Discovering Computer 2011 Chapter 15 (LAST)

Assignment assigned by Mr.Tri Djoko Wahjono

True/False

1. True                                                        6. True
2. False                                                       7. True
3. True                                                        8. True
4. True                                                        9. False
5. False                                                     10. False

 

Multiple Choice

1. A                                                              5. D
2. C                                                              6. B
3. C                                                              7. D
4. A                                                              8. B

Matching

1. E                                                             6. B
2. D                                                            7. F
3. J                                                             8. I
4. G                                                            9. A
5. H                                                         10. C

Short Answer

1.the advantages of attending trade schools is that the program is much shorter time then collage and university program.
the factor that should be consider when selecting trade school is whether that trade school has articulation agreement with nearby collage or university to do the coursework transfer.

2. the benefits of professional growth and continuing education is to keep update with the new products and services in computer industry.
they way to keep update with the growth is with joining seminars, workshop, conference, conventions, and trade show.

3. certification should be chose by which skill do you master it. each IT have different area and skills.
four option for preparing for certificate :

  1. self-study, require high motivation and discipline
  2. Online training course, allow students to set their pace in interactive environment .
  3. instructor-led training, it has variety form starting from boot camps, academic style classes, and sponsored training.
  4. web resource, study from certification’s web site which include FAQs and links for training.

4. the main focus for programmer/developer certificate is certificate in networking and we design.
people who interested in programmer/developer certificate:

• Java programmers
• Mobile application developers
• Oracle database managers
• Programming consultants
• SQL programmers
• Web software developers
• XML developers

5. Hardware certification is focus on repair of a specific device to an integrated hardware solution that addresses a company’s current and future computing needs.
people who might interested in hardware certification :

• Cable installation technicians
• Computer repair technicians
• Corporate trainers
• Help desk specialists
• IT consultants
• System engineers and administrators

Discovering Computer 2011 chapter 14

Assignment assigned by Mr.Tri Djoko Wahjono

Multiple Choice

1. C                                                      5. A
2. B                                                     6. D
3. A                                                    7. A
4. B                                                     8. D

Matching

1. H                                                     6. G
2. F                                                     7. A
3. B                                                     8. J
4. E                                                     9. I
5. D                                                  10. C

Short Answer

1. Responsibilities of mangers are that they coordinate and control an organization’s resources.
four activities that manager do to coordinate resource:

  • planning
  • organizing
  • leading
  • controlling

2. Content management system is an information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.
Content management system process content such as documents, files,images and multimedia.

3. 2 type of virtualization :

  • server virtualization, provides the capability to divide a physical server logically into many virtual servers.
  • storage virtualization, provides the capability to create a single logical storage device from many physical storage devices.

Cloud computing is an Internet service that provides computing needs to computer users and Grind computing combines many servers and/or personal computers on a network, such as the Internet, to act as one large computer. Reason companies using cloud and grind computing because provide flexible and massive online computing power.

4. 5 types of e-commerce :

  1. E-Retail
  2. Finance
  3. Travel
  4. Entertainment
  5. Media

E-retail, occurred when retailers use web to sell their product and service.
Finance, Online banking and online trading.
Travel, web provide many travel services.

5. the backup plans contain :

  1. location of backup data, supplies and equipment
  2. the personnel responsible for gathering backup resource and transporting them to the alternate computer facility
  3. a schedule indicates the order in which, and approximate time by which, each application should be up and running.

the factor that make backup plans successful that the organization must back up all critical resource.

