Professional Documents
Culture Documents
It QNS and Answers
It QNS and Answers
a) Explain the ethical and societal challenges one can face when using Information
Technology? [10]
Intellectual property - Millions of dollars of software is illegally copied each year
all over the world. This phenomenon has a great impact on the software industry
in the region. Local and foreign software industries need consumers support all
over the world to maintain the progress of technology. Most importantly, for the
sake of growth in indigenous ICT innovation and invention, local software
industries in Asia-Pacific need local support in protecting their intellectual
property rights and investment
Crime - Stolen and counterfeit ATM cards are used to steal millions of dollars
each year throughout the region. The anonymity of the machines makes some
crimes easier and creates many new types of crimes.
Loss of privacy - Transactions are transmitted and recorded in databases at banks,
hospitals, shopping complexes, and various organizations, in the public or private
sector. The contents of electronic communications and databases can provide
important and private information to unauthorised individuals and organizations if
they are not securely guarded.
Errors - Information input into the databases is prone to human and device error.
Computer programmes that process the information may contain thousands of
errors. These errors can create wrong and misleading information about
individuals and organizations. Information and programme errors might result in
financial loss, or even the loss of lives.
Freedom of speech and press - How do the constitutional rights of individuals in
terms of the freedoms of speech and press apply to electronic media? How
seriously do the problems of pornography, harassment, libel, and censorship on
the net affect individuals and society? What government initiatives have been
used in handling this crisis?
Digital Divide - How does ICT affect local community life? The increasing use
of computers has increased the separation of rich and poor, creating a digital
divide between the information “haves” and “have-nots.” What subsidies and
programmes have been provided by governments of the region to address the
issue?
Unemployment - The automation of work has caused creative destruction by
eliminating some vocations and creating new ones. How does this affect the
employment or unemployment of the work force of a nation?
Professional Ethics - How well trained and ethical are our ICT professionals in
dispensing their duties? Faulty and useless systems that cause disasters and
hardships to users might be built by incompetent ICT professionals. In dispensing
their duties ICT professionals must demonstrate their best practices and standards
as set by professional bodies for quality assurance.
b) List and explain factors you would consider before buying computer hardware [10]
1
Warranty
Warranty makes up the most important consideration for people when buying a
system. Having one covered with the right kind of hardware warrantee is essential
and should be unconditional. I still remember when Sony had to recall several
Laptops due to a battery fault because of which their Laptops caught fire. I’m sure
none of us would like to have a Laptop that we can fry omelets on without the
guarantee of replacement.
Price
This brings us to our next consideration of price. There might be some very fancy
features that you want in your new PC. However, if you don’t have the cash to
pay for, let’s say a graphic card with 1GB memory, than you might be better off
choosing suitable alternatives.
Question 2
a) Explain the following terms
i. ROM - ROM or Read Only Memory is a special type of memory which can only
be read and contents of which are not lost even when the computer is switched
off. It typically contains manufacturer’s instructions. Among other things, ROM
also stores an initial program called the ‘bootstrap loader’ whose function is to
start the operation of computer system once the power is turned on
ii. USB Port - A USB port is a standard cable connection interface on personal
computers and consumer electronics. USB ports allow stand-alone electronic
devices to be connected via cables to a computer (or to each other).
USB stands for Universal Serial Bus, an industry standard for short-distance
digital data communications. USB allows data to be transferred between d
evices. USB ports can also supply electric power across the cable to devices
without their own power source.
Both wired and wireless versions of the USB standard exist, although only the
wired version involves USB ports and cables.
iii. RAM - RAM or Random Access Memory is the unit in a computer system. It is
the place in a computer where the operating system, application programs and the
data in current use are kept temporarily so that they can be accessed by the
computer’s processor. It is said to be ‘volatile’ since its contents are accessible
only as long as the computer is on. The contents of RAM are no more available
once the computer is turned off.
iv. Floppy disk - A floppy disk, or diskette, is a disk storage medium composed of a
disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic
2
carrier lined with fabric that removes dust particles. Floppy disks are read and
written by a floppy disk drive (FDD).
Floppy disks, initially as 8-inch media and later in 5¼-inch and 3½-inch sizes,
were a ubiquitous form of data storage and exchange from the mid-1970s well
into the 2000s.
While floppy disk drives still have some limited uses, especially with legacy
industrial computer equipment, they have been superseded by data storage
methods with much greater capacity, such as USB flash drives, portable external
hard disk drives, optical discs, memory cards and computer networks.
v. Flash disk - A universal serial bus (USB) flash drive is a small, portable device
that plugs into a computer's USB port. Like a hard disk, USB flash drive stores
information, but with a flash drive you can easily transfer that information from
one computer to another. USB flash drives vary in size and shape and can hold
gigabytes of information. USB flash drives are also called pen drives, key chain
drives, key drives, and memory keys.
3
b) Explain the advantages and disadvantages of social networking sites like Face book,
twitter, MySpace [10]
Advantages
Social networking helps people stay in touch that might not do it otherwise.
Social networking can be used to help advertise goods and services.
Social networking can provide an extremely accessible medium for self-
expression to those with access to computer technology.
Social networking can help families torn apart by war, divorce, etc. stay in touch
easier and quicker than by some other means.
Social networking can be a powerful engine for job searches.
Social networking can leverage political power for groups that might not
otherwise have access.
Social networking can be used to counteract terrorism and organized crime.
Social networking can be used to find dating partners in a fractured society where
healthy meeting places are limited.
Social networking can be used to memorialize and honor dead persons to keep
memories and history that would otherwise fade alive.
Social networking can be used to get difficult personal issues out of the closet in
front of others so they can be examined and evaluated, and people in trouble can
garner support from their friends.
Disadvantages
Social networking takes time away from other activities and can take over from
real time interaction.
Social networking formats set up expectations of importance for certain types of
communication at the expense of other types. Pictures and phrases on a wall can
take the place of phone calls and face to face time with family and friends.
Social networking magnifies the gap between people who have access to
computer technology and those that don't, exacerbating other social inequities.
Social networking can compromise privacy in a big way.
Social networking can force changes in public policy which can either be a good
thing or a bad thing depending on whose ox is gored. Employers can now make
access to private social networking history a condition of hiring. Lawmakers may
want to change that to prevent discrimination.
Social networking can be used to destabilize governments and to advance
terrorism.
Social networking can be used to promote organized crime.
Social networking can become a venue for bullying.
Social networking can be a vector for simplifying language, thereby limiting
concept development and expression.
Social networking can leave an indelible personal history that keeps a person who
has grown past a bad time from moving on freely.
Question 3
a) What is a computer network [5]
4
A computer network is interconnection of various computer systems located at different
places. In computer network two or more computers are linked together with a medium
and data communication devices for the purpose of communicating data and sharing
resources. The computer that provides resources to other computers on a network is
known as server. In the network the individual computers, which access shared network
resources, are known as nodes.
b) Explain any 3 types of computer networks you are familiar with, showing their
differences [15]
Most local area networks are built with relatively inexpensive hardware such as Ethernet
cables, network adapters, and hubs. Wireless LAN and other more advanced LAN
hardware options also exist. LAN is a computer network that spans a relatively small
area. Most LANs are confined to a single building or group of buildings. However, one
LAN can be connected to other LANs over any distance via telephone lines and radio
waves. Most LANs connect workstations and personal computers. Each node (individual
computer) in a LAN has its own CPU with which it executes programs, but it is also able
to access data and devices anywhere on the LAN.
This means that many users can share expensive devices, such as laser printers, as well as
data. Users can also use the LAN to communicate with each other, by sending e-mail or
engaging in chat sessions.
A local area network, or LAN, consists of a computer network at a single site, typically
an individual office building. A LAN is very useful for sharing resources, such as data
storage and printers. LANs can be built with relatively inexpensive hardware, such as
hubs, network adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can accommodate
thousands of computers. A LAN typically relies mostly on wired connections for
increased speed and security, but wireless connections can also be part of a LAN. High
speed and relatively low cost are the defining characteristics of LANs.
LANs are typically used for single sites where people need to share resources among
themselves but not with the rest of the outside world. Think of an office building where
everybody should be able to access files on a central server or be able to print a document
to one or more central printers. Those tasks should be easy for everybody working in the
same office, but you would not want somebody just walking outside to be able to send a
5
document to the printer from their cell phone! If a local area network, or LAN, is entirely
wireless, it is referred to as a wireless local area network, or WLAN.
