You are on page 1of 12

1

IT for Managers
SPECIAL ASSIGNMENT

Lecturer: S. Mohsin Ali

Due Date: July 3, 2019


Name: Sadya Mohsin
ID #: 1018-2019
MBA 2.5
Total Marks: 20
---------------------------------------------------------------------------------------

Q.1 Define the following terms:


(A) DBMS (write full name also) (B) Bar Code Reader (C) Network Topology
(D) Cache Memory (E) Operating System (F) Networking
(G) Data File. Also give one example (H) Output Devices (I) Computer
(J) HTTP (write full name also) (K) Storage Device (L) Software Suites
(M) URL (write full name also) (N) Input Device (O) Magnetic Stripe Reader
(P) Internet (Q) Speaker (R) Communication Devices (S) Plotter
(T) Popup Menu (U) General Purpose Software (V) Information Technology
(W) CAD CAM (write full name also) (X) HDD (write full name also)
(Y) Systems Tray

Q.2 Differentiate between the following:


(A) LAN & WAN (write full names also)
(B) Multitasking and Time-sharing
(C) Hardware and Software of a computer. Give one example of each also
(D) Supercomputer and Mainframe Computer
(E) Bit and Byte
(F) Bus and Ring Topology
(G) Data and Information. Give one example of each also
(H) RAM and ROM (write full names also)
(I) Copying and Moving a file from one folder to another folder

Q.3 List down the following. Just write the names, don’t define or explain.
(A) types of any 4 Micro Computers
(B) Full names of sections of a CPU
(C) any 4 features of an Operating System
(D) any 10 IT jobs
(E) any 4 advantages of Networking
(F) any 10 Advantages and 10 Disadvantages of Computers
(G) any 6 Web Browsers
(H) any 4 Utility Programs
2

Q.1 Define the following terms

Database Management System (DBMS):

A database management system receives instruction from a database administrator (DBA) and accordingly
instructs the system to make the necessary changes. These commands can be to load, retrieve or modify
existing data from the system.

A DBMS always provides data independence. Any change in storage mechanism and formats are performed
without modifying the entire application.

Bar Code Reader:

Barcode readers (barcode scanners) are electronic devices for reading printed barcodes. These are optical
machine-readable representations of data relating to the object to which they are attached. They define these
objects.
Barcode readers consist of a light source, a lens and a light sensor that translates optical impulses into
electrical ones. Additionally, nearly all barcode readers contain decoder circuitry. It analyzes the barcode’s
image data provided by the sensor and sends the barcode’s content to the scanner’s output port.
This equipment is an important tool for warehouse management and operation. It provides a real-time
overview of products (SKUs: stock keeping units) stored in the warehouse, plus additional information, if
need be.

Network Topology

A network topology is the arrangement of nodes -- usually switches, routers, or software switch/router
features -- and connections in a network, often represented as a graph. The topology of the network, and
the relative locations of the source and destination of traffic flows on the network, determine the optimum
path for each flow and the extent to which redundant options for routing exist in the event of a failure. There
are two ways of defining network geometry: the physical topology and the logical (or signal) topology.

Cache Memory

Cache memory, also called CPU memory, is high-speed static random access memory (SRAM)
that a computer microprocessor can access more quickly than it can access regular random access
memory (RAM). This memory is typically integrated directly into the CPU chip or placed on a
separate chip that has a separate bus interconnect with the CPU. The purpose of cache memory is
to store program instructions and data that are used repeatedly in the operation of programs or
information that the CPU is likely to need next. The computer processor can access this
information quickly from the cache rather than having to get it from computer's main memory.
Fast access to these instructions increases the overall speed of the program.

Operating System
3

An operating system (OS) is the program that, after being initially loaded into the computer by a
boot program, manages all of the other application programs in a computer. The application
programs make use of the operating system by making requests for services through a defined
application program interface (API). In addition, users can interact directly with the operating
system through a user interface such as a command line or a graphical user interface (GUI).
Networking
Networking, also known as computer networking, is the practice of transporting and exchanging
data between nodes over a shared medium in an information system. Networking comprises not
only the design, construction and use of a network, but also the management, maintenance and
operation of the network infrastructure, software and policies.