Discovering Computer 2011 Chapter 13

Assignment assigned by Mr. Tri Djoko Wahjono

A. True/False Mark T for True and F for False.
1.    Just as humans speak a variety of languages, programmers use a variety of programming languages and tools to create programs. (664)(True)
2.    With a procedural language, often called a third-generation language (3GL), a programmer uses a series of English-like words to write instructions. (666)(True)
3.    Programmers use Java Platform, Micro Edition (Java ME) to create programs for smart phones and other mobile devices. (670)(True)
4.    The Microsoft .NET Framework is a set of technologies that allows almost any type of program to run on the Internet or an internal business network, as well as stand-alone computers and mobile devices. (670)(True)
5.    HTML (Hypertext Markup Language) is a special formatting language that programmers use to format documents for display on the Web. (678)(True)
6.    ATOM allows Web developers to design pages specifically for microbrowsers. (679)(False)
7.    An applet usually runs slower than a script. (680)(False)
8.    Ruby on Rails is an open source framework that provides technologies for developing object-oriented, database-driven Web sites. (683)(True)
9.    Expression Web is used strictly on Linux Web servers. (685)(False)
10.    A selection control structure shows one or more actions following each other in order. (689)(False)

B. Multiple Choice Select the best answer.

1.    B. Interpreter
2.    C. Event driven
3.    C. Java
4.    A. SQL
5.    A. VBScript
6.    C. SharePoint Designer
7.    D. Dreamweaver
8.    B. encapsulation

C. Matching Match the terms with their definitions.

1.    G. object-oriented language that use just-in-time compiler
2.    D. object-oriented extension of the C programming language
3.    J. combines the benefits of an object-oriented language and a functional language
4.    I. nonprocedural language that enables users and programmers to access data in a database
5.    C. series of statements that instructs an application how to complete a task
6.    E. free, open source scripting language
7.    A. collection of tools that programmers use to interact with an environment such as a Web site or operating system
8.    H. process of testing a condition at the beginning of a loop
9.    B. process of testing a condition at the end of a loop
10.    f. process of programmers, quality control testers, and/or peers reviewing code in order to locate and fix errors so that the final programs work correctly
D. Short Answer Write a brief answer to each of the following questions.
1.    A compiler translates an entire program before executing it. An interpreter, by contrast, translates and executes one statement at a time. One advantage of an interpreter is that when it finds errors, it displays feedback immediately. The programmer can correct any errors before the interpreter translates the next line of code. The disadvantage is that interpreted programs do not run as fast as compiled programs.
2.    A major benefit of OOP is the ability to reuse and modify existing objects. For example, once a programmer creates an Employee object, it is available for use by any other existing or future program. Thus, programmers repeatedly reuse existing objects.
RAD (rapid application development) is a method of developing software, in which a programmer writes and implements a program and segments instead of waiting until the entire program is completed

3.    An IDE (integrated development environment) includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger (to remove errors)
Visual Studio suite contains:
a.    Visual Basic is a programming language that allows programmers easily to build complex task-oriented object-based programs.
b.    Visual C++ is a programming language based on C++

c.    Visual C# is a programming language that combines programming elements of C++ with an easier, rapid development environment

4.  XML (Extensible Markup Language) is an increasingly popular format for sharing data that allows Web developers to create customized tags, as well as use predefined tags, used for developing a single Web site whose content can be formatted to display appropriately on various devices. XML separates the Web page content from its format, allowing the Web browser to display the contents of a Web page in a form appropriate for the display device.

Two applications of XML are RSS 2.0, which stands for Really Simple Syndication, and ATOM, which are specifications that content aggregators use to distribute content to subscribers.

5. In documenting the solution, the programmer performs two activities:
(1) review the program code and,
(2) review all the documentation

First, programmers review the program for any dead code and remove it. Dead code is any program instructions that a program never executes. Next, programmers should run the program one final time to verify it still works. After reviewing the program code, the programmer gives the program and all of its documentation to the systems analyst. The documentation includes all charts, solution algorithms, test data, and program code listings that contain global and internal comments.

The programmer should be sure all documentation is complete and accurate. This becomes especially valuable if the program requires changes in the future. Proper documentation greatly reduces the amount of time a new programmer spends learning about existing prograams.