The term Wide Area Network (WAN) usually refers to a network which covers a large
geographical area, and use communications circuits to connect the intermediate nodes. A
major factor impacting WAN design and performance is a requirement that they lease
communications circuits from telephone companies or other communications carriers.
Transmission rates are typically 2 Mbps, 34 Mbps, 45 Mbps, 155 Mbps, 625 Mbps (or
sometimes considerably more).
A wide area network (WAN) is a network that exists over a large-scale geographical area.
A WAN connects different smaller networks, including local area networks (LAN) and
metro area networks (MAN). This ensures that computers and users in one location can
communicate with computers and users in other locations. WAN implementation can be
done either with the help of the public transmission system or a private network
A Metropolitan Area Network (MAN) is one of a number of types of networks (see also
LAN and WAN). A MAN is a relatively new class of network, it serves a role similar to
an ISP, but for corporate users with large LANs.
If multiple individuals use the same network within a residence, the network is
sometimes referred to as a home area network, or HAN. In a very typical setup, a
6
residence will have a single wired Internet connection connected to a modem. This
modem then provides both wired and wireless connections for multiple devices. The
network is typically managed from a single computer but can be accessed from any
device.
This type of network provides great flexibility. For example, it allows you to:
Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
Upload the photo from your cell phone to your desktop computer.
Watch movies from an online streaming service to your TV.
Question 4
a) Define Information Systems (5)
A combination of hardware, software, infrastructure and trained personnel organized to
facilitate planning, control, coordination, and decision making in an organization.
7
ii. Transaction Processing Systems
A transaction processing system (TPS) is an information system that captures and
processes data generated during an organization’s day-to-day transactions. A
transaction is a business activity such as a deposit, payment, order or reservation.
Clerical staff typically perform the activities associated with transaction processing,
which include the following:
Recording a business activity such as a student’s registration, a customer’s
order, an employee’s timecard or a client’s payment.
Confirming an action or triggering a response, such as printing a student’s
schedule, sending a thank-you note to a customer, generating an employee’s
paycheck or issuing a receipt to a client.
Maintaining data, which involves adding new data, changing existing data, or
removing unwanted data.
Transaction processing systems were among the first computerized systems
developed to process business data – a function originally called data
processing. Usually, the TPS computerized an existing manual system to allow
for faster processing, reduced clerical costs and improved customer service.
The first transaction processing systems usually used batch processing. With
batch processing, transaction data is collected over a period of time and all
transactions are processed later, as a group. As computers became more
powerful, system developers built online transaction processing
systems. With online transaction processing (OLTP) the computer processes
transactions as they are entered. When you register for classes, your school
probably uses OLTP. The registration administrative assistant enters your
desired schedule and the computer immediately prints your statement of
classes. The invoices, however, often are printed using batch processing,
meaning all student invoices are printed and mailed at a later date.
Today, most transaction processing systems use online transaction processing. Some
routine processing tasks such as calculating paychecks or printing invoices, however,
are performed more effectively on a batch basis. For these activities, many
organizations still use batch processing techniques.
8
comparisons could produce meaningful information for management. Management
information systems thus evolved out of transaction processing
systems. A management information system, or MIS is an information system that
generates accurate, timely and organized information so managers and other users
can make decisions, solve problems, supervise activities, and track
progress. Because it generates reports on a regular basis, a management information
system sometimes is called a management reporting system (MRS).
Management information systems often are integrated with transaction processing
systems. To process a sales order, for example, the transaction processing system
records the sale, updates the customer’s account balance, and makes a deduction
from inventory. Using this information, the related management information system
can produce reports that recap daily sales activities; list customers with past due
account balances; graph slow or fast selling products; and highlight inventory items
that need reordering. A management information system focuses on generating
information that management and other users need to perform their jobs.
An MIS generates three basic types of information: detailed, summary and
exception. Detailed information typically confirms transaction processing
activities. A Detailed Order Report is an example of a detail report. Summary
information consolidates data into a format that an individual can review quickly and
easily. To help synopsize information, a summary report typically contains totals,
tables, or graphs. An Inventory Summary Report is an example of a summary report.
iv. Decision Support Systems
Transaction processing and management information systems provide information on
a regular basis. Frequently, however, users need information not provided in these
reports to help them make decisions. A sales manager, for example, might need to
determine how high to set yearly sales quotas based on increased sales and lowered
product costs. Decision support systems help provide information to support such
decisions.
A decision support system (DSS) is an information system designed to help users
reach a decision when a decision-making situation arises. A variety of DSSs exist to
help with a range of decisions. A decision support system uses data from internal
and/or external sources.
Internal sources of data might include sales, manufacturing, inventory, or financial
data from an organization’s database. Data from external sources could include
interest rates, population trends, and costs of new housing construction or raw
material pricing. Users of a DSS, often managers, can manipulate the data used in
the DSS to help with decisions.
Some decision support systems include query language, statistical analysis
capabilities, spreadsheets, and graphics that help you extract data and evaluate the
9
results. Some decision support systems also include capabilities that allow you to
create a model of the factors affecting a decision. A simple model for determining
the best product price, for example, would include factors for the expected sales
volume at each price level. With the model, you can ask what-if questions by
changing one or more of the factors and viewing the projected results. Many people
use application software packages to perform DSS functions. Using spreadsheet
software, for example, you can complete simple modeling tasks or what-if scenarios.
.
To store all the necessary decision-making data, DSSs or EISs often use
extremely large databases, called data warehouses. A data warehouse stores and
manages the data required to analyze historical and current business
circumstances.
v. Expert Systems
An expert system is an information system that captures and stores the knowledge
of human experts and then imitates human reasoning and decision-making processes
for those who have less expertise. Expert systems are composed of two main
components: a knowledge base and inference rules. A knowledge base is the
combined subject knowledge and experiences of the human experts. The inference
rules are a set of logical judgments applied to the knowledge base each time a user
describes a situation to the expert system.
Although expert systems can help decision-making at any level in an organization,
non-management employees are the primary users who utilize them to help with job-
related decisions. Expert systems also successfully have resolved such diverse
problems as diagnosing illnesses, searching for oil and making soup.
Expert systems are one part of an exciting branch of computer science called
artificial intelligence. Artificial intelligence (AI) is the application of human
intelligence to computers. AI technology can sense your actions and, based on
logical assumptions and prior experience, will take the appropriate action to
complete the task. AI has a variety of capabilities, including speech recognition,
logical reasoning, and creative responses.
Experts predict that AI eventually will be incorporated into most computer systems
and many individual software applications. Many word processing programs already
include speech recognition.
vi. Knowledge Management Systems
Knowledge Management Systems ("KMS") exist to help businesses create and share
information. These are typically used in a business where employees create new
knowledge and expertise - which can then be shared by other people in the organisation
10
to create further commercial opportunities. Good examples include firms of lawyers,
accountants and management consultants.
KMS are built around systems which allow efficient categorisation and distribution of
knowledge. For example, the knowledge itself might be contained in word processing
documents, spreadsheets, PowerPoint presentations. internet pages or whatever. To share
the knowledge, a KMS would use group collaboration systems such as an intranet.
Question 5
a) What is a user interface? (2)
• A CLI displays a prompt, the user types a command on the keyboard and executes
the command. The computer executes the command, providing textual output.
Advantages
Disadvantages
“Hidden” features i.e. if you don’t know the commands you wont know the
features are there!
11
Command Line Interface Applications
• System administration
• Engineering applications
• Scientific applications
The user has a list of items to choose from, and can make selections by highlighting
one
Advantages
Disadvantages
• Can be frustrating for experienced users i.e. the command they want to
use is buried 5 levels deep!!!!
• ATM
• Mobile Phone
• MP3 Player
• Video recorder
• Household Devices
• Digital/Cable TV
12
• Uses windows, icons, menus and pointers (WIMP) which can be manipulated by a
mouse (and often to an extent by a keyboard as well).
Names given to
commands
Icons
Order of menus
Mouse operation
Dialog boxes
• Can range from simple command systems to voice activated text processing.
Commands are spoken in “normal” language.
Advantages
No training required – you just tell the computer what you want to do!
Disadvantages
Difficult to recognise all the different ways of saying things (and regional
dialects)
13
c) . (10)
Performs basic computer tasks
The operating system performs basic computer tasks, such as managing the various
peripheral devices such as the mouse, keyboard and printers. For example, most
operating systems now are plug and play which means a device such as a printer will
automatically be detected and configured without any user intervention.
