Sei sulla pagina 1di 4

2 (a)Computer disadvantages are as follows; Violation of Privacy, it is crucial that personal and confidential records stored in computers be protected

properly. Impact on Labor Force, although computers have improved productivity and created an entire industry with hundreds of thousands of new jobs, the skills of hundreds of thousands employees are replaced by computers. Health Risks, prolonged or improper computer use can lead to head injuries or disorders.Computer users can protect themselves from health risks through proper workplace design, good posture while at the computer, and appropriately spaced work breaks. Impact on the Environment, Computer manufacturing processes and computer waste are depleting natural resources and polluting the envoronment.

2 (c)Mainframe computers are very large computers with a very high capacity of storage. It is a high performance computer used for large scale computing purposes that require greater availability and security than a smaller scale machine. Mainframe computers are large and expensive computers used mainly by government institutions, examination department of examinations and large companies to process data of complex nature. It can response several hundred requests very quickly and uses several CPU for data processing. Minicomputer is midsized computers used in universities, research labs and smaller corporations. They are small and general purpose system. It is also a multi-user computer and supports more than dozens of people at a time. It is costlier than micro computer. They support a lesser number of terminals than mainframe computers, but their speed is faster than microcomputers. Such computers are used in scientific research, engineering analysis, and industrial process monitoring and control. 4 (a)In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network.To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. 4 (b) The term client-server refers to a popular model for computer networking that utilizes client and server devices each designed for specific purposes. The client-server model can be used on the Internet as well as local area networks. Examples of client-server systems on the Internet include Web browsers and Web servers, FTP clients and servers, and the DNS. 4 (e) A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages modulatedonto light waves. Fiber optic cables have a much greater bandwidth than metal cables. This means that they can carry more data. Fiber optic cables are less susceptible than metal cables to interference. 4 (f)Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each connection on twisted pair requires both wires. Since some telephone sets or desktop locations require multiple connections, twisted pair is sometimes installed in two or more pairs, all within a single cable.

5 (c)A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text. There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.

8 (b) i. ii. iii. iv. v. vi. vii. viii. Compatibility with other COTS products in use Adaptability, flexibility, reliability, maintainability Impact on system integrity Impact on system integration Vendor support Training Documentation Licenses

2. B) Difference / explain Software: - software is a collection of instructions that enable a user to interact with the computer or have the computer perform specific tasks for them. Without software, the computer would be useless. Hardware: - Hardware is best described as a device that is physically connected to your computer or something that can be physically touched. A perfect example of hardware is a computer monitor. Computer hardware is any physical device, something that you are able to touch and software is a collection of instructions and code installed into the computer and cannot be touched. For example, the computer monitor you are using to read this text on and the mouse you are using to navigate this web page is computer hardware. The Internet browser that allowed you to visit this page and the operating system that the browser is running on is software. 5. A) security: 1. computer security -- refers to techniques for ensuring that data stored in a computer cannot be read or
compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. 2.security is the prevention of, or protection against,access to information by unauthorized recipients, and intentional but unauthorized destruction or alteration of that information 5. B) security control Network security -- Protecting network and telecommunications equipment, protecting network servers and transmissions, combatting eavesdropping, controlling access from untrusted networks, firewalls, and detecting intrusions. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network. Software security provides barriers and other cyber-tools that protect programs, files, and the information flow to and from a computer. Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage.

8.a)

Disadvantages of Buying:
Vendor retains rights to the code Product functionality determined by vendor Reliance on vendors technical support to resolve issues an organization may understand its business needs better than anyone else who does the latest technologies to address change.

Advantages of Buying:
Ready-made solution Purchasing software from a proven and focusedin-your-industry outside vendor provides a base of expertise for solving business issues. Thousands of hours of research and development Rather than reinventing the wheel, an organization can take advantage of the lessons learned from other companies within your industry that faced similar challenges. Expert support and training Outside software vendors provide a place to turn for implementation,training, and technical support; they are also betterequipped to evaluate the marketplace and incorporate Flexibility/adaptability Typically, functionality continuously enhanced through customer input Fewer bugs

Potrebbero piacerti anche