Discovering Computer 2011 chapter 12

A. True/False Mark T for True and F for False.

1.    An information system supports daily, short-term, and long-range activities of systems analysts. (620)(True)
2.    A systems analyst is responsible for designing and developing an information system. (622)(True)
3.    Operational feasibility measures whether an organization has the hardware, software, and people needed to support a proposed information system. (624)(False)
4.    Documentation should be updated only after a project is complete. (625)(False)
5.    In detailed analysis, the systems analysts develop the proposed solution with a specific hardware or software in mind. (631)(False)
6.    Structured English is a style of writing that describes the steps in a process. (633)(True)
7.    Object modeling combines the data with the processes that act on that data into a single unit, called a method. (634)(False)
8.    The only major activity of the design phase is the development of all of the details of the new or modified information system. (638)(False)
9.    Some VARs provide complete systems, known as a turnkey solution. (639)(True)
10.    During program design, the systems analyst prepares the program specification package, which identifies the required programs and the relationship among each program, as well as the input, output, and database specifications. (641)(True)
11.    With a pilot conversion, multiple locations in the organization use the new system. (644)(False)
B. Multiple Choice Select the best answer.

1.    A. Extreme project management
2.    B. PERT chart
3.    C. Project Request
4.    A. Mandated by management or some other governing body
5.    C. Decision table
6.    D. System proposal
7.    A. Computer-aided software engineering (CASE)
8.    D. Acceptance

C. Matching Match the terms with their definitions.
1.    H. responsible for designing and developing an information system
2.    E. controls the activities during system development
3.    A. becomes the first item in the project notebook and triggers the planning phase
4.    B. analysis and design technique that describes processes that transform inputs into outputs
5.    I. contains all the documentation and deliverables of a project
6.    G. stores a name, description, and other details about each data item
7.    F. an item that can contain both data and the procedures that read or manipulate that data
8.    J. mass-produced, copyrighted, prewritten software available for purchase
9.    C. working model of the proposed system
10.    K. determines whether the system is inefficient or unstable at any point

D. Short Answer Write a brief answer to each of the following questions.

1.    System development is a set of activities used to build an information system. Five phases in system development are:
a.    Planning
• Review project requests
• Prioritize project requests
• Allocate resources
• Form project development team
b.    Analysis
• Conduct preliminary investigation
• Perform detailed analysis activities:
-Study current system
-Determine user requirements
-Recommend solution
c.    Design
• Acquire hardware and software, if necessary
• Develop details of system
d.    Implementation
• Develop programs, if necessary
• Install and test new system
• Train users
• Convert to new system
e.    Operation, Support and Security
• Perform maintenance activities
• Monitor system performance
• Assess system security

2.    • Operational feasibility measures how well the proposed information system will work. Will the users like the new system? Will they use it? Will it meet their requirements? Will it cause any changes in their work environment? Is it secure?
• Schedule feasibility measures whether the established deadlines for the project are reasonable. If a deadline is not reasonable, the project leader might make a new schedule. If a deadline cannot be extended, then the scope of the project might be reduced to meet mandatory deadline.
• Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system. For most information system projects, hardware, software, and people typically are available to support an information system. The challenge is obtaining funds to pay for these resources. Economic feasibility addresses funding.
• Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs. A systems analyst often consults the advice of a business analyst, who uses many financial techniques, such as return on investment (ROI) and payback analysis, to perform the cost/benefit analysis

6 techniques used for gathering data are:
• Review Documentation
• Observe
• Survey
• Interview
• JAD session
• Research

3.    UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development. The UML is a graphical tool that enables analysts to document a system. It consists of many inter related diagrams. Each diagram conveys a view of the system. The latest UML version includes 13 different diagrams to assist the analyst in modeling the system. Two of the more common tools are the use case diagram and class diagram.
A use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program. The function that the actor can perform is called the use case. Thus, a use case diagram shows actors and their use cases

A class diagram graphically shows classes and subclasses in a system .On a class diagram, objects are grouped into classes. Each class can have one or more lower levels called subclasses. Each subclass inherits the methods and attributes of the objects in its higher-level class. Every object in a class shares methods and attributes that are part of its higher-level class. This concept of lower levels inheriting methods and attributes of higher levels is called inheritance

4.    The operation, support, and security phase consists of three major activities:
(1) perform maintenance activities,
(2) monitor system performance, and
(3) assess system security

Information system maintenance activities include fixing errors in, as well as improving, a system’s operations.
performance monitoring is to determine whether the system is inefficient or unstable at any point.