A user interacts with software through the user interface. The two main types of user
interfaces are: command line and a graphical user interface (GUI). With a command
line interface, the user interacts with the operating system by typing commands to
perform specific tasks. An example of a command line interface is DOS (disk
operating system). With a graphical user interface, the user interacts with the
operating system by using a mouse to access windows, icons, and menus. An example
of a graphical user interface is Windows Vista or Windows 7.
The operating system is responsible for providing a consistent application program
interface (API) which is important as it allows a software developer to write an
application on one computer and know that it will run on another computer of the
same type even if the amount of memory or amount of storage is different on the two
machines.
The operating system also handles system resources such as the computer's memory
and sharing of the central processing unit (CPU) time by various applications or
peripheral devices. Programs and input methods are constantly competing for the
attention of the CPU and demand memory, storage and input/output bandwidth. The
operating system ensures that each application gets the necessary resources it needs in
order to maximise the functionality of the overall system.
The operating system also handles the organisation and tracking of files and directories
(folders) saved or retrieved from a computer disk. The file management system allows
the user to perform such tasks as creating files and directories, renaming files, coping and
moving files, and deleting files. The operating system keeps track of where files are
located on the hard drive through the type of file system. The type two main types of file
system are File Allocation table (FAT) or New Technology File system (NTFS).
Memory Management:
14
organises memory through file management system (see additional information
below for more)
o allocates files
o allows user to change file names & paths
backing storage controlled
handles transfer of data or instructions between primary and secondary memory
every process has specific space in primary memory
o ensures other process spaces is not overridden - each process operates in
own virtual memory space
would cause "memory access violation"
If the program & data management breaks down, programs might write to another
program’s files or the system might crash.
manages use of virtual memory & swap files
Scheduling:
o long term (admission)
decides which jobs are sent to queue
o mid term (swapping out)
removes data from RAM to HDD/SSD
o short term (dispatcher)
o decides what is executed next
maintains security
management of user accounts and user activity
o manages access rights
provides services (e.g. firewalls)
user authentication
o passwords
o voice recognition
o biometrics
logs everything done on computer
important in multi-user environments
o Audit-trail: logging of user activity to track hacking attempts, hogging of
resources, etc.
Question 6
a) What is a software? (3)
15
b) Distinguish between system software and application software giving examples.(8)
System Software:
Application software:
Software that can perform a specific task for the user, such as word processing,
accounting, budgeting or payroll, fall under the category of application software. Word
processors, spreadsheets, database management systems are all examples of general
purpose application software.
c) What is data processing (3); explain any three types of data processing (6)
Batch processing
A central computer system normally processes all transactions against a central data base
and produces reports at intervals. In batch processing transactions are accumulated over a
period of time and processed periodically. A batch system handles the inputing,
processing, job queuing and transmission of the data from the remote sites with little or
no user intervention.
The computer does not carry out any processing or produce any output until all the inputs
have been collected in. This method is suited to situations where it is not critical that the
actual processing takes place immediately.
Data is processed in batches so batch processing is suited to non-urgent tasks.
A batch process can be started automatically or manually and once started, batch
processing needs no human intervention.
Batch processing can process huge amounts of data and can run overnight or
longer if needed.
Once set up, batch processing is very cheap to run.
Hardware costs are lower because the time taken to process the data is usually not
critical so the computer and network speeds are not too important. Failures in
hardware would mean the data has to be processed again.
Creating and setting up the software can be time-consuming, and therefore
expensive, as any programming mistakes will mean the data has to be processed
again.
16
b. Recording the transaction data onto some medium, e.g. magnetic tape or disk.
c. Sorting the transactions into transaction files
d. Processing of the data
e. Updating the master file.
Examples of use:
An electricity company produces its monthly bills for customers. All the meter
reading would be collected in or estimated over the month then the data batch
processed and the bills calculated and printed out.
A mail order company receives orders by post throughout the week and then all
the details are entered into the computer on the Friday and are processed over the
weekend ready for delivery the following week.
processing survey results that have been collected in over several weeks.
processing wages/payrolls monthly, including bank transfers and the printing out
of payslips.
processing mail merged letters to go out once a month to subscribers.
Advantages
It is economical when large amounts of data are being processed
Suitable where reports and information is needed periodically.
Reduced risk of error due to the time involved in validation and verification.
Disadvantages
The master file is not always kept up to date. This makes batch processing
unsuitable for some applications.
Immediate updated responses cannot be made.
Unsuitable where decisions and follow up transactions depend on the results of
earlier transactions, e.g. in bank withdrawals and deposits.
Once the system fails all output is delayed.
Only identical data is processed in one batch
Time delay in gathering data, storing and bulk processing
Errors corrected after the processing of data
On-line Processing
It is the input of transactions while the input device is connected directly to the main CPU
of the system.
The processing takes place as the data is input but the system does not need to be instant,
a delay of a few seconds is not critical. Most examples involve updating some form of
database and often involve multiple users over some form of LAN or a WAN such as the
Internet. It is more expensive to set up than a batch processing system as the hardware
has to cope with peaks of demand and there must be a reliable backup system.
Examples of use:
o an airline ticket booking system used by a travel agent or accessed directly
by customers over the Internet. Each booking updates a central database
almost immediately to avoid double booking seats.
17
o a reservation system for booking theatre tickets. This could be accessed by
booking staff at the theatre or directly by customers over the Internet.
Advantages
Items can be input much easier and quicker.
Many errors are dealt with by the operator at entry
Time is saved because a batch does not have to be produced first.
User can recognise anomalies in the data being entered
Disadvantages
The system may be more expensive than batch processing.
Sometimes accuracy of data depends on the operator who might fail to detect or
prevent some errors.
Sometimes source document are not used, e.g. in the case of telephone orders.
Advantages
Processing is instantaneous
Files and databases are always up to date
Transaction response time is quick if not immediate;
Data is processed as demanded;
Error correction can be immediate.
Disadvantages
The systems are expensive and complex to develop and put up.
Data with errors may be processed with damaging effect.
18
Hardware costs are high: there is need for on-line terminals, more CPU power,
large on-line storage and back up facilities.
Standardisation may not exist or may be more difficult;
Processing needs make control difficult;
System hardware and software is expensive;
Backup is critical in case of system crashing;
Security is critical in case of crashing or data security;
The possibility of data corruption requires backup
Question 7
a) What is a network topology (2)
A topology is a usually schematic description of the arrangement of a network, including
its nodes and connecting lines. There are two ways of defining network geometry: the
physical topology and the logical (or signal) topology.
A network topology describes the arrangement of systems on a computer network. It
defines how the computers, or nodes, within the network are arranged and connected to
each other. Some common network topologies include star, ring, line, bus, and tree
configurations.
Bus Topology
Bus networks (not to be confused with the system bus of a computer) use a common
backbone to connect all devices. A single cable, the backbone functions as a shared
communication medium that devices attach or tap into with an interface connector. A
device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
19
Ring Topology
In a ring network, every device has exactly two neighbors for communication purposes.
All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise"). A failure in any cable or device breaks the loop and can take down
the entire network.
In Ring Topology, all the nodes are connected to each-other in such a way that they make
a closed loop. Each workstation is connected to two other components on either side, and
it communicates with these two adjacent neighbors. Data travels around the network, in
one direction.
This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision. Also in
ring topology all the traffic flows in only one direction at very high speed.
Even when the load on the network increases, its performance is better than that of
Bus topology.
There is no need for network server to control the connectivity between workstations.
Additional components do not affect the performance of network.
Each computer has equal access to resources.
Each packet of data must pass through all the computers between source and
destination. This makes it slower than Star topology.
If one workstation or port goes down, the entire network gets affected.
Network is highly dependent on the wire which connects different components.
MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
Star
A star topology is designed with each node (file server, workstations, and peripherals)
connected directly to a central network hub, switch, or concentrator.
Data on a star network passes through the hub, switch, or concentrator before continuing
to its destination. The hub, switch, or concentrator manages and controls all functions of
the network. It also acts as a repeater for the data flow. This configuration is common
with twisted pair cable; however, it can also be used with coaxial cable or fiber optic
cable.
20
Advantages of a Star Topology
MESH TOPOLOGY
A type of network setup where each of the computers and network devices are
interconnected with one another, allowing for most transmission to be distributed even if
one of the connections go down. This type of topology is not commonly used for most
computer network as it is difficult and expensive to have redundant connection to every
computer. However, this type of topology is commonly used for wireless network. Below
is a visual example a simple computer setup on a network using a mesh topology.
