Você está na página 1de 4

SET1 ICT ANSWER 1.A 8.D 11. i. T 13. i.B 2.A 9.A ii. F ii. D 3.C 10.C iii.

F iii. C 12 i. T 14 i.B 16 i. A ii. T ii.C iii. F 4.B 5.A 6.C 7.D

QUESTION 5:

(a)
(b)

To calculate the total sale after deducting discount. i) Price per Item ii) Total sale Documentation

(c)

SECTION C 15. i. C ii.A ii.C QUESTION 1: 17.PRIVACY/INFORMATION PRIVACY 18.CYBER LAW 20.TCP/IP 22.CD DVD / WEB 19. OUTPUT INPUT 21.NIC/NETWORK INTERFACE CARD 23.GRAPHICS/IMAGES (a) Differences between two computer types of the bank (i.e. between LAN and WAN) Dimension WAN LAN Area of coverage A network that covers a large geographical area. It covers great distance and operates nationwide or even worldwide such as a city or country. A network that connects computers and devices in a limited geographical area of few kilometres such as a home, school computer laboratory, office building or closely positioned group of buildings. The computer terminals and peripheral devices are often connected with wires and coaxial cables. Often the nodes are connected via cables. Cost of data transmission in LAN is less because the transmission medium is owned by a single organization

24. SORT/FILTER/SEARCH/RETRIEVE/INSERT/DELETE/UPDATE 25.QUERY SECTION B QUESTION 1: (a) (b) (c) Hacking Destruction / Digital defacement of data / Gaining access to intellectual / Proprietary technology / information. - Don't open unexpected email attachments. - Check for closed padlock/key symbol in the browser window. Only download software from trusted sites. Use up-dated anti-virus software. Use the latest version of your operating system and web browsers. Good passwords. Don't store important passwords on your machine or in a password saver. - Install a firewall Connection

Cost of data transmission

There is no physical connection. Parts of the network may be connected by cables and other parts by microwave or satellite transmission. In case of WAN the cost of data transmission is very high because the transmission mediums used are hired either telephone lines or satellite links. The speed of data transmission is lower than LAN. The speed ranges from 1800 to 9600 bits per second (bps).

QUESTION 2: (a) i) Keyboard ii) Printer Diskette / floppy disk /pen drive / thumb drive / hard disk / cd rom / dvd rom (ANY TWO OF SECONDARY STORAGE)

Speed of data transmission

(b)

The speed of data transmission is much higher in LAN than in WAN. The transmission speed in LAN varies from 0.1 to 100 megabits per second. Consists of two or more computers connected by a cable. Each computer or device on the network, called a node, often shares resources such as printers, large hard disks and programs.

Characteristic QUESTION 3: (a) (b) Design i) Table / Form / Query / Report ii) Table / Form / Query / Report Collection of organized data / You can access , retrieve and use the data

(c)

Consists of two or more LANs connected by routers that ensure data, instruction and information are delivered to the correct destination.

QUESTION 4: (a) i) Subject-matter expert ii) Provide / do research on the contents i) Graphic ii) Scanner / digital camera / video camera

(b)

(b) Two differences between LAN A topology (star) and LAN B


topology (bus).

not affect the network.

by a break in any part of the cable (backbone).

Dimension

LAN A Topology (star)

LAN B Topology (bus) Failure of one device does not affect the rest of the bus network because the transmission simply bypasses the failed device. Failure of one device, will affect only that device because each device connects directly to the hub. The other devices continue to operate normally.

throughout the whole network.

If the bus fails, the network remains inoperative until the bus is back in working order.

If the hub fails, however the entire networks is inoperable until the hub is repaired.

Characteristic

All of the devices in the network connect to a host or central computer. The central computer that provides a common connection point for devices in the network is called the hub/switch.

In bus topology, all workstations are connected to a single communication cable called bus that connects the computers and other devices. In this type of network topology there is no central node as in star topology.

(c) The difference between two current network communications in the bank

Dimension Area of coverage

Internet A worldwide collection of networks that links millions of businesses, government agencies, educational institutions and individuals. Make any information accessible to anybody, anywhere and anytime. Telephone company

Intranet An internal network that uses Internet technologies. A small version of the Internet that exists within an organization.

There are no direct connections between the nodes on the network except through the host computer.

Typically wires connect each node to the networks backbone, which is a fixed length of cable with terminators at both ends to stop reflections when signals hit the end. Quite difficult to set up and add a new device as it requires physically linking it to the existing backbone All data that transfers from one computer to another passes through the hub. Transmission from any station travels the length of the bus in both directions and can be received by all workstations. A signal addressed to another node is sent to the bus. All other nodes on the network examine the signal to see if it is addressed to one of them.

