Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

AMIT1713 IT FUNDAMENTALS AND APPLICATIONS

AMIT1713 IT FUNDAMENTALS AND APPLICATIONS


FINAL ONLINE ASSESSMENT
ANSWER SHEET
25 SEP 2020, FRIDAY, 2.30PM - 5.30PM

STUDENT’S DECLARATION OF ORIGINALITY


By submitting this online assessment, I declare that this submitted work is free from all forms of
plagiarism and for all intents and purposes are my own properly derived work. I understand that I
have to bear the consequences if I fail to do so.

Final Online Assessment Submission


Course Code: AMIT1703

Course Title: IT Fundamentals and Applications

Signature: TYS

Name of Student (as per IC): Tee Yee Shean

Student ID: 2000761

Tutorial Group: DACG1

Date: 25 Sep 2020


AMIT1713 IT FUNDAMENTALS AND APPLICATIONS

QUESTION 1
MARK
YOUR ANSWER
SCORED
Q1. a)
I recommend Lily a microphone as input device. This is because a
microphone can capture sound and complete the process of voice input
and audio input. Lily can take her attendance when attending her
18 online classes or discuss with group members when doing her
MARKS assignment.

I recommend Lily a monitor as output device. Lily can use it to view


the screen presented by her lecturer and study with it. Monitor can
display the notes that she need to study and also display her
assignment.

I recommend Lily a wireless modem as communication device. A


wireless modem is used to send emails, text, photos, videos to the
internet. It enables a computer to send and receive data, instructions
and information to and from another computer. Lily will need it to
enter the google classroom and google meet to attend her class. She
also need it to submit her assignment.

Q1. b)
Wireless Local Area Networks ( WLAN ) is a network that connects
computers and devices in a limited geographical area such as home.
6 Lily can study in her home using a LAN. A wireless LAN ( WLAN ) is
MARKS a LAN that uses no physical wire. She can bring her mobile device or
computer connecting to the WLAN anywhere she wants in the house as
there is no physical wire. Means that she can get her assignments done
everywhere in the house. Computers and devices that access a wireless
LAN must have built-in wireless capability or the appropriate wireless
network card, USB adapter or other wireless device.

Q1. c)
The three limitations that Lily might encounter during the
implementation of online learning includes connectivity and service
interruption. This connectivity cannot be 100% reliable. There are
server downtimes, weather issues causing disruptions to wireless
broadband access, speed hiccups and other often unavoidable
18 circumstances when we just cannot get data access, even temporarily.
MARKS Thus there is always a risk of not being able to access online data due
to connectivity issues, making online storage unreliable to a certain
extent. Lily might cannot attend the online classes when accessing to
the online learning platform.

Next, sharing restrictions. A wireless local area network (WLAN) links


two or more devices using some wireless distribution method and
usually providing a connection through an access point to the wider
Internet. This gives users the mobility to move around within a local
coverage area and still be connected to the network. She might need to
stay at a place that her computer can connect Wi-Fi until her class is
finish.

Last, size limit. The notes given by lecturer might be too big for her
AMIT1713 IT FUNDAMENTALS AND APPLICATIONS

computer to access. She might need to download another software in


order to access to her lecture notes and some software are charged
monthly or yearly, this might increase her cost of learning online.

Q1. d)
Yes. She needs a cloud storage. It allows users to upload files that
could then be accessed over the Internet from a different computer,
tablet, smart phone or other networked device, by the same user or
8 possibly by other users, after a password or other authentication is
MARKS provided. Means that Lily can directly access her documents or files
through cloud storage when her laptop or mobile device face problem
example lagging or broke down as the cloud storage can’t easily been
damaged or destroyed.

A cloud storage may also store many files for her studies example
assignments and lecture notes. Means that Lily can store information
and document without taking the storage spaces in her computer or
mobile device.

QUESTION 1 TOTAL:

QUESTION 2
Q2. a)
Level of user Type of Explanation
Information
System

Executive Executive support This system combines MISs


management system ( ESS ) and DSSs which provide
more flexible and better
support for decision making
32 that ensures the company
MARKS will survive and grow in the
future. Executive
management can make
strategic decision by
summarizing and analysing
the information from ESS.
They also can decide whether
to stop selling some products
that nobody buys and will
make a loss. They decide
whether the business should
add or change a new product
line using the reports given.

Middle Decision support This system helps middle and


management system ( DSS ) top management to make
decisions to solve problems,
they can analysis the
information and try to predict
what will happen in the
AMIT1713 IT FUNDAMENTALS AND APPLICATIONS

future. Middle management


can decide whether to
provide special offers to
customer as they can predict
what items will be demanded
most in the future.

Operational Management This system summarizes and


management information compare data accurately, it
system ( MIS ) can produces monthly sales
report , summary reports and
so on .Operational
management can know what
are the popular products from
the reports. They can decide
whether to reorder more
material for the products that
many people wants to buy.

Non- Transaction This system records business


management processing transactions. Non-
employee systems ( TPSs ) management employee can
know the details about
delivery order and get ready
to replenish the store when
the orders almost come.

Q2. b)
3 potential consequences to Smart Group if there is a lack of security
control includes computer equipment or any other products might be
stolen by hardware theft.

Next, the important files or information of the company might get


stolen by information theft. They might first gain unauthorized access
18 to a computer and then steal credit card numbers stored in a firm’s
MARKS accounting department. They might also steal the confidential
information of the company and sell it to the competitor company.

Lastly, the computers of the organization might be attack by malware.


This might cause the company’s computer be attacked by virus after
downloading some unknown files. This malware might disrupt the
company’s internet and make it unusable. The confidential information
of the company might also get destroyed or stolen.

QUESTION 2 TOTAL:

GRAND TOTAL:
AMIT1713 IT FUNDAMENTALS AND APPLICATIONS

You might also like