Data File. Also give one example


A data file is any file that contains information, but not code; it is only meant to be read or viewed
and not executed. For example, this web page, a letter you write in a word processor, and a text
file are all considered data files.

Programs may also rely on data files to get information. For instance, a data file may contain the
settings of a program that tell the program how to display information.

Output Devices
An output device is any device used to send data from a computer to another device or user. Most
computer data output that is meant for humans is in the form of audio or video. Thus, most output
devices used by humans are in these categories. Examples include monitors, projectors, speakers,
headphones and printers.

Computer
An output device is any device used to send data from a computer to another device or user. Most
computer data output that is meant for humans is in the form of audio or video. Thus, most output
devices used by humans are in these categories. Examples include monitors, projectors, speakers,
headphones and printers.

HTTP

HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World
Wide Web and this protocol defines how messages are formatted and transmitted, and what actions
Web servers and browsers should take in response to various commands.

Storage Device
A storage device is any computing hardware that is used for storing, porting and extracting data
files and objects. It can hold and store information both temporarily and permanently, and can be
internal or external to a computer, server or any similar computing device.

A storage device may also be known as a storage medium or storage media.

Software Suites
4

A software suite is a collection of two or more software programs that are bundled and sold
together. The software programs may have correlative features and functionality, or they may be
completely different from one another, but share a similar theme.
Example of software suite
A good example of a software suite is Microsoft Office

URL (write full name also)


A uniform resource locator (URL) is the address of a resource on the Internet. A URL indicates
the location of a resource as well as the protocol used to access it.

Input Device
An input device is a hardware or peripheral device used to send data to a computer. An input device
allows users to communicate and feed instructions and data to computers for processing, display,
storage and/or transmission.

Magnetic Stripe Reader


A magnetic stripe reader, also called a magstripe reader, is a hardware device that reads the
information encoded in the magnetic stripe located on the back of a plastic badge.

Internet
The internet is a globally connected network system that uses TCP/IP to transmit data via various
types of media. The internet is a network of global exchanges – including private, public, business,
academic and government networks – connected by guided, wireless and fiber-optic technologies.

Speaker
A device that converts analog audio signals into the equivalent air vibrations in order to make
audible sound. When CRT monitors were the norm, speakers designed for computers were
shielded to avoid magnetic interference with the CRT's magnetic coil.

Communication Devices
A communication device is a hardware device capable of transmitting an analog or digital signal
over the telephone, other communication wire, or wirelessly. The best example of a
communication device is a computer Modem, which is capable of sending and receiving a signal
to allow computers to talk to other computers over the telephone. Other examples of
communication devices include a NIC (network interface card), Wi-Fi devices, and access points.

Plotter
A plotter is a computer hardware device much like a printer that is used for printing vector
graphics. Instead of toner, plotters use a pen, pencil, marker, or another writing tool to draw
multiple, continuous lines onto paper rather than a series of dots like a traditional printer. Though
once widely used for computer-aided design, these devices have more or less been phased out by
wide-format printers. Plotters are used to produce a hard copy of schematics and other similar
applications.

Popup Menu
5

Alternatively referred to as a context menu and shortcut menu, a pop-up menu is a menu that is
hidden and doesn't appear until you right-click. This menu is often referred to as a context menu
because the options in the menu often relate to what was right-clicked. For example, in Microsoft
Word, if text was highlighted and then right-clicked, a shortcut menu similar to the example below
would appear. As can be seen, this shortcut menu gives you quick access to all the most common
features that relate to text, such as cut, copy, font properties, etc.

General Purpose Software


A general purpose application, sometimes known as ‘off-the-shelf’ is the sort of software that you
use at home and school. Examples include word processors, spreadsheets, databases, desktop
publishing packages, graphics packages etc.

Information Technology
Information technology (IT) is the use of any computers, storage, networking and other physical
devices, infrastructure and processes to create, process, store, secure and exchange all forms of
electronic data. Typically, IT is used in the context of enterprise operations as opposed to personal
or entertainment technologies. The commercial use of IT encompasses both computer technology
and telephony.