Access

Make company information accessible to employees and facilitate working in groups. Company itself

Installation

Quite easy to set up and add new devices

Service Provider

Data transmission

The bus in a bus network can transmit data, instructions and information in both directions. Only one device such as a computer can transfer items at one time.

Each of the networks on the Internet provides resources that add to the abundance of goods, services and information accessible via the Internet.

Using Internet technology, corporations are building company wide intranets accessible only to their employees and other invited users.

When one of the computers on the network sends a signal, the host routes it to the node its addressed to.

The WWW and e-mail are two of the more widely accessed Internet services. Other services include FTP, newsgroup, chat rooms, instant messaging and Internet telephony.

Intranets are used not only for posting documents within an organization, but also for linking software, database and hardware into a universal network.

Fault tolerance

High fault tolerance any device/ cable that fails will

Low or no fault tolerance network will be affected

Data sent over the Internet travels via networks and

communications media owned and operated by many companies.

- Portion of a companys network that allows customers or suppliers of a company to access parts of an enterprises intranet. These private intranets share the same software ad hardware as the Internet and speak the same language, but are fenced off from others on the Internet by defensive barriers called firewalls. Example: XYZ Bank allows customers to access their intranet to pay bills, to print the account statement and so forth. QUESTION 2: (a) (b) User uses certain devices such as keyboard or mouse to keyin the required data to produce meaningful information. - collect data about workers in Green Technology Company and generate the report according to the needs. - can access information about workers at anytime through network environment. data analysis on workers salary can be done faster and accurately data can be updated electronically at anytime.

Employees often connect to the Internet through a business or school network.

The computers usually are part of a network that connects to an Internet access provider through a high-speed connection line leased from a telephone company.

The bank uses its intranet to link design centers around the world so engineers can collaborate on the design of new cars. Sun employees use their intranet for e-mail, expense reports, benefit changes, travel authorizations and as an information resource for marketing, product and corporate information.

(c)

- virus attack that can threat data or information - hacking by hackers - hardware failure - software failure

Intranet are popular for various reasons : The resources on the intranet are accessible to anyone, anywhere as long as they have a computer, a modem and a password

(d) - Virus attack can cause data lost or damaged - When data being hacked by hackers, it can be manipulated and misused - When hardware failure, user cannot key-in, process, update data or access information. - When software failure, user cannot key-in, process, update data or access information. QUESTION 3: a) Draw a block diagram to illustrate the information processing cycle and give a brief description.

Complex data and applications can be used over the intranet with ease learning to use an intranet is simple. If you know how to use the Web, you know how to use an intranet

Costs are lower because so much software and so any connections are available from so many sources.

(d) Explanation of the proposed network communication (i.e. extranet) - Allows customers or suppliers to access part of its intranet. - Intranet extends to authorize users outside the company.

Alternative 3 The information processing cycle involves the cycle of input, process, output, and storage. The information cycle involves the input of data, processing data into information, output the information and storing the results (information). Data collection of unorganised facts, which include words, numbers, images, and sounds Information - data that is organised, has meaning, and is useful e.g. reports, newsletters, a receipt, or a check Input data that is entered into a computer Output processed results A computer is an electronic device which operates under the control of instructions stored in its own memory, that can accept data (input), process the data according to specified rules (process), produce results (output), and stores the results for future use (storage)

with those instructions holds instructions and data while they are being processed by the CPU stores instructions to execute a programme to allow the CPU to follow instantly the set of instructions can be read and written data and instructions can be read and written by the CPU ROM (Read Only Memory) store data, instructions or information permanently, recorded when the chip is manufactured (called firmware) non-volatile memory content not lost content on failure of power supply, also known as non-volatile memories stores some standard processing programs supplied by the manufacturers to operate the personal computer stores basic input/output program that examines and initializes various equipment attached to the PC when the switch is made ON. read only memory - can be read by the CPU but cannot be changed

b)

Explain two differences between G (open software) and H (proprietary software). Open Software

purchased with its source code, together with the permission to modify and further distribute the program under the same condition code made available to the public allow customers to personalize the software to meet their needs users can modify the software to share their improvements with others

Proprietary Software purchased usually without its source code, and no permission to modify or distribute the program under the same condition privately owned software limited to a specific vendor or computer model users cannot modify the software to share the improvements with others

c) Explain two differences between M (RAM) and N (ROM). RAM (Random Access Memory) stores data and instructions temporarily, disappears when power to computer is switched off volatile memory content (data and instructions) lost on failure of power supply or when the computer is switched off holds instructions to be executed and data to be used

Você também pode gostar