Sei sulla pagina 1di 13

SPOT QUESTIONS (ICB10103)

1. The basic understanding of Information System. 2. Information system in organization. 3. Understand of main system components of computer system concept 4. Memory 5. Software, system software and application 6. Basic database function 7. E-commerce and type of e-commerce 8. Web services function application 9. Basic understanding of SDLC function and model (similar as Assignment2) 10. Computer security, attacks and virus.

1- The basic understanding of Information System. Information systems used in most professions Sales reps Managers Corporate lawyers Indispensable for achieving career goals A set of interrelated components that collect, manipulate, and disseminate data and information, and provide feedback to meet an objective Examples: ATMs, airline reservation systems, course reservation systems Information is one of an organizations most valuable resources Information is different from data

2.Information system in organization. Information: collection of facts organized in such a way that they have value beyond the facts themselves Value chain: series (chain) of activities that includes inbound logistics, warehouse and storage, production, finished product storage, outbound logistics, marketing and sales, and customer service Upstream management: management of raw materials, inbound logistics, and warehouse and storage facilities Downstream management: management of finished product storage, outbound logistics, marketing and sales, and customer service Organizational structure: organizational subunits and the way they relate to the overall organization Categories of organizational structure Traditional Project Team Virtual Traditional Organizational Structure A hierarchical structure Major department heads report to a president or top-level manager Managerial pyramid shows the hierarchy of decision making and authority

Project and Team Organizational Structures - Project organizational structure: centered on major products or services Many project teams are temporary Team organizational structure: centered on work teams or groups Team can be temporary or permanent, depending on tasks

3.Understand of main system components of computer system concept Central processing unit (CPU) -Digital circuits on chips -Electrical current flows through silicon -Moores Law: transistor density of chips will double every 18 months

Input devices - Personal computer input devices Keyboard Mouse

-Speech-recognition technology -Digital cameras -Terminals Example: - Scanning devices -Optical data readers -Magnetic ink character recognition (MICR) devices -Magnetic stripe card -Point-of-sale (POS) devices

Output devices -Display monitors -Liquid crystal displays (LCDs) -Organic light-emitting diodes (OLEDs) -Printers and plotters -Digital audio player

Communications devices
A communication device is a peripherical used for communication between the computers and other devices. Modem is a popular communication device which is normally used for internet communication. Infra red, Bluetooth and LAN card are the examples of communication devices. Examples of communicacion devices are: Modem:Modulator/demodulator ISDNCard DSL/ADSLCard Network Card (Ethernet card, LAN card):

Primary storage devices -Alternatively referred to as internal memory, main memory, and primary memory, primary storage is a storage location that holds memory for short periods of times while the computer running. For example, computer RAM and cache are both examples of a primary storage device. This storage is the fastest memory in your computer and is used to store data while it's being used. For example, when you open a program data is moved from the secondary storage into the primary storage. Secondary storage devices -Alternatively referred to as external memory and auxiliary storage, secondary storage is a storage medium that holds information until it is deleted or overwritten regardless if the computer has power. For example, a floppy disk drive and hard drive are both good examples of secondary storage devices. As can be seen by the below picture there are three different storage on a computer, although primary storage is accessed much faster than secondary storage because of the price and size limitations secondary storage is used with today's computers to store all your programs and your personal data.

4.Memory Random access memory (RAM) Temporary and volatile

Types of RAM EDO (Extended Data Out) DRAM (Dynamic RAM) SDRAM (Synchronous DRAM)

Types of nonvolatile memory ROM (read-only memory) PROM (programmable read-only memory) EPROM (erasable programmable read-only memory)

Cache memory: high-speed memory that a processor can access more rapidly than main memory

5.Software, system software and application software: Computer programs: sequences of instructions for the computer Documentation: describes program functions

applications Application software: helps users solve particular problems In most cases, application software resides on the computers hard disk Application software can also be stored on CDs, DVDs, and flash or keychain storage devices

Primary function is to apply the power of the computer to give individuals, workgroups, and the entire enterprise the ability to solve problems and perform specific tasks Application programs interact with systems software; systems software then directs computer hardware to perform the necessary tasks

system software Systems software: coordinates the activities and functions of hardware and programs Computer system platform: combination of a hardware configuration and systems software operating software Operating system (OS): set of programs that controls the computer hardware and acts as an interface with application programs Kernel: ties all components of the OS together and regulates other programs Combinations of OSs, computers, and users Single computer with a single user Single computer with multiple users Multiple computers Special-purpose computers Activities performed by the operating system Perform common computer hardware functions Provide a user interface and input/output management Provide a degree of hardware independence Manage system memory Activities performed by the operating system(continued) Manage processing tasks

Provide networking capability Control access to system resources Manage files Hardware independence Application program interface (API): allows applications to make use of the operating system Memory management Control how memory is accessed and maximize available memory and storage Processing tasks Multitasking: more than one program can run at the same time Time-sharing: allows more than one person to use a computer system at the same time Scalability: ability of the computer to handle an increasing number of concurrent users smoothly Networking capability Features and capabilities of the OS that aid users in connecting to a computer network Access to system resources and security Protection against unauthorized access Logins and passwords File management Ensures that files in secondary storage are available when needed and that they are protected from access by unauthorized users OS type : Palm OS Windows Embedded Windows Mobile

6.Basic database function There are many functions a Database Management System (DBMS) serves that are key components to the operation of database management. When deciding to implement a DBMS in your business, first you must decide what type of DBMS you want. Common types of DBMS are the relational, network, hierarchy and object oriented models. Each kind of database structure has its own pros and cons.