CAD CAM (write full name also)


CAD/CAM stands for computer-aided design & computer-aided manufacturing. CAD/CAM
software is used to design and manufacture prototypes, finished products, and production runs. An
integrated CAD/CAM system offers one complete solution for design through manufacturing.

HDD (write full name also)


A computer hard disk drive (HDD) is the mechanism that controls the positioning, reading and
writing of the hard disk, which furnishes data storage. A hard disk drive -- often shortened to hard
drive -- and hard disk are not the same thing, but they are packaged as a unit and either term can
refer to the whole unit. Hard disk drives can be found in desktop computers, mobile devices,
consumer electronics and enterprise storage arrays in data centers.

Systems Tray
The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user
interface that is used to display the clock and the icons of certain programs so that a user is
continually reminded that they are there and can easily click one of them. The system tray is a
section located at the one end of the taskbar in Windows 95, 98, and NT. Icons that are often
installed in the system tray include the volume control for sound, anti-virus software, scanner
software, a channel viewer, player, and a system resources indicator. When more icons are installed
in the system tray than can fit in the space allotted, the system tray becomes horizontally scrollable
or expandable. To interact with a program in the system tray, you select an icon with your mouse
and double-click or right-click the icon. When you minimize the program after using it, it shrinks
back into the system tray instead of into the main part of the taskbar.

Q.2 Differentiate between the following:


(A) LAN & WAN (write full names also)
(B) Multitasking and Time-sharing
6

(C) Hardware and Software of a computer. Give one example of each also
(D) Supercomputer and Mainframe Computer
(E) Bit and Byte
(F) Bus and Ring Topology
(G) Data and Information. Give one example of each also
(H) RAM and ROM (write full names also)
(I) Copying and Moving a file from one folder to another folder

LAN & WAN (write full names also)

Differences between Local Area Networks (LANs) and Wide Area Network (WAN)
• A Local Area Network (LAN) is a private computer network that connects computers in small
physical areas. Example: A small office, A Single building, Multiple buildings inside a campus
etc. Wide Area Networks (WAN) is type of computer network to connect offices which are located
in different geographical locations. Wide Area Network (WAN) depends mainly on Internet
Service Providers (ISPs) for connection solutions.

• Local Area Network (LAN) has higher bandwidth rates. Current Local Area Networks (LANs)
runs on bandwidths of 100 Mbps, 1 Gbps or 10 Gbps. Wide Area Networks (WAN) has lower
bandwidth rates compared with Local Area Network (LAN). Current Wide Area Networks runs
on bandwidths of 4 Mbps, 8 Mbps, 20 Mbps, 50 Mbps or 100 Mbps.

• Local Area Network (LAN) bandwidth rates are almost constant. Local Area Network (LAN)
bandwidth rates are dependent on characteristics of the LAN technology in use (Normally
FastEthernet or Gigabit Ethernet). Since most of Wide Area Networks (WAN) connectivity
solutions are dependent on Internet Service Providers (ISPs), budget related constraints affect the
quality of WAN.

• Most of the current Local Area Networks (LANs) use Ethernet as the LAN Standard
(FastEthernet 100 Mbps, or Gigabit Ethernet 1/10 Gbps). WAN uses technologies like VPN
(Virtual Private Network) over Internet, MPLS, FrameRelay, or Leased Lines as WAN
connectivity solutions.

• Since Local Area Networks (LANs) are private networks, managed by dedicated local network
administrators, Local Area Networks (LANs) are more reliable and secure than Wide Area
Networks (WANs). Since Wide Area Networks (WANs) involve 3rd party service providers,
WAN networks are less reliable and secure.

• Initial set-up costs for Local Area Networks (LANs) are low as the devices required to set up the
networks are cheap. Initial set-up costs for Wide Area Networks (WANs) are high, because of the
devices (Routers, Firewalls etc), cables and manpower required.

• Local Area Networks (LANs) running costs are less Wide Area Networks (WANs) running costs
are high. Wide Area Networks (WANs) normally have recurring monthly cost as Service Provider
access fees.
7

• Wide Area Networks (WANs) are more congested than Local Area Networks (LANs).

(B) Multitasking and Time-sharing

Time sharing is the sharing of a computing resource among many users by means of
multiprogramming and multitasking at the same time whereas multitasking is the concurrent
execution of multiple tasks or processes over a certain period of time. Thus, this is the main
difference between time sharing and multitasking.

