You are on page 1of 10

1. what are the principles components of telecommunication networks?

A simple network consists of two or more connected computers. The principal


components of telecommunications networks include server, router, switches, and PCs.
Basic network components include computers, network interfaces, a connection medium,
network operating system software, and either a hub or a switch. The networking
infrastructure for a large company includes the traditional telephone system, mobile
cellular communication, wireless local area networks, videoconferencing systems, a
corporate Web site, intranets, extranets, and an array of local and wide area networks,
including the Internet. Contemporary networks have been shaped by the rise of
client/server computing, the use of packet switching, and the adoption of Transmission
Control Protocol/Internet Protocol (TCP/IP) as a universal communications standard for
linking disparate networks and computers, including the Internet. Protocols provide a
common set of rules that enable communication among diverse components in a
telecommunications network.

2. what are the different types of networks?


1) Local area networks (LANs) connect personal computers (PCs) and other digital
devices together within a 500-metre radius and are used today for many corporate
computing tasks. Network components may be connected together using a star, bus,
or ring topology.
LAN is a computer network that consists of access points, cables, routers, and
switches that enable devices to connect to web servers and internal servers within a
single building, campus, or home network.

By Mohamed Said Omar MIBF 1


2)  Wide area networks (WANs) span broad geographical distances, ranging from
several miles to continents, and are private networks that are independently managed.
A wide area network (also known as WAN), is a large network of information that is
not tied to a single location. WANs can facilitate communication, the sharing of
information and much more between devices from around the world through a WAN
provider. WAN-Wide Area Network Example the Internet is a WAN.

By Mohamed Said Omar MIBF 2


3. Metropolitan area networks (MANs) span a single urban area. Digital subscriber line
(DSL) technologies, cable Internet connections, and T1 lines are often used for high-
capacity Internet connections. Cable Internet connections provide high-speed access to
the Web or corporate intranets at speeds of up to 10 megabits per second (Mbps). A T1
line supports a data transmission rate of 1.544 Mbps.
A metropolitan area network (MAN) is a computer network that connects computers
within a metropolitan area, which could be a single large city, multiple cities and towns,
or any given large area with multiple buildings. A MAN is larger than a local area
network (LAN) but smaller than a wide area network (WAN). Most example Television
cable.

3: Discuss the different type of the network topologies?

There are two types of network topologies: physical and logical. Physical topology emphasizes
the physical layout of the connected devices and nodes, while the logical topology focuses on the
pattern of data transfer between network nodes.

The physical and logical network topologies of a network do not necessarily have to be identical.
However, both physical and network topologies can be categorized into five basic models:

 Bus Topology: All the devices/nodes are connected sequentially to the same backbone or
transmission line. This is a simple, low-cost topology, but its single point of failure

By Mohamed Said Omar MIBF 3


presents a risk.

 Star Topology: All the nodes in the network are connected to a central device like a hub
or switch via cables. Failure of individual nodes or cables does not necessarily create
downtime in the network but the failure of a central device can. This topology is the most
preferred and popular model.
 Ring Topology: All network devices are connected sequentially to a backbone as in bus
topology except that the backbone ends at the starting node, forming a ring. Ring
topology shares many of bus topology's disadvantages so its use is limited to networks
that demand high throughput.

 Tree Topology: A root node is connected to two or more sub-level nodes, which
themselves are connected hierarchically to sub-level nodes. Physically, the tree topology
is similar to bus and star topologies; the network backbone may have a bus topology,
while the low-level nodes connect using star topology.

 Mesh Topology: The topology in each node is directly connected to some or all the other
nodes present in the network. This redundancy makes the network highly fault-tolerant
but the escalated costs may limit this topology to highly critical networks. The diagram
bellows