5.    A computer security plan summarizes in writing all of the safeguards that are in place to protect an organization’s information assets. Computer Security Plan should do these 3 task, which are:

a. Identify all information assets of an organization, including hardware, software, documentation, procedures, people, data, facilities, and supplies.

b. Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur. Place an estimated value on each risk, including lost business. For example, what is the estimated loss if customers cannot access computers for one hour, one day, or one week?

C .For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.

Discovering Computer 2011 chapter 11

Assignment assigned by Mr.Tri Djoko Wahjono

A. True/False Mark T for True and F for False.

  1. Not all breaches to computer security are planned. (556)(True)
  2. The term, cyberwarfare, describes an attack whose goal ranges from disabling a government’s computer network to crippling a country. (557)(True)
  3. Many methods exist to guarantee completely a computer or network is safe from computer viruses and other malware. (560)(True)
  4. Cybercriminals install malicious bots on unprotected computers to create a zombie army.(562)(True)
  5. A honeypot is a computer that is isolated and, therefore, immune to attack. (564)(False)
  6. Biometric payment involves a customer’s fingerprint being read by a fingerprint reader that is linked to a payment method such as a checking account or credit card. (568)(True)
  7. Some businesses use a real time location system (RTLS) to track and identify the location of high-risk or high-value items. (570)(True)
  8. A program called a keygen, short for key generator, creates software registration numbers and sometimes activation codes. (571)(True)
  9. With public key encryption, both the originator and the recipient use the same secret key to encrypt and decrypt the data. (573)(False)
  10. A digital signature is a mathematical formula that generates a code from the contents of the message. (574)(False)
  11. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content. (582)(True)
  12. Green computing involves reducing the electricity while using a computer, but the practice increases environmental waste. (583)(False)

B. Multiple Choice Select the best answer.

  1. B. Rootkit
  2. C. Back doors
  3. A. Denial of service attack
  4. C. Digital forensics
  5. C. Hardware theft
  6. D. Encryption key
  7. D. Power usage effectiveness (PUE)
  8. C. Social engineering

     C. Matching Match the terms with their definitions.

  1. J. potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
  2. D. organization or person you believe will not send a virus infected file knowingly
  3. E. area of the hard disk that holds an infected file until the infection can be removed
  4. G. group of compromised computers connected to a network such as the Internet that is being used as part of a network that attacks other networks, usually for nefarious purposes
  5. I. technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
  6. C. protects a personal computer and its data from unauthorized intrusions
  7. B. private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  8. A. set of steps that can convert readable plaintext into unreadable ciphertext
  9. H. translates a personal characteristic into digital code
  10. F. uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment

D. Short Answer Write a brief answer to each of the following questions.

 

  1. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against other malware. A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware. Often, these hoaxes are in the form of a chain letter that requests the user to send a copy of the e-mail message to as many people as possible
  2. Energy Star Is the guideline of green computing that is being developed by The United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA), this program is meant to reduce electricity usage of computer related devices Users should not store obsolete computers and devices in their basement, storage room, attic, warehouse, or any other location. Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. In a landfill, these materials release into the environment. Recycling and refurbishing old equipment are much safer alternatives for the environment.
  3. Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. 5 ways of protecting information privacy are:

a. Fill in only necessary information on rebate, warranty and registration forms.

b. Do not preprint your telephone number or Social Security number on personal checks.

c.. Have an unlisted or unpublished telephone number.

d. If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.

e. Do not write your telephone number on charge or

 4. A. If you receive an e-mail message that looks legitimate and requests you update credit card numbers, Social Security numbers, bank account numbers, passwords, or other private information, the FTC recommends you visit the Web site directly to determine if the request is valid. Never click a link in an e-mail message; instead, retype the Web address in your browser.