(C) Hardware and Software of a computer. Give one example of each also

Definition Devices that are required to Collection of instructions that


store and execute (or run) the enables a user to interact with
software the computer. Software is a
program that enables a
computer to perform a specific
task, as opposed to the
physical components of the
system (hardware)
Types Input, storage, processing, System software,
control, and output devices. Programming software, and
Application software.
Function Hardware serve as the To perform the specific task
delivery system for software you need to complete.
solutions. The hardware of a Software is generally not
computer is infrequently needed to for the hardware to
changed, in comparison with perform its basic level tasks
software and data, which are such as turning on and
“soft” in the sense that they responding to input.
are readily created, modified,
or erased on the computer
Examples CD-ROM, monitor, printer, QuickBooks, Adobe Acrobat,
video card, scanners, label Google Chrome, Microsoft
makers, routers and modems. Word, Microsoft Excel, Apple
Maps
Inter dependency Hardware starts functioning To deliver its set of
once software is loaded. instructions, Software is
installed on hardware.
Failure Hardware failure is random. Software failure is systematic.
Hardware does have Software does not have an
increasing failure at the last increasing failure rate.
stage.
Durability Hardware wears out over Software does not wear out
time. over time. However, bugs are
discovered in software as time
passes.
8

Nature Hardware is physical in Software is logical in nature.


nature.

(D) Supercomputer and Mainframe Computer

Mainframes:
• Run multiple programs concurrently
• Support many concurrent users
• Support new and legacy software (backwards compatibility)
• Run many different kinds of operating systems (z/OS, Linux, etc.)
• Uninterrupted operation
• Have performance measured in Millions of Instructions per Second (MIPS).
• Perform tasks on huge amounts of external data
• Are flexible enough to run many kinds of applications and tackle broad business tasks
Supercomputers:
• Focus processing power to execute a few programs or instructions as quickly as possible
• Focused on speed and accelerated performance
• Push boundaries of what hardware and software can accomplish
• Typically run a variant of Linux as their operating system
• Are typically run at maximum capability, putting the computer’s full processing resources
toward solving a particular problem
• Are often a cluster or grid of smaller computers working together on whatever problem they are
looking to solve
• Have performance measured in Floating Point Operations per Second (FLOPS)
• Execute complicated computations using large internal memory
• Have dedicated purposes for tasks like scientific research or engineering models

(E) Bit and Byte


Bits and Bytes both measure amounts of data. However, they are typically used in two different
contexts.
Bits, kilobits (Kbps), and megabits (Mbps) are most often used to measure data transfer speeds.
This may refer to how fast you are downloading a file, or how fast your Internet connection is. For
example, if you are downloading a file on cable modem, your download speed might be 240Kbps.
This is much faster than a dial-up modem, which maxes out at 56Kbps.
Bytes, on the other hand, are used to measure data storage. For example, a CD holds 700MB
(megabytes) of data and a hard drive may hold 250GB (gigabytes). The other important difference
is that bytes contain eight bits of data. Therefore, a 240Kbps download is only transferring 30KB
of data per second. However, kilobytes per second is not as commonly used as kilobits per second
9

for measuring data transfer speeds. After all, using kilobits per second (Kbps) makes your
connection sound eight times faster!

(F) Bus and Ring Topology

BASIS FOR
STAR TOPOLOGY RING TOPOLOGY
COMPARISON

Architecture structure Peripheral nodes are linked to Every node has two branches
the central device known as a connected to a node either side of it.
hub.

Amount of cabling Larger Less as compared to star topology


required

Point of failure Hub Every node in the ring

Data traversal All data passes through the Data moves in only one direction
central network connection. around the ring till it arrives the
destination.

Network expansion A new cable is plugged in from In order to add a new node, a
the new node to the hub. connection must be broken which turns
down the network.

Fault isolation Easy Difficult

Troubleshooting The other nodes are affected When a node goes down the
only in the case of a hub failure. information continues to transfer till the
damaged node.