By Mohamed Said Omar MIBF 4


4. How do the internet and internet technology work and how they support
communication in e-business?
The Internet is a worldwide network of networks that uses the client/server model of
computing and the TCP/IP network reference model. Every computer on the Internet is
assigned a unique numeric IP address. The domain name system (DNS) converts IP
addresses to more user-friendly domain names. Worldwide Internet policies are
established by organizations and government bodies, such as the Internet Architecture
Board (IAB) and the World Wide Web Consortium (W3C). Major Internet services
include e-mail, newsgroups, chatting, instant messaging, Telnet, file transfer protocol
(FTP), and the Web. Web pages are based on Hypertext Markup Language (HTML) and
can display text, graphics, video, and audio. Web site directories, search engines, and
RSS (Really Simple Syndication) technology help users locate the information they need
on the Web. RSS, blogs, social networking, and wikis are features of Web 2.0. Firms are
also starting to realize economies by using Voice-over Internet Protocol (VoIP)
technology for voice transmission and by using virtual private networks (VPNs) as low-
cost alternatives to private WANs.
5. Identify and describe six ethical principles relating to information systems?
Six ethical principles for judging conduct include the Golden Rule, Immanuel Kant’s
Categorical Imperative, Descartes’ Rule of Change, the Utilitarian Principle, the Risk
Aversion Principle, and the Ethical “No Free Lunch” Rule. These principles should be
used in conjunction with an ethical analysis.
6. Explain how ethical, social and political issued are connected in use of information
systems?
Information technology is introducing changes for which laws and rules of acceptable
conduct have not yet been developed. Increasing computing power, storage, and
networking capabilities—including the Internet—expand the reach of individual and
organizational actions and magnify their impacts. The ease and anonymity with which
information is now communicated, copied, and manipulated in online environments pose
new challenges to the protection of privacy and intellectual property. The main ethical,

By Mohamed Said Omar MIBF 5


social, and political issues raised by information systems centre around information rights
and obligations, property rights and obligations, accountability and control, system
quality, and quality of life.
7. Differentiate between responsibility, accountability and liability?
 Responsibility is a key element of ethical action. Responsibility means that you accept
the potential costs, duties, and obligations for the decisions you make. Accountability is
a feature of systems and social institutions: It means that mechanisms are in place to
determine who took responsible action, who is responsible. Systems and institutions in
which it is impossible to find out who took what action are inherently incapable of ethical
analysis or ethical action. Liability extends the concept of responsibility further to the
area of laws.
Liability is a feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or
organizations. Due process is a related feature of law-governed societies and is a process
in which laws are known and understood and there is an ability to appeal to higher
authorities to ensure that the laws are applied correctly.
8. Define privacy and fair information practices?
privacy is the right to be let alone, or freedom from interference or intrusion. Information
privacy is the right to have some control over how your personal information is collected
and used.
FIP (Fair Information Practices) is a general term for a set of standards governing the
collection and use of personal data and addressing issues of privacy and accuracy.
9. what exactly is an information system how does it work? What are its management
organization and technological components?
From a technical perspective, an information system collects, stores, and disseminates
information from an organization’s environment and internal operations to support
organizational functions and decision making, communication, coordination, control,
analysis, and visualization. Information systems transform raw data into useful
information through three basic activities: input, processing, and output. From a business
perspective, an information system provides a solution to a problem or challenge facing a
firm and represents a combination of management, organization, and technology

By Mohamed Said Omar MIBF 6


elements. The management dimension of information systems involves such issues as
leadership, strategy, and management behaviour. The technology dimension consists of
computer hardware, software, data management technology, and
networking/telecommunications technology (including the Internet). The organization
dimension of information systems involves such issues as the organization’s hierarchy,
functional specialties, business processes, culture, and political interest groups.
10. how are information systems transforming business and what is their relationship
with globalization?
E-mail, online conferencing, and cell phones have become essential tools for conducting
business. Information systems are the foundation of fast-paced supply chains. The
Internet allows many businesses to buy, sell, advertise, and solicit customer feedback
online. Organizations are trying to become more competitive and efficient by digitally
enabling their core business processes and evolving into digital firms. The Internet has
stimulated globalization by dramatically reducing the costs of producing, buying, and
selling goods on a global scale. New information system trends include the emerging
mobile digital platform, online software as a service, and cloud computing.
11. what are information systems so essential for running and managing business
today?
Information systems have become a foundation for conducting business. In many
industries, survival and the ability to achieve strategic business goals are difficult without
extensive use of information technology. Businesses today use information systems to
achieve six major objectives: operational excellence; new products, services, and
business models; customer/supplier intimacy; improved decision making; competitive
advantage; and day-to-day survival.
12. A) Identify any three major information system trends?
The three major new information system trends are: Emerging mobile digital platforms,
the growth of online software as a service, and the growth of cloud computing.
B) Describe the challenges and opportunities of globalization in a flattened world?
Internet and global communications have greatly reduced economic and cultural
advantages of developed countries. Drastic reduction of costs of operating and transacting
on global scale Competition for jobs, markets, resources, ideas Dependence on imports