TREE TOPOLOGY
Among all the network topologies we can derive that tree topology is a combination of
the bus and the star topology. The tree like structure allows you to have many servers on
the network and you can branch out the network in many ways. This is particularly
helpful for colleges, universities, and school. So that each of the branches can identify the
relevant system in their own network and yet connect to the big network in some way.
The tree structure suits best when the network is widely spread and vastly divided into
21
many branches. Like any other topologies, the tree topology has its advantages and
disadvantages. A tree network may not suit small networks and it may be a waste of cable
to use it for small network. Tree topology has some limitations and the configuration
should suit those limitations.
c) Clearly outline the differences between the CSMA\CD, Token Passing and Polling in
these network topologies. (6)
CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
In CSMA/CD (Carrier Sense Multiple Access/Collision Detection) Access Method, every host
has equal access to the wire and can place data on the wire when the wire is free from traffic.
When a host want to place data on the wire, it will “sense” the wire to find whether there is a
signal already on the wire. If there is traffic already in the medium, the host will wait and if there
is no traffic, it will place the data in the medium. But, if two systems place data on the medium at
the same instance, they will collide with each other, destroying the data. If the data is destroyed
during transmission, the data will need to be retransmitted. After collision, each host will wait for
a small interval of time and again the data will be retransmitted, to avoid collision again.
Token Passing
In CSMA/CD and CSMA/CA the chances of collisions are there. As the number of hosts in the
network increases, the chances of collisions also will become more. In token passing, when a
host want to transmit data, it should hold the token, which is an empty packet. The token is
circling the network in a very high speed. If any workstation wants to send data, it should wait
for the token. When the token has reached the workstation, the workstation can take the token
from the network, fill it with data, mark the token as being used and place the token back to the
network.
Token passing resembles a children's story-telling game in which the players pass a ball around a
circle. When a player receives the ball, he or she is expected to tell part of a story. Players can
talk only when the ball is in their possession.
Token passing uses a special authorizing packet of information to inform devices that they can
transmit data. These packets are called tokens and are passed around the network in an orderly
fashion from one device to the next. Devices can transmit only if they have control of the token.
This method distributes the access control among all the devices.
Two approaches to token passing are available. Token Ring uses a ring topology. Each station
passes the token to the next station in the ring. ARCnet also uses token passing; however, with
ARCnet, each station passes the token to the station with the next higher node address, regardless
of its physical location on the network (token passing bus).
The diagram below shows examples of token passing in Token Ring and ARCnet networks.
22
Advantages of Token Passing
Token passing offers the highest data throughput possible under high traffic conditions.
Only one transmission can occur at a time, and collisions cannot occur (non-contention).
Therefore, token passing experiences less performance degradation at higher traffic levels
than contention.
Token passing is deterministic. Each station is guaranteed an opportunity to transmit each
time the token travels around the ring.
Some token passing systems enable you to set priorities for devices that need controlled
access to the token.
As the traffic increases, data throughput also increases to a certain level, and then
stabilizes.
Token passing involves complicated protocols for managing the network and recovering
from errors. The traffic associated with these protocols has higher band width overhead
then is required for CSMA.
All devices require complicated software that needs to be modified whenever a station is
added or removed.
Some systems require an additional central controller that adds to the overhead and
reduces throughput. Cabling and network hardware can be more expensive for token
passing networks than for CSMA networks.
Polling
23
Polling resembles a well-ordered meeting in which the chairman must recognize an attendee
before that person is allowed to speak. The chairman's responsibility is to maintain order in the
meeting and ensure that each person who wants to speak has an opportunity to do so. Polling is
most closely associated with mainframe (point-to-point) computer networks. By using polling,
one device such as a mainframe front-end processor, is designated as the primary device.
Primaries also are known as the channel access administrators, controllers, or masters. All access
to the network is controlled by the primary.
The primary queries (polls) each of the secondary devices, also known as slaves. As each
secondary is polled, the primary inquires if the secondary has information to be transmitted. Only
when it is polled does the secondary have access to the communication channel. Each system has
rules pertaining to how long each secondary can transmit data. The process of polling is much
like a committee chairman who asks each member in turn to vote on an issue. Polling can be
utilized in virtually any network topology.
Advantages of Polling
Many characteristics of polling can be determined centrally, including the polling order
and node priorities.
Polling ensures that channel access is predictable and fixed. Because the time delays
between the primary and secondary devices can be calculated, this access method is
called deterministic. Deterministic access methods are suitable for controlling some
automated equipment because each piece of equipment is guaranteed access to the
network at predetermined intervals.
Polled channels cannot be over saturated with traffic. As demand increases, traffic
increases up to a maximum level. The polling mechanism ensures that maximum traffic
level cannot be exceeded. Nor can excess traffic reduce the performance of the network.
Disadvantages of Polling
24
Some applications cannot function with the time delays required for polling other
devices.
The process of polling involves large numbers of messages that take up available band
width. Traffic is required to poll each node, even nodes that are idle.
Some polled networks use half-duplex transmission lines. This means that the primary
and secondary devices must "turn around" the line, requiring some band width.
Processor speed
Clock speed, a.k.a. Processor speed is often played up to be the major factor in a
computer's overall performance. In rare cases this is true, but an average user rarely uses
100 percent of his Central Processing Unit's power. (CPU). Things like encoding video or
encrypting files, or anything that computes large, complex, numbers requires a lot of
processor power. Most users spend most of their time typing, reading email or viewing
web pages. During this time, the computer's CPU is probably hovering around 1 or 2
percent of it's total speed. Startup time is probably the only time the CPU is under stress,
and even then it's often limited due to the hard drive speed.
Megahertz (MHZ) or Gigahertz (GHZ or 1000MHZ) is the number of times the CPU
can switch back and forth from 1 to 0. It is the driving force in the power the
processor has (all other things being equal). Higher MHZ chips use more power and
produce more heat.
Level 1 (L1) and Level 2(L2) cache is usually onchip RAM that is extremely fast.
SRAM is different than System RAM and only used on processors. It stores data right
before and after it is processed. SRAM is extremely expensive; most chips today only
have 128 Kilobytes of L1 cache, and 256-512K of L2 cache. (This is what makes a
Pentium 3 or 4 chip different than a celeron chip)
x86 is the architecture type of all Windows based computers. All processors sold
today for computers running the Windows OS (operating system) are 32 bit, meaning
they process 32 bits of information each clock cycle (a 1GHZ chip does 1 billion
clock cycles per second). Not all CPU's are x86. For example Apple computers use
Motorola's chip design called PowerPC, which comes in both 64 and 128 bit flavors.
This is one reason apple computers can outpreform high-end PC's, despite their lower
processor speeds. Currently Intel and AMD are developing 64 bit x86 chips. The
disadvantage of higher bit architecture is that one needs to make changes to any
software that one may want to work with on the new design; this is one reason Mac
software will not run without specialized software on PC's, and visa-versa.
25
System RAM speed and size
The amount and speed of the RAM in your computer makes a huge difference in how
your computer performs. If you are trying to run Windows XP with 64 MB of RAM it
probably won't even work. When the computer uses up all available RAM it has to
start using the hard drive to cache data, which is much slower. The constant transfer
of data between RAM and virtual memory (hard drive memory) slows a computer
down considerably. Especially when trying to load applications or files.
The two types differ in the technology they use to hold data, dynamic RAM being the
more common type. Dynamic RAM needs to be refreshed thousands of times per
second. Static RAM does not need to be refreshed, which makes it faster; but it is also
more expensive than dynamic RAM. Both types of RAM are volatile, meaning that
they lose their contents when the power is turned off.
Also the speed of your RAM can be influential.
The biggest factor in your computer's performance is the hard disk speed. How fast
the hard drive can find (average seek time), read, write, and transfer data will make a
big difference in the way your computer performs. Most hard drives today spin at
7,200 RPMS, older models and laptops still spin at 5,200 RPMS, which is one reason
laptops often appear sluggish to a desktop equivalent.
The size of your hard drive plays a very little role in the performance of a computer.
As long as your have enough free space for virtual memory and keep the disk
defragmented it will perform well no matter what the size.
Video card
Whenever your computer puts an image on the screen something has to render it. If a
computer is doing this with software it is often slow and will affect the performance
of the rest of the computer. Also, the image will not be rendered as crisp or as
smoothly in the case of video. Even a low-end video card will significantly improve
the performance of the computer by taking the large task of rendering the images on
the screen from the CPU to the graphics card. If you work with large image files,
video or play games you will want a higher end video card.