B. A phishing filter is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

Clickjacking is yet another similar scam. With clickjacking, an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur. For example, the user may be redirected to a phony Web site that requests personal information or a virus may download to the computer.

 5. Content filtering is the process of restricting access to certain material on the Web. Content filtering opponents argue that banning any materials violates constitutional guarantees of free speech and personal rights. Many businesses use content filtering to limit employees’ Web access. One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA), which is similar to those used for movies and videos.

Chapter 10 DIscovering Computer 2011 Edition

Assignment assigned by Mr. Tri Djoko Wahjono

A. True/False Mark T for True and F for False.

1. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. (514)(True)

2. A database management system allows users to create forms and reports from the data in the database. (515)(True)

3. A range check ensures users enter only numeric data in a field. (523)(False)

4. A check digit often confirms the accuracy of a primary key value. (523)(True)

5. Databases require less memory, storage, and processing power than a file processing system. (526)(False)

6. A report is a window on the screen that provides areas for entering or modifying data in a database. (530)(False)

7. Continuous backup is a backup plan in which all data is backed up whenever a change is made. (532)(True)

8. A relationship is a link within the data in a database. (533)(True)

9. Normalization is a process designed to ensure the data within the relations (tables) is duplicated so that it is not lost. (534)(False)

10. The data in a distributed database exists in many separate locations throughout a network or the Internet. (536)(True)

B. Multiple Choice Select the best answer.

 

1. B. Timely

2. A. composite key

3. D. File maintenance

4. B. determines whether a number is within a specified range

 

5. A. less complexity

 

6. B. data dictionary

 

7. B. principle of least privilege

 

8. A. decides on the proper placement of field.

 

C. Matching Match the terms with their definitions.

1. E. uniquely identifies each field

2. G. defines the maximum number of characters a field can contain

3. C. specifies the kind of data a field can contain and how the field is used

4. B. field that uniquely identifies each record in a file

5. J. consists of simple, English-like statements that allow users to specify the data to display, print, or store

 

6. A. listing of activities that modify the contents of a database

 

7. I. uses the logs and/or backups to restore a database when it becomes damaged or destroyed

 

8. D. database that stores maps and other geographic data

 

9. H. person who focuses on the meaning and usage of data

 

10. f. creates and maintains the data dictionary, manages security of the database, monitors the performance of the database, and checks backup and recovery procedures

 

D. Short Answer Write a brief answer to each of the following questions.

1. Validation is the process of comparing data with a set of rules or values to find out if the data is correct.

There are 5 types of validation which are:

a. Alphabetic/Numeric Check

b. Range Check

c. Consistency check

d. Completeness check

e. Check digit.

 

2. Duplicating (redundancy) data in this manner wastes resources such as storage space and people’s time. When data is modified or added, file maintenance tasks consume additional time because people must update multiple files that contain the same data. Isolated Data, it is difficult to access data stored in separate files in different departments.

 

3 .Database approach means many programs and users share the data in the database, there are 5 reasons why we should use database approach:

strengths of the database approach.

• Reduced Data Redundancy — Most data items are stored in only one file, which greatly reduces duplicate data. For example, a school’s database would record a student’s name and address only once. When student data is entered or changed, one employee makes the change once.

• Improved Data Integrity — When users modify data in the database, they make changes to one file instead of multiple files. Thus, the database approach increases the data’s integrity by reducing the possibility of introducing inconsistencies.