While each is unique in its own way, there are some standard functions of a DBMS, and these are:

a) The ability to update and retrieve data

This is a fundamental component of a DBMS and essential to database management. Without the ability to view or manipulate data, there would be no point to using a database system.

Updating data in a database includes adding new records, deleting existing records and changing information within a record. The user does not need to be aware of how DBMS structures this data, all the user needs to be aware of is the availability of updating and/or pulling up information, the DBMS handles the processes and the structure of the data on a disk.

b) Support Concurrent Updates

Concurrent updates occur when multiple users make updates to the database simultaneously. Supporting concurrent updates is also crucial to database management as this component ensures that updates are made correctly and the end result is accurate. Without DBMS intervention, important data could be lost and/or inaccurate data stored.

DBMS uses features to support concurrent updates such as batch processing, locking, twophase locking, and time stamping to help make certain that updates are done accurately.

Again, the user is not aware all this is happening as it is the database management system's responsibility to make sure all updates are stored properly. c) Recovery of Data In the event a catastrophe occurs, DBMS must provide ways to recover a database so that data is not permanently lost. There are times computers may crash, a fire or other natural disaster may occur, or a user may enter incorrect information invalidating or making records inconsistent. If the database is destroyed or damaged in any way, the DBMS must be able to recover the correct state of the database, and this process is called Recovery. The easiest way to do this is to make regular backups of information. This can be done at a set structured time so in the event a disaster occurs, the database can be restored to the state that it was last at prior to backup. A disadvantage to this is any data or changes entered

7. E-commerce and type of e-commerce - Electronic commerce (e-commerce, EC). The process of buying, selling, transferring, or exchanging products, services, and/or information via computer networks, including the Internet. TYPE B2E( business to employees) EC: A special case of intrabusiness e-commerce in which an organization delivers product or services to its employees. GovernmenttoCitizens(G2C): E-commerce in which a government provide services to its citizen via EC technologies. Government-tobusiness (G2B): E-commerce in which a government does business with other governments as well as with businesses. Mobile Commerce (m-commerce): E-commerce conducted in a wireless environment. Consumer-to-Consumer(C2C).:E-commerce in which an individual sells products or services to other individuals.

Customer -to-Business (C2B).:E-commerce in which customers make known a particular need for a product or service, and suppliers complete to provide the product or service to consumers . Intrabusiness( intraorganizational) commerce. E-commerce in which an organization uses EC internally to improve its operations. Business-to-Business (B2B): E-commerce in which both the sellers and the buyers are business organizations. Collaborative commerce ( c-commerce): E commerce in which business partners collaborate electronically Business-to-Consumers (B2C): E-commerce in which the seller are organizations and the buyers are individual also known as e-tailing.

8. Web services function application An application that uses the transport functions of the Internet; has universally accepted standards for storing, retrieving formatting, and displaying information via a client/server architecture intranet - A private network, usually within one enterprise that uses web technologies such as browsers and internet protocols separated from the Internet by a security gateway such as a firewall

extranet- A secured network that connects several intranet via the Internet; allows two or more enterprise to communicate and collaborate in a controlled fashion .

corporate portal- Web site that provide the gateway to corporate information from a single point of access.

9- Basic understanding of SDLC function and model Systems development life cycle (SDLC) is a structured framework used for large IT projects, that consists of sequential processes by which information systems are developed.

waterfall - Waterfall approach. SDLC approach in which tasks in one stage were completed before the work proceeded to next stage Requirements defines needed information, function, behavior, performance and interfaces. Design data structures, software architecture, interface representations, algorithmic details. Implementation source code, database, user documentation, testing.

Water Fall Model: The Water Fall Model has the planning, analysis, implementation and testing phase. This model is different from traditional model in such a way that testing phase comes after the implementation phase. In such model after the complete software is produced and implemented onto the application the testing is carried out. Advantages:

All the phases are completed at one time It has a rigid structure which is easy to use and each phase has review process. Good for small project
Disadvantages:

Future adjustments in the project are not possible. No prototypes are produced Not suitable for projects with moderate requirements, long projects, and for the projects which may undergo future changes.

SPIRAL MODEL: The spiral model has four phases planning, risk analysis, engineering and evaluation. It emphasis more on risk analysis. In this model the project undergoes each phases repeatedly called spirals. The planning phase is the baseline spiral and each subsequent spiral is build on spiral model These type of model is used in risk analyzing projects for eg in space crafts. Advantages:

Importance is placed more on risk analysis

Software is produced in the early stage. Not suitable for small projects It is very costly Needs expertise for such model

Disadvantages:

V MODEL: It explains the relationship between each phase and the associated testing phase. In this type each phase undergoes testing i.e for each phase a test deign is created and testing is carried on the corresponding designs and undergoes coding phase if defect is determined. Since it does not follow a linear path and bends after coding phase this model is termed asVmodel. Advantages:

Since each phase has its own test design it can produce good results. Simple and easy to use It can be used for small projects and the requirements are clearly understood. No prototypes are produced. Do not have the clear path the problems found after each testing phase. Adjustment in future is less or not possible.

Disadvantages:

1. Computer security, attacks and virus. virus

Malicious Back doors War dialling Password cracker Spoofing Faking Sniffer Denial of services Logic bomb Trap door Super zapping

Salami slicing Trojan horse Worm Virus

security Controls Securing your PC Concluding thoughts about computer Auditing information systems Disaster recovery planning

Potrebbero piacerti anche