Video cards use their own RAM called Video RAM. The more Video RAM a
computer has the more textures and images the card can remember at a time. High
end graphics cards for desktops now come with up to 64 megabytes of Video RAM,
Laptops often only have 8 or 16 megabytes of Video RAM.
b) What are the factors to consider before the buying a computer software? (10)
26
Is the software use-friendly - Accounting is an area that many business owners have
limited knowledge of. If the accounting software is easy to understand, there is a
better chance that someone will actually use it to input daily transactions.
What features are offered in the application - After you have defined what
accounting processes you want the accounting software to address, all you need to do
is find the solution that has the features to address those needs. As always, it is
important to compare the different vendors that have solutions that meet your needs.
Does the software company offer technical support - Technical support is very
important, especially right after the solution is implemented. Most accounting
software solutions will come with 30 days of free support, but it could be a wise idea
to subscribe to the vendor’s support package. You won’t realize how important
technical support is until you’re faced with a problematic situation. Of course,
accounting software that offers free technical support is more favorable.
Question 9
a) Describe the CPU and its variants [10]
CPU stands for Central Processing Unit, and is the Heart of a computer. In any normal
computer this CPU is a microprocessor. A microprocessor is a chip that does all of the
calculations for the computer. The CPU contains three major parts:
the Control Unit (CU),
the Arithmetic and Logic Unit (ALU),
and the primary memory (Note: in some definitions the primary memory does not belong to
the CPU).
27
Control Unit (CU)
The Control Unit controls the CPU and manages what happens inside of it.
Controls sequence of execution
Moves data between the CPU and the computer memory via the data bus
Controls what is stored in the cache for fastest access
Accesses the memory addresses with the address bus. The address bus is connected to
the address section of the computer’s memory
Also takes care of fetching and decoding
Keyboard - The keyboard is very much like a standard typewriter keyboard with a few
additional keys. The basic QWERTY layout of characters is maintained to make it easy
to use the system. The additional keys are included to perform certain special functions.
IThese are known as function keys that vary in number from keyboard to keyboard.
Mouse - A device that controls the movement of the cursor or pointer on a display
screen. A mouse is a small object you can roll along a hard and flat surface. Its name is
derived from its shape, which looks a bit like a mouse. As you move the mouse, the
pointer on the display screen moves in the same direction.
Trackball - A trackball is an input device used to enter motion data into computers or
other electronic devices. It serves the same purpose as a mouse, but is designed with a
moveable ball on the top, which can be rolled in any direction.
Magnetic ink character recognition (MICR) - MICR can identify character printed
with a special ink that contains particles of magnetic material. This device particularly
finds applications in banking industry.
28
Optical mark recognition (OMR) - Optical mark recognition, also called mark sense
reader is a technology where an OMR device senses the presence or absence of a mark,
such as pencil mark. OMR is widely used in tests such as aptitude test.
Bar code reader - Bar-code readers are photoelectric scanners that read the bar codes or
vertical zebra strips marks, printed on product containers. These devices are generally
used in super markets, bookshops etc
Scanner - Scanner is the third important input device of a computer system. A scanner
converts printed documents in to images. Some types of scanners scan documents and
produce the results in black & white images. The scanner operates in the same manner as
a Photocopier. A colored scanner works somewhat in a complicated manner as compared
to a simple scanner.
Digital Camera - Digital Cameras are used to capture images. Those images are then
transferred to a computer when the Camera is connected to the computer. Mostly the
Digital Camera images are in JPEG format.
c. List and explain 5 output devices you are familiar with. [5)
Impact printers use the typewriting printing mechanism wherein a hammer strikes the
paper through a ribbon in order to produce output. Dot-matrix and Character printers fall
under this category.
Non-impact printers do not touch the paper while printing. They use chemical, heat or
electrical signals to etch the symbols on paper. Inkjet, Deskjet, Laser, Thermal printers
fall under this category of printers.
Plotter: Plotters are used to print graphical output on paper. It interprets computer
commands and makes line drawings on paper using multi colored automated pens. It is
capable of producing graphs, drawings, charts, maps etc.
Facsimile (FAX): Facsimile machine, a device that can send or receive pictures and text
over a telephone line. Fax machines work by digitizing an image.
Speaker(s) - An expansion board that enables a computer to manipulate and output
sounds. Sound cards are necessary for nearly all CD-ROMs and have become
commonplace on modern personal computers. Sound cards enable the computer to output
29
sound through speakers connected to the board, to record sound input from a microphone
connected to the computer, and manipulate sound stored on a disk.
Question 10
y into an electronic computer file, and then edit the file using a word processor.
All OCR systems include an optical scanner for reading text, and
sophisticated software for analyzing images. Most OCR systems use a combination
of hardware (specialized circuit boards) and software to recognize characters, although
some inexpensive systems do it entirely through software. Advanced OCR systems can
read text in large variety of fonts, but they still have difficulty with handwritten text.
The potential of OCR systems is enormous because they enable users to harness the
power of computers to access printed documents. OCR is already being used widely in
the legal profession, where searches that once required hours or days can now be
accomplished in a few seconds.
iii. Ethics in information technology - Ethics are moral standards that help guide
behaviour, actions, and choices. Ethics are grounded in the notion of responsibility (as
free moral agents, individuals, organizations, and societies are responsible for the actions
that they take) and accountability (individuals, organizations, and society should be held
30
accountable to others for the consequences of their actions). In most societies, a system
of laws codifies the most significant ethical standards and provides a mechanism for
holding people, organizations, and even governments accountable.”
iv. E nd-user - An end user is the person that a software program or hardware device is
designed for. The term is based on the idea that the "end goal" of a software or hardware
product is to be useful to the consumer. The end user can be contrasted with the
developers or programmers of the product. End users are also in a separate group from
the installers or administrators of the product.
To simplify, the end user is the person who uses the software or hardware after it has
been fully developed, marketed, and installed. It is also the person who keeps calling the
"IT guy" with questions about why the product isn't working correctly. Generally, the
terms "user" and "end user" mean the same thing.
Identity Theft - Theft of someone's identity is facilitated by the computer, making it yet
another unethical use. If criminals are knowledgeable enough at computer hacking, then
it is easy for them to gain access to the personal and financial information of other people
and proceed in stealing their identity and ruining their lives.
Pornography - Distribution and use of pornography has been greatly facilitated with the
use of the computer. Not only is the use of adult pornography widespread with the use of
computers, but so is child pornography. Child pornography is one of the most, if not the
most, unethical uses of the computer today.
Explain any three control measures managers can adopt to ensure information system
security. (6)
31
General controls apply to information system activities throughout an organization. The most
important general controls are the measures that control access to computer systems and the
information stored there or transmitted over telecommunications networks. General controls
include administrative measures that restrict employees’ access to only those processes directly
relevant to their duties. As a result, these controls limit the damage that any individual employee
or employee impersonator can do. Fault-tolerant computer systems installed in critical
environments, such as in hospital information systems or securities marketplaces, are designed to
control and isolate problems so that the system can continue to function.
Application controls are specific to a given application and include such measures as validating
input data, logging the accesses to the system, regularly archiving copies of various databases,
and ensuring that information is disseminated only to authorized users.
"Data Access: Protecting Your Data" introduces the basics of data access controls. In
Chapter 6, the section entitled "Security Policy Requirements" describes the Orange
Book security policy requirements, which specify the data access controls defined for
different levels of secure systems.
Although a detailed discussion of secure system design is outside the province of this
book, the section "System Architecture" in Chapter 6 describes briefly the major Orange
Book design requirements for different levels of secure systems.
32
Question 11
a) Explain the reasons for networking computers [8]
File sharing - Network file sharing between computers gives you more flexibity than
using floppy drives or Zip drives. Not only can you share photos, music files, and
documents, you can also use a home network to save copies of all of your important
data on a different computer. Backups are one of the most critical yet overlooked
tasks in home networking.
Printer / peripheral sharing - Once a home network is in place, it’s easy to then set up
all of the computers to share a single printer. No longer will you need to bounce from
one system or another just to print out an email message. Other computer peripherals
can be shared similarly such as network scanners, Web cams, and CD burners.