•Shared Data — The data in a database environment belongs to and is shared, usually over a network, by the entire organization. This data is independent of, or separate from, the programs that access the data. Organizations that use databases typically have security settings to define who can access, add, modify, and delete the data in a database.

• Easier Access — The database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges. Many computer users also can develop smaller databases themselves, without professional assistance.

• Reduced Development Time — It often is easier and faster to develop programs that use the database approach. Many DBMSs include several tools to assist in developing programs, which further reduces the development time.

 

4. How to use the simple query wizard is depending on the program itself, because every program usually has different simple query wizard. Query by Example Most DBMSs include query by example (QBE), a feature that has a graphical user interface to assist users with retrieving data.

 

5. Object-oriented databases have several advantages compared with relational databases: they can store more types of data, access this data faster, and allow programmers to reuse objects. An object oriented database stores unstructured data more efficiently than a relational database. Unstructured data can include photos, video clips, audio clips, and documents. When users query an object oriented database, the results often are displayed more quickly than the same query of a relational database. If an object already exists, programmers can reuse it instead of recreating a new object — saving on program development time.

4 example of object-oriented databases are:

• A multimedia database

• A groupware database

• A computer-aided design (CAD) database

• A hypertext database

Chapter 9 DIscovering Computer 2011 Edition

Assignment assigned by Mr. Tri Djoko Wahjono

A.  True/False Mark T for True and F for False.

 

 

1. A communications channel is the media on which data, instructions, or information travel. (460)(False)

 

2. With video messaging, users can send short video clips, usually about 15 minutes, in addition to all picture messaging services. (464)(False)

 

3. A network is a collection of computers and devices connected together via communications devices and transmission media. (470)(True)

 

4. A local area network (LAN) is a network that covers a large geographic area using a communications channel that combines many types of media such as telephone lines, cables, and radio waves. (472)(False)

 

5. A Web server is a computer that delivers requested Web pages to your computer. (474)(True)

 

6. An intranet is an internal network that uses Internet technologies. (477)(True)

 

7. The 40-Gigabit Ethernet standard is the fastest of the Ethernet standards. (478)(False)

 

8. Bluetooth does not require line-of-sight transmission. (480)(True)

 

9. At distances of 10 meters (about 33 feet), the data transfer rate for UWB devices is 480 Mbps.(480)(False)

 

10. Fiber to the Premises (FTTP) uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical permanent location. (484)(True)

 

11. Latency is the time it takes a signal to travel from one location to another on a network. (491)(True)

B. Multiple Choice Select the best answer.

 

1. C. Visual voice mail

2. C. A Web conference

3. C. Provides for storage and management of a company’s documents

 

4. D. Mashup

 

5. B. Hubs and switches

6. A. RFID

 

7. D. Coaxial cable

 

8. B. Mobile TV

 

 

C. Matching Match the terms with their definitions.

1. E. allows users to send pictures and sound files, as well as short text messages, to a phone or other mobile device, or a computer

2. J. software that helps groups of people share information over a network

3. H. allows customers or suppliers to access part of a company’s intranet

4. D. specification to transmit data wirelessly among computers and devices via infrared light waves

 

5. F. service that carries voice, data, video, and multimedia at very high speeds

6. A. communications device that can convert digital signals to analog signals and analog signals to digital signals, so that data can travel along an analog telephone line.

 

7. G. communications device that sends and receives data and information to and from a digital line

 

8. B. amount of data, instructions, and information that can travel over a communications channel

 

9. C. materials or substances capable of carrying one or more signals

 

10. I. electrical disturbance that can degrade communications

 

D. Short Answer Write a brief answer to each of the following questions.

 

1. Text Messaging, also called SMS (short message service), capability allows users to send and receive short text messages, typically fewer than 300 characters, on a phone or other mobile device or computer.