(G) Data and Information. Give one example of each also

Data Information

Meaning Data is raw, unorganized facts that When data is processed, organized, structured or
need to be processed. Data can be presented in a given context so as to make it
something simple and seemingly useful, it is called information.
random and useless until it is
organized.
10

Data Information

Example Each student's test score is one piece The average score of a class or of the entire
of data. school is information that can be derived from
the given data.

Etymology "Data" comes from a singular Latin "Information" is an older word that dates back to
word, datum, which originally meant the 1300s and has Old French and Middle
"something given." Its early usage English origins. It has always referred to "the act
dates back to the 1600s. Over time of informing,” usually in regard to education,
"data" has become the plural of instruction, or other knowledge communication.
datum.

(H) RAM and ROM (write full names also)


 There is one major difference between a ROM (read-only memory) and a RAM (random-
access memory) chip: ROM can hold data without power and RAM cannot. Essentially,
ROM is meant for permanent storage, and RAM is for temporary storage.
 A ROM chip is used primarily in the startup process of a computer, whereas a RAM chip
is used in the normal operations of a computer once the operating system is loaded.
 A RAM chip can store multiple GB (gigabytes) of data, ranging from 1 to 256 GB per chip.
A ROM chip stores several MB (megabytes) of data, usually 4 to 8 MB per chip.

Difference between Copying and moving one folder to another folder


 Copying is a command that allows creating a similar file or a directory in a new location.
Moving is a command that allows relocating the original file or a directory in a new
location.

 The copying function makes a duplicate of a file or a directory in another location. Moving
will transfer the original file or a directory to another location.

 Copying will not affect the original content, but moving will delete the original content.

Q.3 List down the following. Just write the names, don’t define or explain.
(A) types of any 4 Micro Computers
(B) Full names of sections of a CPU
(C) any 4 features of an Operating System
(D) any 10 IT jobs
(E) any 4 advantages of Networking
(F) any 10 Advantages and 10 Disadvantages of Computers
(G) any 6 Web Browsers
(H) any 4 Utility Programs
11

Types of any 4 Micro Computers


The following is a list of different types of microcomputers:

 Desktop computer
 Notebook or laptop computer
 Tablet computer
 Smartphone

Full names of sections of a CPU


The two typical components of a CPU include the following:
 The arithmetic logic unit (ALU)
 The control unit (CU)

4 features of an Operating System


Features of an Operating system are:
 Hardware Interdependence.
 Provides User Interface.
 Hardware Adaptability.
 Memory Management.

10 IT jobs
1. Technical Support
2. Programmers
3. Web Developers
4. Software Engineer
5. Computer Systems Analyst
6. IT Security
7. Network Engineer
8. Database Administrator
9. Business Intelligence Developer
10. Information Technology Manager

4 advantages of Networking
1. Sharing devices such as printers saves money.
2. Site (software) licenses are likely to be cheaper than buying several standalone licenses.
3. Files can easily be shared between users.
4. Network users can communicate by email and instant messenger.

10 Advantages and 10 Disadvantages of Computers


List of Advantages of Computer
12

1. It enhances communication and availability of information.


2. It allows for more convenient resource sharing.
3. It makes file sharing easier.
4. It is highly flexible.
5. It is an inexpensive system.
6. It increases cost efficiency.
7. It boosts storage capacity.
8. It can perform not only calculations but also with accuracy.
9. Computer provide security from destructive forces and from unwanted action from
unauthorized users like cyber-attack or access attack.
10. Person can perform multiple task, multiple operation, calculate numerical problems within
few seconds. Computer can perform trillion of instructions per second.

List of Disadvantages of Computer


1. Virus and hacking attacks
2. Online Cyber Crimes
3. Reduction in employment opportunity
4. It lacks independence.
5. It poses security difficulties.
6. It lacks robustness.
7. It allows for more presence of computer viruses and malware.
8. Its light policing usage promotes negative acts.
9. It requires an efficient handler.
10. It requires an expensive set-up.

6 Web Browsers
1. Mozilla Firefox
2. Google Chrome
3. Brave
4. Ghost
5. Opera
6. Vivaldi

4 Utility Programs
1. File Viewer.
2. File Compressor.
3. Diagnostic Utilities.
4. Disk Scanner.

You might also like