Internet connection sharing - Using a home network, multiple family members can
access the Internet simultaneously without having to pay an ISP for multiple
accounts. You will notice the Internet connection slows down when several people
share it, but broadband Internet can handle the extra load with little trouble. Sharing
dial-up Internet connections works, too. Painfully slow sometimes, you will still
appreciate having shared dial-up on those occasions you really need it.
Entertainment - Many popular home computer games support LAN mode where
friends and family can play together, if they have their computers networked.
Internet telephone service: Voice over IP (VoIP) services allows you to make and
receive phone calls through your home network across the Internet.
33
Document tracking software can be used to prevent users from overwriting files, or
changing files that others are accessing at the same time.
Lower Cost Licensing - Application licensing can be expensive for individual
computers. Many software vendors offer site licenses for networks, which can
dramatically reduce the cost of software. The site license allows a group of people or
an entire organization to use the application for a single fee.
Centralized Administration - Centralized administration reduces the number of
people needed to manage the devices and data on the network, reducing time and cost
to the company. Individual network users do not need to manage their own data and
devices. One administrator can control the data, devices, and permissions of users on
the network. Backing up data is easier because the data is stored in a central location.
Conserve Resources -Data processing can be distributed across many computers to
prevent one computer from becoming overloaded with processing tasks
c. What problems can you face when using networked computers? [6]
Theft of Personal information - With the use of Internet there are chances that personal
information such as name, address, credit card, bank details and other information can be
accessed by unauthorized persons. If you use a credit card or internet banking for online
shopping, then your details can also be ‘stolen’.
Most parents do not realize the dangers involved when their children log onto the
Internet. When children talk to others online, they do not realize they could actually be
talking to a harmful person. Moreover, pornography is also a very serious issue
concerning the Internet, especially when it comes to young children.
Malware - Virus is a program created to disrupt the normal functioning of computer
systems. Computers attached to internet are more prone to virus attacks and they can end
up into crashing your whole hard disk.
Spamming - It is often viewed as the act of sending unsolicited email. This multiple or
vast emailing is often compared to mass junk mailings.
Phishing - Phishing attack refers to sending a convincing mail to targeted user with an
embedded URL in the same. When the user clicks the URL it directs the user to the
phishing website. And when the person enters there personal details, the same is utilized
by phisher to transfer money.
Security Issues - One of the major drawbacks of computer networks is the security issues
involved. If a computer is a standalone, physical access becomes necessary for any kind
of data theft. However, if a computer is on a network, a computer hacker can get
unauthorized access by using different tools. In case of big organizations, various
network security software are used to prevent the theft of any confidential and classified
data.
Expensive Set Up: The initial set up cost of a computer network can be high depending
on the number of computers to be connected. Costly devices like routers, switches, hubs,
etc., can add up to the bills of a person trying to install a computer network. He will also
have to buy NICs (Network Interface Cards) for each of the workstations, in case they are
not inbuilt.
34
Dependency on the Main File Server: In case the main File Server of a computer
network breaks down, the system becomes useless. In case of big networks, the File
Server should be a powerful computer, which often makes it expensive.
Question 12.
What is a database? [3]
In a library, use a full-text database when you are looking for magazine, journal, or
newspaper articles. Full-text means the entire article is available for you to print.
Use a database when you need statistics. Numerical data is ideal for a database format
since retrieval of organized data is much easier than wading through volumes of
unorganized data.
35
Product Information - You can use your e-business database to hold and update
information on your products, including detailed product descriptions and specifications,
product reference numbers, prices, promotional offers and availability. You also can
include details of the supplier for each product that you stock. By updating the
information in the database, rather than changing and publishing individual website
pages, you can save time and ensure your website always shows visitors the latest
information.
36
and it is not duplicated. For example, the dean's faculty file and the faculty payroll file
contain several items that are identical. When they are converted into database, the data is
integrated into a single database so that multiple copies of the same data are reduced to-
single copy.
In DBMS, the data redundancy can be controlled or reduced but is not removed
completely. Sometimes, it is necessary to create duplicate copies of the same data items
in order to relate tables with each other. By controlling the data redundancy, you can save
storage space. Similarly, it is useful for retrieving data from database using queries.
Data Consistency - By controlling the data redundancy, the data consistency is obtained.
If a data item appears only once, any update to its value has to be performed only once
and the updated value (new value of item) is immediately available to all users.
If the DBMS has reduced redundancy to a minimum level, the database system enforces
consistency. It means that when a data item appears more than once in the database and is
updated, the DBMS automatically updates each occurrence of a data item in the database.
Data Sharing - In DBMS, data can be shared by authorized users of the organization.
The DBA manages the data and gives rights to users to access the data. Many users can
be authorized to access the same set of information simultaneously. The remote users can
also share same data. Similarly, the data of same database can be shared between
different application programs.
Data Security - Data security is the protection of the database from unauthorized users.
Only the authorized persons are allowed to access the database. Some of the users may be
allowed to access only a part of database i.e., the data that is related to them or related to
their department. Mostly, the DBA or head of a department can access all the data in the
database. Some users may be permitted only to retrieve data, whereas others are allowed
to retrieve as well as to update data. The database access is controlled by the DBA. He
creates the accounts of users and gives rights to access the database. Typically, users or
group of users are given usernames protected by passwords.
Control Over Concurrency - In a computer file-based system, if two users are allowed
to access data simultaneously, it is possible that they will interfere with each other. For
example, if both users attempt to perform update operation on the same record, then one
may overwrite the values recorded by the other. Most DBMSs have sub-systems to
control the concurrency so that transactions are always recorded" with accuracy.
Backup and Recovery Procedures - In a computer file-based system, the user creates
the backup of data regularly to protect the valuable data from damaging due to failures to
the computer system or application program. It is a time consuming method, if volume of
data is large. Most of the DBMSs provide the 'backup and recovery' sub-systems that
automatically create the backup of data and restore data if required. For example, if the
computer system fails in the middle (or end) of an update operation of the program, the
recovery sub-system is responsible for making sure that the database is restored to the
state it was in before the program started executing.
Data Independence - The separation of data structure of database from the application
program that is used to access data from database is called data independence. In DBMS,
database and application programs are separated from each other. The DBMS sits in
37
between them. You can easily change the structure of database without modifying the
application program. For example you can modify the size or data type of a data items
(fields of a database table).
Cost of Hardware & Software - A processor with high speed of data processing and
memory of large size is required to run the DBMS software. It means that you have to
upgrade the hardware used for file-based system. Similarly, DBMS software is also Very
costly.
Cost of Data Conversion - When a computer file-based system is replaced with a
database system, the data stored into data file must be converted to database files. It is
difficult and time consuming method to convert data of data files into database. You have
to hire DBA (or database designer) and system designer along with application
programmers; Alternatively, you have to take the services of some software houses. So a
lot of money has to be paid for developing database and related software.
Cost of Staff Training - Most DBMSs are often complex systems so the training for
users to use the DBMS is required. Training is required at all levels, including
programming, application development, and database administration. The organization
has to pay a lot of amount on the training of staff to run the DBMS.
Appointing Technical Staff - The trained technical persons such as database
administrator and application programmers etc are required to handle the DBMS. You
have to pay handsome salaries to these persons. Therefore, the system cost increases.
Database Failures - In most of the organizations, all data is integrated into a single
database. If database is corrupted due to power failure or it is corrupted on the storage
media, then our valuable data may be lost or whole system stops.
Question 13.
a) Explain the terms: data transmission, time sharing and multitasking as they are used in
computers [6]
Time-sharing was developed out of the realization that while any single user would make
inefficient use of a computer, a large group of users together would not. This was due to
the pattern of interaction: Typically an individual user entered bursts of information
followed by long pauses but a group of users working at the same time would mean that
the pauses of one user would be filled by the activity of the others. Given an optimal
38
group size, the overall process could be very efficient. Similarly, small slices of time
spent waiting for disk, tape, or network input could be granted to other users.
Data transmission – the sending and receiving data via cables (e.g., telephone lines or
fibre optics) or wireless relay systems. Because ordinary telephone circuits pass signals
that fall within the frequency range of voice communication (about 300–3,500 hertz), the
high frequencies associated with data transmission suffer a loss of amplitude and
transmission speed. Data signals must therefore be translated into a format compatible
with the signals used in telephone lines. Digital computers use a modem to transform
outgoing digital electronic data; a similar system at the receiving end translates the
incoming signal back to the original electronic data. Specialized data-transmission links
carry signals at frequencies higher than those used by the public telephone network.
