Monday, November 19, 2012

Final Exam


  1. Explain, for each of the following actions, using the appropriate relevant terms, how each of the following actions takes place in terms of the data transfer, software and hardware used, protocols.
    a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
    b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
    c) An email is sent from a computer in Argentina to another computer in England.
  2. What are the most important characteristics of expert systems? Give one example, and explain in detail why the application chosen is an expert system. 
  3. For what activities would you recommend teleworking? What can be some of the problems associated with teleworking?
     
  4. A shoe store wants to set up its IT operation. They own a shop where they sell shoes to the public, and at the shop they have 5 point of sale (POS) computers that use a common printer for the printing of invoices. The manager of the store has his own computer and printer that needs to be networked to all the others. All computers in the store access the Internet though a cablemodem. The store needs to be connected to the firm’s central office and warehouse. At the central office, the administration has 4 computers with their own file server and printer, and they are also connected to 3 computers in the warehouse that are used for stock control and that have their own printer. All computers at the central office and warehouse are connected to the Internet.
    a) Draw a diagram that depicts the schematics of the network, including images of the various components (hubs, switches, etc.) that you can easily obtain from the Internet.
    b) Write a rationale for the design decisions that were made, explaining the reasons for them.
     
  5. Describe two hacking techniques that you learned thorugh SlaveHack and what their limitatios are in real life as compared to the game.
  6. Choose one of these topics and comment how technology can enhance activities within that sector, as well as the impact that these technological applications may have on individuals and society.
    a. Health
    b. Arts, Entertainment and Leisure
    c. Science and the environment
    d. Politics and government
  7. Give an account of what specific functions are performed by the operating system from the moment in which the computer is turned on until it is ready to receive user input. How does the CPU/Operating System achieve multitasking?
     
  8. Explain in detail how a robot processes outside information and responds accordingly, utilizing technical terms. 

Thursday, November 15, 2012

Practice for Final Exam


1- Explain, for each of the following actions, using the appropriate relevant terms, how each of the following actions takes place in terms of the data transfer, software and hardware used, protocols.
a) A user tries to access an unauthorized web site and is prevented from doing so by the network operating system.
b) A user installs a special videoconference software and when trying to run the software the system refuses to execute for security reasons.
c) An email is sent from a computer in Argentina to another computer in England.
 
2. A family who plans to relocate to Argentina wants to find information about St. Andrew’s Scots School. In order to do that, it uses Google to search for the name of the school. Explain in detail:
a. How the search engine knows which pages contain information about our school.
b. How it ranks these pages so as to return them in order of decreasing relevance.
c. The process by which the user types the query and receives the links returned by the search engine.
d. How the school could make sure that the school’s web site appears first on the list.

3- A small university has two different campuses. The main campus houses the central office, that has 5 computers which deal with administrative tasks and that also house the server that contains all course materials and software to manage the distance learning program that allows many students to study from home. These five computers share a colour printer. There are two classrooms, with 4 computers each, and these have access to the file server that stores all student data.The other campus, which is 20 km away, has a small office with two computers and three classrooms with one computer each, the idea is that all students in this campus should connect to the network via WiFi and be able to access their files located on the other campus file server. There is a single printer on this campus, shared by all computers.Draw a schematic diagram of the network, and write a short paragraph explaining the rationale for your design.

4- Give a short summary of the hacking techniques that you learned in Slavehack. How can a user prevent access from hackers?

5- Explain how technology has impacted one of the following areas, giving specific examples that you have researched:

-          Arts and entertainment OR

-          Health and medicine    OR

-          Politics   OR

-          Science and the environment.
6- How is a conversational robot developed? Would you say that it constitutes an expert system? Why? How is the quality of a conversational engine generally tested?

7 – Explain in detail how students may benefit from the application of technology in the classroom and why teachers may be somewhat worried about the extended use of technology in schools.


Thursday, November 1, 2012

Technology in Education

Working individually, you will answer the following questions and send your answers to me at itgs.sass@gmail.com

Many schools are now offering a new educational resource for their students. Families and teachers have access to a password-protected web site where students may find information that has been provided for them.

In this web site there are links to different subject areas where teachers can place exercises, past exam papers, revision tools and even photographs from past field trips. Students and parents may access this site from school or from home.

 (a) Describe how a password-protected web site operates.

(b) Describe two IT features that a computer user would require to access or use this site.

(c) Explain how the new web site could improve student learning.

(d) This system may be a great advantage for students, but it may place teachers with limited IT skills under great pressure. Discuss the concerns of some teachers when they are asked to make this new resource available for the students.