1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Q1:Define "Information Systems" and list different types.
A: Information Systems are organized sets of components that collect, process, store, and distribute information. Types include:
Transaction Processing Systems: Handle routine transactions, like order processing.
Management Information Systems: Support management decisions by providing regular summaries.
Office Automation Systems: Facilitate document and communication tasks.
Decision Support Systems: Aid in complex decision-making with data analysis.
Executive Information Systems: Provide executives with easy access to internal and external data.
Q2: Describe the relationship among the components in an Information System.
A: Components in an Information System include hardware, software, data, procedures, users, and network. Each component interacts to process data into useful information. For example:
Hardware captures and stores data.
Software processes and organizes the data.
Users rely on the system to access information and perform tasks.
Q3: Describe the purpose, functions, and types of hardware.
A: Hardware includes physical devices like:
Input devices (e.g., keyboard, scanner) that allow data entry.
Output devices (e.g., monitor, printer) that display results.
Storage components for data preservation.
Processor to handle computations.
Peripheral devices that support various additional functions
Q4: Describe the purpose, functions, and types of software.
A: Software includes programs that direct the hardware. Types:
Application software for specific user tasks (e.g., word processing).
System software manages hardware and provides a platform for applications (e.g., operating systems, utilities).
Embedded systems are specialized programs for control systems (e.g., car navigation).
Q5: Why is data and information important in decision-making?
A: High-quality data and information are essential for effective decision-making across various levels:
Strategic: Long-term planning using structured and unstructured data.
Tactical: Medium-term decisions utilizing semi-structured data.
Operational: Day-to-day operations based on structured data.
Q6: What are the different types of Human-Computer Interaction (HCI)?
A: Types of HCI include:
Forms: Data entry and structured user input.
Menus: Simplifies navigation by listing options.
Command Line: Direct commands typed by the user.
Natural Language: Uses everyday language for interaction.
Graphical User Interface (GUI): Visual icons and buttons.
Speech: Verbal input and commands.
Direct Manipulation: Interaction through objects (e.g., drag-and-drop).
Q7: What are some criteria for evaluating different types of HCI?
A: Key criteria for HCI evaluation include:
Ease of Use: Intuitive design for effortless interaction.
Ease of Learning: Minimal time required to learn usage.
Ease of Navigation: Clear structure for finding options.
Alignment: Consistency in layout and function.
Use of Colour: Enhances visual appeal and usability.
Q8: What roles do different types of users play in an Information System?
A: Users in an IT system include:
IT Professionals: Manage, design, and maintain systems.
Expert Users: Have extensive knowledge of specific systems.
Novice Users: Require simple interfaces and guidance.
Q9: How do user characteristics influence the design of user interfaces?
A: User characteristics that impact UI design include:
Age: Older users may prefer larger fonts and simpler layouts.
Education Level: Interfaces might need simplified language for lower educational levels.
Disabilities: Adaptations like screen readers or high-contrast modes aid differently-abled users.
Cultural Differences: Colours and symbols are tailored to cultural meanings
Q10: What is the purpose and function of different network components, and what are some examples?
A: Network components facilitate communication and data transfer across systems. Key types include:
LAN (Local Area Network): Connects devices in a small, localized area (e.g., home, office).
WAN (Wide Area Network): Covers large geographical areas, connecting multiple LANs.
MAN (Metropolitan Area Network): Serves a city or campus, bridging between LAN and WAN.
VPN (Virtual Private Network): Provides secure remote access to a private network over the internet.
Internet, Intranet, and Extranet: Internet connects globally; Intranet is restricted to an organization; Extranet allows controlled external access.
Transmission Media: Wired (e.g., Ethernet) and wireless (e.g., Wi-Fi) mediums carry signals.
Communication Modes: Simplex (one-way), Duplex (two-way), and Half Duplex (alternating two-way).
Components like Senders, Receivers, and Modulation: Manage data transmission and reception.
Network Security Components: Firewalls and secure protocols ensure safe data exchange.
Bandwidth, Telecommuting, Teleconferencing, Videoconferencing: Bandwidth affects data speed; conferencing tools enable remote communication.
Q11: Describe networking standards, specifically the OSI Model and TCP/IP Model. Include information on layers, protocols, and their functions.
A:
Open Systems Interconnection (OSI) Model:
A 7-layer framework developed to standardize network functions and facilitate interoperability.
Layers:
Application Layer: Interfaces with end-user applications (e.g., HTTP, FTP).
Presentation Layer: Ensures data is in a readable format (e.g., encryption, data compression).
Session Layer: Manages sessions and controls dialogues (e.g., authentication).
Transport Layer: Provides reliable data transfer (e.g., TCP, UDP).
Network Layer: Determines routing and forwarding of data (e.g., IP).
Data Link Layer: Manages data frames between nodes (e.g., MAC addresses).
Physical Layer: Transmits raw data over a physical medium (e.g., cables, signals).
Function: Each layer is responsible for specific network processes, allowing interoperability across systems.
TCP/IP Model:
A 4-layer model designed specifically for the internet, more streamlined than OSI.
Layers:
Application Layer: Combines OSI's Application, Presentation, and Session layers (e.g., HTTP, FTP).
Transport Layer: Responsible for end-to-end communication (e.g., TCP, UDP).
Internet Layer: Manages data addressing and routing (e.g., IP).
Network Access Layer: Corresponds to OSI’s Data Link and Physical layers, handling data framing and transmission.
Function: Provides a more simplified model focused on practical internet communication, facilitating data exchange between different networks.
