– Privacy: What are the threats to personal privacy and how can we protect ourselves? – Security: How can access to sensitive information be controlled and how can we secure hardware and software? – Ergonomics: What are the physical and mental risks to technology and how can these risks be eliminated or controlled? – Environment: What can individuals and organizations do to minimize the impact of technology on our environment? 16. Compare between file storage manually and using a computer application. List 4 types of wireless and wired network connections.13. – Suggesting alternatives • Suggest some possible plans as alternatives to the present arrangement. stores and disseminates information to support organizational decision making and control. Explain Information Systems. determine what information is needed. What are "cloud computing" and “Server farms”? 17. Give a brief explanation of the 1st phase of systems development life cycle. An Information System is a set of procedures that collects or retrieves. processes. 14. Determine the need for a new IS • Requested by an end user or manager. Wireless INFRARED BROADCAST RADIO MICROWAVE SATTELITE Wired Personal Area Network (PAN) Metropolitan Area Networks (MAN) Wide area networks (WAN) Local area networks (LAN) 15. Write a short note on the topic: “Information technology” . Phase 1: Preliminary Investigation – Problems are briefly identified and a few solutions are suggested. Define the problem • Examine the current IS in use. 18.

Resting your eyes for 15 minutes for every 2 hours of work. Compressing/De-compressing the Files: This is required to remove excessive spaces from the computer files that have reduced total available storage space. Work according to your own energy capacity. 1. This situation is important because: . This group of discs is considered like a large hard disc. Redundant Arrays of Independent Disks (RAID): This increases the performance by having more external storage. not according to pressure or workload. it performs better than a single disc of the same capacity. 20. etc. Exercise appropriately. This is a combination of hardware and software. A collection of cheap hard discs are arranged by using a special network and software.  Physical Health – Eyestrain and headache – Back and neck pain – Repetitive strain injury  Mental Health – Noise – Electronic monitoring  Techno-stress – Stress associated with computer use – Harmful to people Several techniques that can be used to overcome the above health problems are: (3*)        To use equipment that is more ergonomic. (energy star) To use anti-glare on the monitor. 2. such as exercising while sitting. eye exercise.Information System Concerns 19. The use of a resting place for hands and feet. Discuss the topic: “Ergonomics”? Ergonomics* is the study of ways of ensuring a healthy life in relation to the use of computer equipment. To adopt green computerization. However. 3. Racking the Disk: This can upgrade the performance of a hard disc by predicting data that are wanted. Discuss three ways to improve the performance of hard disks.

(a) It saves time while sending files through the network. (c) It is for the purpose of archiving. . (b) It reduces the size of file storage.