- Explain, for each of the following actions, using the appropriate relevant terms, how each of the following actions takes place in terms of the data transfer, software and hardware used, protocols.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England. - What are the most important characteristics of expert systems? Give one example, and explain in detail why the application chosen is an expert system.
- For what activities would you recommend teleworking? What can be some of the problems associated with teleworking?
- A shoe store wants to set up its IT operation. They own a shop where they sell shoes to the public, and at the shop they have 5 point of sale (POS) computers that use a common printer for the printing of invoices. The manager of the store has his own computer and printer that needs to be networked to all the others. All computers in the store access the Internet though a cablemodem. The store needs to be connected to the firm’s central office and warehouse. At the central office, the administration has 4 computers with their own file server and printer, and they are also connected to 3 computers in the warehouse that are used for stock control and that have their own printer. All computers at the central office and warehouse are connected to the Internet.
a) Draw a diagram that depicts the schematics of the network, including images of the various components (hubs, switches, etc.) that you can easily obtain from the Internet.
b) Write a rationale for the design decisions that were made, explaining the reasons for them.
- Describe two hacking techniques that you learned thorugh SlaveHack and what their limitatios are in real life as compared to the game.
- Choose one of these topics and comment how technology can enhance activities within that sector, as well as the impact that these technological applications may have on individuals and society.
a. Health
b. Arts, Entertainment and Leisure
c. Science and the environment
d. Politics and government - Give an account of what specific functions are performed by the operating system from the moment in which the computer is turned on until it is ready to receive user input. How does the CPU/Operating System achieve multitasking?
- Explain in detail how a robot processes outside information and responds accordingly, utilizing technical terms.
Monday, November 19, 2012
Final Exam
Thursday, November 15, 2012
Practice for Final Exam
1-
Explain, for each of the following actions, using the appropriate relevant
terms, how each of the following actions takes place in terms of the data
transfer, software and hardware used, protocols.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
2.
A family who plans to relocate to Argentina wants to find information about St.
Andrew’s Scots School. In order to do that, it uses Google to search for the
name of the school. Explain in detail:
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.
3-
A small university has two different campuses. The main campus houses the
central office, that has 5 computers which deal with administrative tasks and
that also house the server that contains all course materials and software to
manage the distance learning program that allows many students to study from
home. These five computers share a colour printer. There are two classrooms,
with 4 computers each, and these have access to the file server that stores all
student data.The
other campus, which is 20 km away, has a small office with two computers and
three classrooms with one computer each, the idea is that all students in this
campus should connect to the network via WiFi and be able to access their files
located on the other campus file server. There is a single printer on this
campus, shared by all computers.Draw
a schematic diagram of the network, and write a short paragraph explaining the
rationale for your design.
4- Give a short summary of the hacking techniques that you
learned in Slavehack. How can a user prevent access from hackers?
5- Explain how technology has impacted one of the following areas, giving specific examples that you have
researched:
-
Arts and entertainment OR
-
Health and medicine OR
-
Politics
OR
-
Science and the environment.
6- How is a conversational robot developed? Would you say that
it constitutes an expert system? Why? How is the quality of a conversational
engine generally tested?
7 – Explain in detail how students may benefit from the
application of technology in the classroom and why teachers may be somewhat
worried about the extended use of technology in schools.
Thursday, November 1, 2012
Technology in Education
Working individually, you will answer the following questions and send your answers to me at itgs.sass@gmail.com
Many
schools are now offering a new educational resource for their students.
Families and teachers have access to a password-protected web site where
students may find information that has been provided for them.
In
this web site there are links to different subject areas where teachers can
place exercises, past exam papers, revision tools and even photographs from
past field trips. Students and parents may access this site from school or from
home.
(a) Describe how a password-protected web site
operates.
(b)
Describe two IT features that a computer user would require to access or
use this site.
(c)
Explain how the new web site could improve student learning.
(d)
This system may be a great advantage for students, but it may place teachers with
limited IT skills under great pressure. Discuss
the concerns of some teachers when they are asked to make this new resource
available for the students.
Subscribe to:
Comments (Atom)