Multitasking - Mode of computer operation in which the computer works on multiple
tasks at the same time. A task is a computer program (or part of a program) that can be
run as a separate entity. On a single-processor system, the CPU can perform preemptive
(also called time slicing or time sharing) multitasking, where it executes part of one
program, then switches to another program, and then returns to the first one.
Multitasking does not necessarily mean that multiple tasks are executing at exactly the
same instant. In other words, multitasking does not imply parallelism, but it does mean
that more than one task can be part-way through execution at the same time, and more
than one task is advancing over a given period of time.
In the case of a computer with a single CPU, only one task is said to be running at any
point in time, meaning that the CPU is actively executing instructions for that task.
Multitasking solves the problem by scheduling which task may be the one running at any
given time, and when another waiting task gets a turn. The act of reassigning a CPU from
one task to another one is called a context switch.
b. Explain fibre optical cable, coaxial cable and twisted pair cable and give their uses. [8]
Twisted pair - Twisted pair wire is the most widely used medium for telecommunication.
Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary
telephone wires consist of two insulated copper wires twisted into pairs. Computer
networking cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of
copper cabling that can be utilized for both voice and data transmission. The use of two
wires twisted together helps to reduce crosstalk and electromagnetic induction. The
transmission speed ranges from 2 million bits per second to 10 billion bits per second.
Twisted pair cabling comes in two forms which are Unshielded Twisted Pair (UTP) and
39
Shielded twisted-pair (STP) which are manufactured in different increments for various
scenario.
Coaxial cable - Coaxial cable is widely used for cable television systems, office
buildings, and other work-sites for local area networks. The cables consist of copper or
aluminum wire wrapped with insulating layer typically of a flexible material with a high
dielectric constant, all of which are surrounded by a conductive layer. The layers of
insulation help minimize interference and distortion.
Optical fiber - Optical fiber cable consists of one or more filaments of glass fiber
wrapped in protective layers that carries data by means of pulses of light. It transmits
light which can travel over extended distances. Fiber-optic cables are not affected by
electromagnetic radiation. Transmission speed may reach trillions of bits per second. The
transmission speed of fiber optics is hundreds of times faster than for coaxial cables and
thousands of times faster than a twisted-pair wire. This capacity may be further increased
by the use of colored light, i.e., light of multiple wavelengths. Instead of carrying one
message in a stream of monochromatic light impulses, this technology can carry multiple
signals in a single fiber.
Twisted Pair
Advantages
Cheaper and far easier to splice
Less susceptible to electrical interference caused by nearby equipment or wires.
In turn are less likely to cause interference themselves.
Because it is electrically "cleaner", STP wire can carry data at a faster speed.
Disadvantages
STP wire is that it is physically larger and more expensive than twisted pair
wire.
STP is more difficult to connect to a terminating block.
Coaxial Cable
Advantages
Coaxial cable can support greater cable lengths between network devices than
twisted pair cable.
Thick coaxial cable has an extra protective plastic cover that help keep moisture
away.
Disadvantages
40
Thick coaxial is that it does not bend easily and is difficult to install.
Fiber Optic
Advantages
Low loss of signal (typically less than 0.3 dB/km), so repeater-less transmission over long
distances is possible
Large data-carrying capacity (thousands of times greater, reaching speeds of up to 1.6
Tb/s in field deployed systems and up to 10 Tb/s in lab systems)
Immunity to electromagnetic interference, including nuclear electromagnetic pulses (but
can be damaged by alpha and beta radiation)
No electromagnetic radiation; difficult to eavesdrop
High electrical resistance, so safe to use near high-voltage equipment or between areas
with different earth potentials
Low weight
Signals contain very little power
No crosstalk between cables.
Disadvantages
Fiber optic cable is difficult to splice in order to make connections
Cost - Cables are expensive to install but last longer than copper cables.
Transmission - transmission on optical fibre requires repeating at distance
intervals.
Fragile - Fibres can be broken or have transmission loses when wrapped around
curves of only a few centimetres radius. However by encasing fibres in a plastic
sheath, it is difficult to bend the cable into a small enough radius to break the
fibre.
Protection - Optical fibres require more protection around the cable compared to
copper.
41
In the cost perspective, the primary memory is costlier than the secondary memory
devices. Because of this reasons most of the computer users install smaller primary
memory and larger secondary memory.
As the secondary memory is permanent, all the files and programs are stored in the
secondary memory most and as the primary memory interacts very fast with the
microprocessor, when the computer needs to access the files that are stored in the
secondary memory, then such files are first loaded into the primary memory and then
accessed by the computer.
The following table list out some of the key differences between the primary
and secondary memory:
PRIMARY MEMORY SECONDARY MEMORY
The memory devices used for primary memory are The secondary memory devices are magnetic and
semiconductor memories optical memories.
The primary memory is categorized as volatile and
non-volatile memories, RAM is the volatile
memory and ROM is the non-volatile memory The secondary memory is always non volatile
The primary memory is composed of programs
and data that are presently being used by the The secondary memory is enough capable to store
micro-processor huge amount of information
The secondary memories are somewhat slow in
The primary memories are more effective and fast interacting with the microprocessor, when
to interact with the micro-processor compared with the primary memory.
Secondary memory is known as additional
Primary memory is known as main memory memory or back memory
These memories are also called as internal These memories are also called as external
memory memory
Primary memory is temporary The secondary memory is permanent
Commonly used primary memory (main memory) Generally secondary memories range between 80
available in the range of 512 MB to 8 GB RAMs. GB to 4 TB Hard Disc Drives.
The primary memory devices are connected to the The secondary memory devices are connected to
computer through “slots” the computer through Cables
RAM is Random Access Memory; it's very fast and is used to store data and programs which a
computer processor is currently processing and needs to have easily to hand. It is volatile (loses
its contents when the power is switched off). RAM is needed because most data on computers is
stored in much slower "storage media" such as hard disks, solid state drives or flash memory. For
the processor to be able to work on data or run programs at any reasonable speed, the programs
42
or data need to be copied into RAM first.
ROM is Read Only Memory. It can also be quite fast. It is non-volatile and used to store data
which will not need to change, such as software to start up and run an electronic device or for the
basic start-up functions of a computer. ROM can either be write-once, where it holds data
permanently, or write-many, where it can be erased and re-written using special equipment (but
not during normal use). ROM has become less common than it once was, because other kinds of
memory have become cheaper, though of course CD-ROMs are quite prevalent.
Cache memory is a bit like RAM, except it's built right inside a processor and is even faster than
RAM. It's used by the processor to avoid having to slow down to the speed of the RAM all the
time. Like RAM, it is also volatile. Cache memory is usually quite low-capacity (a few
megabytes), so we still need RAM in order to avoid constantly accessing things from slow
storage media.
The term cache also refers to any system in which data is temporarily stored closer to its point of
use, to speed things up and reduce the transfer of data. Web browsers have a cache to store parts
of web pages, so they don't have to be downloaded every time the page is visited. Caches are
found all over the place in software as a performance-enhancement. Networking, operating
systems and servers can all make use of cacheing in one way or another.
Question 15
a) With clear examples explain the differences between open source software and licensed
software (10)
Open source software is software whose source code is available for modification or
enhancement by anyone.
"Source code" is the part of software that most computer users don't ever see; it's the code
computer programmers can manipulate to change how a piece of software—a "program" or
"application"—works. Programmers who have access to a computer program's source code can
improve that program by adding features to it or fixing parts that don't always work correctly.
Open source is a set of principles and practices on how to write software. Literally "open
source" means the source code is available to the users. The Open Source Definition, which was
created by Bruce Perens and Eric Raymond and is currently maintained by the Open Source
Initiative, adds additional meaning to the term. One should not only get the source code but also
have the right to use it. If the latter is denied the license is categorized as a shared source
license.A software license agreement is a memorandum of contract between a producer and a
user of computer software which grants the user a software license. Most often, a software
license agreement indicates the terms under which an end-user may utilize the licensed software,
in which case the agreement is called an end-user license agreement or EULA. When the
software license agreement is between the software licensor and a business or government entity,
it is often implemented as a specialized form of contract with many clauses unique to the license
and the nature of the software being licensed.
43
Some software has source code that cannot be modified by anyone but the person, team, or
organization who created it and maintains exclusive control over it. This kind of software is
frequently called "proprietary software" or "closed source" software, because its source code is
the property of its original authors, who are the only ones legally allowed to copy or modify it.
Microsoft Word and Adobe Photoshop are examples of proprietary software. In order to use
proprietary software, computer users must agree (usually by signing a license displayed the first
time they run this software) that they will not do anything with the software that the software's
authors have not expressly permitted.