By Mohamed Said Omar MIBF 7


and exports Requires new understandings of skills, markets, opportunities You could ask
students to name ways in which globalization affects their everyday lives. Ask them how
they might react if they learned that a job opening, they coveted was outsourced to
another country, or on the other hand, what they would do if they were managers filling a
job opening and workers from abroad could fill the spot for a fraction of the cost?
Benefits of globalization: how would they feel about paying 50% more for their clothing
that was made domestically in the U.S.?
13. Identify and describe six (6) ethical principles?

Ethics is set of moral principles that govern the behavior of a group or individual. An ethical
principle is a base accepting position which directly or indirectly leads to an ethical standard.
Ethics generally refers to human activities that are measured good or proper within the
situation of a group – i.e., law, and typically implies or plainly involves punishment by the
group against the individual who violates the ethical standard. Key six ethics principles are

 Ensure integrity: In business, the functions and use of information must be done
with integrity.
 Must be informed: The users and the relevant people must be fully about the
purpose, methods and intended possible uses.
 The confidentiality of information: The people related job and functions must
maintain the confidentiality of relevant information that important for the
organization and the functions.
 Must participate in a voluntarily: None of the people must be forced for doing
anything. The must do that in a voluntary way, free from any coercion.
 Harm to participants must be avoided: Those facts and people are considered as
harmful for the system, must be avoided.
 Independence: The independence must be clear, and any conflicts of interest or
partiality must be explicit.
14. What are components of an organization flame work for security and control?

Firms need to establish a good set of both general and application controls for their
information systems. A risk assessment evaluates information assets, identifies control
points and control weaknesses, and determines the most cost-effective set of controls.

By Mohamed Said Omar MIBF 8


Firms must also develop a coherent corporate security policy and plans for continuing
business operations in the event of disaster or disruption. The security policy includes
policies for acceptable use and identity management. Comprehensive and systematic MIS
auditing helps organizations determine the effectiveness of security and controls for their
information systems.

15. What are the most important tools and technologies for safe guarding information
security systems?
Firewalls prevent unauthorized users from accessing a private network when it is linked
to the Internet. Intrusion detection systems monitor private networks from suspicious
network traffic and attempts to access corporate systems. Passwords, tokens, smart cards,
and biometric authentication are used to authenticate system users. Antivirus software
checks computer systems for infections by viruses and worms and often eliminates the
malicious software, whereas antispyware software combats intrusive and harmful
spyware programs. Encryption, the coding and scrambling of messages, is a widely used
technology for securing electronic transmissions over unprotected networks. Digital
certificates combined with public key encryption provide further protection of electronic
transactions by authenticating a user’s identity. Companies can use fault-tolerant
computer systems or create high-availability computing environments to make sure that
their information systems are always available. Use of software metrics and rigorous
software testing help improve software quality and reliability.
16. Why information systems are vulnerable to destruct error and abuse?

Digital data are vulnerable to destruction, misuse, error, fraud, and hardware or software
failures. The Internet is designed to be an open system and makes internal corporate
systems more vulnerable to actions from outsiders. Hackers can unleash denial-of-service
(DoS) attacks or penetrate corporate networks, causing serious system disruptions. Wi-Fi
networks can easily be penetrated by intruders using sniffer programs to obtain an
address to access the resources of the network. Computer viruses and worms can disable
systems and Web sites. The dispersed nature of cloud computing makes it difficult to
track unauthorized activity or to apply controls from afar. Software presents problems
because software bugs may be impossible to eliminate and because software

By Mohamed Said Omar MIBF 9


vulnerabilities can be exploited by hackers and malicious software. End users often
introduce errors.

17. Different between database and database management systems?

Database: A database can be termed as collection of related data.

Database Management System (DBMS): A database management system is software that


gives access to the database.

Database System: A database system is more popular term which is a group of application
programs that interact with database through DBMS and database alone.

18. Evaluation of management information systems Using an organisation of your choice


Identify management information systems study’s Critique?

By Mohamed Said Omar MIBF 10

You might also like