Q12: Design a simple network using standard shapes for devices such as routers, switches, and hubs. What components should be included?
A: A simple network design includes the following components:
Router: Connects different networks and manages traffic.
Switch: Connects multiple devices within a LAN.
Hub: Connects multiple Ethernet devices, functioning at a lower level than a switch.
Ethernet Cables: Physical cables for wired connections.
Service Set Identifier (SSID): Identifies a wireless network.
WAN: Connects multiple LANs over long distances.
LAN: Local area network, connects devices within a limited area.
Firewall: Monitors and controls incoming and outgoing network traffic.
Wired Security: Techniques like MAC filtering, ensuring only authorized devices connect.
Wireless Security: Protocols like WPA2 and WPA3, along with AES encryption and secure passwords to protect the network.
Diagram Note: Include standard shapes for each device to visually represent the network layout.
Q13: How do you configure a simple network? What factors need to be considered in the design?
A: To configure a simple network, consider:
Network Topology: Choose a layout such as bus, ring, or star, depending on requirements.
Devices: Set up routers, switches, and hubs as per the topology.
Cabling: Use Ethernet cables to connect devices.
SSID Configuration: Assign a unique SSID for wireless networks.
Security Settings: Implement MAC filtering and select WPA2 or WPA3 for wireless security.
Firewall Configuration: Ensure firewalls are correctly set up to filter traffic.
Password Management: Establish a strong password/network key for access.
Q14: What are the steps to troubleshoot wired and wireless network issues? What commands and checks should be used?
A: To troubleshoot network issues, follow these steps:
Check Physical Connections: Ensure all cables are securely connected.
Status Lights: Observe LED indicators on devices for connectivity status.
Use Commands:
Ipconfig: Displays IP configuration for troubleshooting connectivity issues.
Ping: Tests connectivity between devices on the network.
Nslookup: Resolves domain names to IP addresses.
Speed Test: Check the network speed to assess performance.
Firewall Configurations: Verify settings to ensure they are not blocking traffic.
Review IP Address, DNS, and Gateway Settings: Ensure configurations are correct.
Q15: Compare the various features associated with components of Information Systems.
A: Key features of Information Systems components include:
Speed: The rate at which data is processed and transmitted.
Efficiency: Optimal use of resources to maximize output.
Portability: The ability to move systems and devices easily.
Maintainability: Ease of updates and repairs.
Storage: Capacity to store data securely and accessibly.
Transmission: The effectiveness of data transfer across networks.
Q16: Compare various security mechanisms, focusing on physical and logical access control measures.
A:
Physical Access Control:
Involves securing physical locations (e.g., buildings, server rooms).
Devices: Swipe cards and biometric scanners limit access to authorized personnel.
Logical Access Control:
Regulates access to systems and data.
Mechanisms: Passwords, authentication methods, and encryption protocols.
Effective Password Characteristics: Length, complexity (mixed case, numbers), and uniqueness to enhance security.
Q17: Explain the meaning of terms related to the security of Information Systems.
A:
Data Security: Protecting data from unauthorized access or corruption.
Passwords: Secret words or phrases used to authenticate users.
Authentication: Verifying the identity of a user or system.
Encryption: Converting data into a coded format to prevent unauthorized access.
Data Corruption: Damage or alteration of data, making it unusable or unreliable.
Q18: Describe the structure of the internet as interconnected hypertext documents.
A: The internet is structured as a vast network of interconnected hypertext documents, primarily accessed through the World Wide Web (WWW). Key components include:
Browser: Software application (like Chrome, Firefox) used to access web pages.
Hyperlinks: Clickable links that connect different web pages or documents.
Home Page: The main page of a website, serving as an entry point.
Web Page vs. Website: A web page is a single document on the web, while a website is a collection of related web pages.
HTTP (Hypertext Transfer Protocol): The protocol used for transmitting hypertext documents over the internet.
URL (Universal Resource Locator): The address used to access a specific resource on the web.
HTML (Hypertext Markup Language): The standard language for creating web pages, defining their structure.
XML (Extensible Markup Language): A markup language used for encoding documents in a format that is both human-readable and machine-readable.
Domain Name Resolution: The process of converting domain names (like www.example.com) into IP addresses, allowing browsers to locate web servers.
Q19: How do you develop simple webpages using HTML?
A: To develop simple web pages using HTML, you need to understand the following key elements:
Document Structure: The basic framework of an HTML document, typically starting with <!DOCTYPE html>
followed by <html>
, <head>
, and <body>
tags.
Elements: Building blocks of HTML, like <h1>
for headings, <p>
for paragraphs, and <a>
for hyperlinks.
Attributes: Additional information about elements, such as src
for images or href
for links.
Headers: Use <h1>
to <h6>
for different levels of headings.
Text Formatting: Elements like <strong>
for bold and <em>
for italics.
Paragraphs: Defined with <p>
tags.
Comments: Non-displayed text added for developer notes using <!-- Comment here -->
.
Inline Styling: Applying CSS directly within an element’s style
attribute (e.g., <p style="">Text</p>
).
Lists: Create ordered (<ol>
) or unordered lists (<ul>
) with list items (<li>
).
Images: Embed images with the <img>
tag, specifying the src
attribute.
Tables: Create tables using <table>
, <tr>
(table row), and <td>
(table data).
Forms: Use <form>
to gather user input, incorporating elements like <input>
, <textarea>
, and <button>
.
Hyperlinks: Create links with the <a>
tag, using the href
attribute to specify the destination.