Open source software is different. Its authors make its source code available to others who would
like to view that code, copy it, learn from it, alter it, or share it. LibreOffice and the GNU Image
Manipulation Program are examples of open source software. As they do with proprietary
software, users must accept the terms of a license when they use open source software—but the
legal terms of open source licenses differ dramatically from those of proprietary licenses. Open
source software licenses promote collaboration and sharing because they allow other people to
make modifications to source code and incorporate those changes into their own projects. Some
open source licenses ensure that anyone who alters and then shares a program with others must
also share that program's source code without charging a licensing fee for it. In other words,
computer programmers can access, view, and modify open source software whenever they like—
as long as they let others do the same when they share their work. In fact, they could be violating
the terms of some open source licenses if they don't do this.
So as the Open Source Initiative explains, "open source doesn't just mean access to the source
code." It means that anyone should be able to modify the source code to suit his or her needs, and
that no one should prevent others from doing the same. The Initiative's definition of "open
source" contains several other important provisions.
Peer-to-Peer
Peer-to-peer networks are more commonly implemented where less than ten computers are
involved and where strict security is not necessary. All computers have the same status, hence
the term 'peer', and they communicate with each other on an equal footing. Files, such as word
processing or spreadsheet documents, can be shared across the network and all the computers on
the network can share devices, such as printers or scanners, which are connected to any one
computer
Peer-to-peer networks allow users to share resources and files located on their computers and to
access shared resources found on other computers. However, they do not have a file server or a
centralized management source. In a peer-to-peer network, all computers are considered equal;
they all have the same abilities to use the resources available on the network. Peer-to-peer
networks are designed primarily for small to medium local area networks. Nearly all modern
desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-
to-peer network operating systems.
44
Advantages of a peer-to-peer network:
Client/Server
Client/server networks are more suitable for larger networks. A central computer, or 'server',
acts as the storage location for files and applications shared on the network. Usually the server is
a higher than average performance computer. The server also controls the network access of the
other computers which are referred to as the 'client' computers. Typically, teachers and students
in a school will use the client computers for their work and only the network administrator
(usually a designated staff member) will have access rights to the server
Client/server networks allow the network to centralize functions and applications in one or more
dedicated file servers. The file servers become the heart of the system, providing access to
resources and providing security. Individual workstations (clients) have access to the resources
available on the file servers. The network operating system provides the mechanism to integrate
all the components of the network and allow multiple users to simultaneously share the same
resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows
Servers are examples of client/server network operating systems.
Centralized - Resources and data security are controlled through the server.
Scalability - Any or all elements can be replaced individually as needs increase.
Flexibility - New technology can be easily integrated into system.
Interoperability - All components (client/network/server) work together.
Accessibility - Server can be accessed remotely and across multiple platforms.
45
· Less expensive to install · More expensive to install
· A variety of operating systems can be
· Can be implemented on a wide range supported on the client computers, but the
of operating systems server needs to run an operating system that
supports networking
· More time consuming to maintain the · Less time consuming to maintain the
software being used (as computers software being used (as most of the
must be managed individually) maintenance is managed from the server)
High levels of security are supported, all
Very low levels of security
of which are controlled from the server.
supported or none at all. These can be
Such measures prevent the deletion of
very cumbersome to set up, depending
essential system files or the changing of
on the operating system being used
settings
· Ideal for networks with less than 10 · No limit to the number of computers that
computers can be supported by the network
· Requires a server running a server
· Does not require a server
operating system
· Demands that the network administrator
· Demands a moderate level of skill to has a high level of IT skills with a good
administer the network working knowledge of a server operating
system
Question 16
a) Briefly describe the generations of computers from 1st generation to the 5th
generation (10)
The first computers used vacuum tubes for circuitry and magnetic drums for memory,
and were often enormous, taking up entire rooms. They were very expensive to operate
and in addition to using a great deal of electricity, generated a lot of heat, which was
often the cause of malfunctions.
Advantages
Vacuum tubes were the only electronic component available during those days.
46
Vacuum tube technology made possible to make electronic digital computers.
These computers could calculate data in millisecond.
Disadvantages
Transistors replaced vacuum tubes and ushered in the second generation of computers.
The transistor was invented in 1947 but did not see widespread use in computers until the
late 1950s. The transistor was far superior to the vacuum tube, allowing computers to
become smaller, faster, cheaper, more energy-efficient and more reliable than their first-
generation predecessors. Though the transistor still generated a great deal of heat that
subjected the computer to damage, it was a vast improvement over the vacuum tube.
Second-generation computers still relied on punched cards for input and printouts for
output.
The first computers of this generation were developed for the atomic energy industry.
Advantages
47
The 2nd generation Computers were more reliable
Used less energy and were not heated.
Wider commercial use
Better portability as compared to the first generation computers.
Better speed and could calculate data in microseconds
Used faster peripherals like tape drives, magnetic disks, printer etc.
Used Assembly language instead of Machine language.
Accuracy improved.
Disadvantages
The development of the integrated circuit was the hallmark of the third generation of
computers. Transistors were miniaturized and placed on silicon chips, called
semiconductors, which drastically increased the speed and efficiency of computers.
Instead of punched cards and printouts, users interacted with third generation computers
through keyboards and monitors and interfaced with an operating system, which allowed
the device to run many different applications at one time with a central program that
monitored the memory. Computers for the first time became accessible to a mass
audience because they were smaller and cheaper than their predecessors.
Advantages
48
Better accuracy
Commercial production increased.
Used mouse and keyboard for input.
Disadvantages
In 1981 IBM introduced its first computer for the home user, and in 1984 Apple
introduced the Macintosh. Microprocessors also moved out of the realm of desktop
computers and into many areas of life as more and more everyday products began to use
microprocessors.
As these small computers became more powerful, they could be linked together to form
networks, which eventually led to the development of the Internet. Fourth generation
computers also saw the development of GUIs, the mouse and handheld devices.
Advantages
Disadvantages
49
Fifth Generation (Present and Beyond) Artificial Intelligence
Advantages
1. High Speed
The computer has units of speed in microsecond, nanosecond and even the
picosecond.
It can perform millions of calculations in a few seconds as compared to man who can
spend many months for doing the same task.
2. Accuracy
3. Storage Capability
The computer has much more storage capacity than human beings.
It can store any type of data such as images, videos, text, audio and any other type.
50
4. Diligence
Unlike human beings, a computer is free from monotony, tiredness and lack of
concentration.
5. Versatility
This machine can be used to solve the problems relating to various different fields.
At one instant, it may be solving a complex scientific problem and the very next
moment it may be playing a card game.
6. Reliability
7. Automation
Once a program is given to computer i.e. stored in computer memory, the program
and instruction can control the program execution without human interaction.
As data in electronic files can be retrieved as and when required, the problem of
maintenance of large number of files gets reduced.
51
9. Reduction in Cost
Though the initial investment for installing a computer is high but it substantially
reduces the cost of each of its transaction.
Disadvantages of computer
The use of computer has also created some problems in society which are as follows.
Unemployment
Different tasks are performed automatically by using computers. It reduces the need of people
and increases unemployment in society.
Many people use computers without positive purpose. They play games and chat for a long
period of time. It causes wastage of time and energy. Young generation is now spending more
time on the social media websites like Facebook, Twitter etc or texting their friends all night
through smartphones which is bad for both studies and their health. And it also has adverse
effects on the social life.
Data Security
The data stored on a computer can be accessed by unauthorized persons through networks. It has
created serious problems for the data security.
Computer Crimes
People use the computer for negative activities. They hack the credit card numbers of the people
and misuse them or they can steal important data from big organizations.
Privacy violation
The computers are used to store personal data of the people. The privacy of a person can be
violated if the personal and confidential records are not protected properly.
Health risks
The improper and prolonged use of computer can results in injuries or disorders of hands, wrists,
elbows, eyes, necks and back. The users can avoid health risks by using the computer in proper
position. They must also take regular breaks while using the computer for longer period of time.
It is recommended to take a couple of minutes break after 30 minutes of computer usage.
52
Impact on Environment
The computer manufacturing processes and computer waste are polluting the environment. The
wasted parts of computer can release dangerous toxic materials. Green computer is a method to
reduce the electricity consumed and environmental waste generated when using a computer. It
includes recycling and regulating manufacturing processes. The used computers must be donated
or disposed of properly.
53