Text messaging services typically provide users with several options for sending and receiving messages:

• Mobile to Mobile: send a message from your mobile device to another mobile device

• Mobile to E-Mail: send a message from you mobile device to an e-mail address anywhere in the world

• Web to Mobile: send a message from a text messaging Web site to a mobile device, or request that Web site alert a mobile device with messages of breaking news and other updates, such as sports scores, stock prices, and weather forecasts

• Mobile to Provider: send a message by entering a common short code (CSC), which is a four- or five-digit number assigned to a specific content or wireless service provider, followed by the message, such as a vote for a television program contestant or an entry for a sweepstakes.

 

2. A global positioning system (GPS) is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver’s geographic location .So, GPS works by receiving signals sent by the satellites and analyze the sent signals. Nowadays, many vehicles use GPSs to provide drivers with directions or other information, such as alternate traffic routes, automatically call for help if the airbag is deployed, dispatch roadside assistance, unlock the driver’s side door if keys are locked in the car, and track the vehicle if it

is stolen. Newer GPS receivers also give drivers information about nearby points of interest, such as gas stations, restaurants, and hotels. Hikers and remote campers may carry GPS receivers in case they need emergency help or directions.

 

3. – LAN A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school computer laboratory, office building or closely positioned group of buildings.

– MAN A metropolitan area network (MAN) is a high-speed network that connects local area networks in a metropolitan area such as a city or town and handles the bulk of communications activity across that region

-WAN A wide area network (WAN) is a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves

These explanations lead us to an explanation to the reason of why they all are different. They are different because of the coverage area.

-A wireless LAN (WLAN) is a LAN that uses no physical wires. Computers and devices that access a wireless LAN must have built-in wireless capability or the appropriate wireless network card, USB network adapter, ExpressCard module, PC Card, or flash card. Very often, a WLAN communicates with a wired LAN for access to its resources, such as software, hardware, and the Internet.

 

4. A network topology refers to the layout of the computers and devices in a communications network. Three commonly used network topologies are star, bus, and ring. Most networks, including the Internet, use combinations of these topologies.

Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM

 

5. Three types of digital modems are ISDN modems, DSL modems, and cable modems. These modems typically include built-in Wi-Fi connectivity.

An ISDN modem sends digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line.

A DSL modem sends digital data and information from a computer to a DSL line and receives digital data and information from a DSL line. ISDN and DSL modems usually are external devices, in which one end connects to the telephone line and the other end connects to a port on the system unit.

A cable modem, sometimes called a broadband modem, is a digital modem that sendsand receives digital data over the cable television (CATV) network

Tugas GSLC 2

Assignment assigned by Mr. Tri Djoko Wahjono

Seagate Technology, an American company is one of the world’s largest manufacturers of hard disk drives Incorporated in 1978 as Shugart Technology, Seagate is currently incorporated in Dublin, Ireland and has its principal executive office in Cupertino, California.

Seagate has been a leader in the development of the hard disk drives since releasing the 5 MB ST-506 drive in 1980, the first 5.25-inch hard drive. They were a major supplier in the microcomputer market during the 1980s, especially after the introduction of the IBM XT in 1983. In 1989 they finalized the purchase of Control Data Corporation‘s Imprimis division, makers of the well regarded Wren product line. This gave Seagate access to the Wren’s voicecoil-based technology. In 1991 they introduced the 7,200 RPM Barracuda line, which remains their high-end offering to this day. They purchased Maxtor in 2006.

Seagate offers the industry’s broadest portfolio of hard disk drives, solid-state drives and solid-state hybrid drives. In addition, the company offers an extensive line of retail storage products for consumers and small businesses, along with data-recovery services for any brand of hard drive and digital media type.

Seagate employs more than 50,000 people around the world.

 

SanDisk Corporation is an American multinational corporation that designs, develops and manufactures data storage solutions in a range of form factors using the flash memory, controller and firmware technologies. It was founded in 1988 by Dr. Eli Harari and Sanjay Mehrotra, non-volatile memory technology experts. SanDisk became a publicly traded company on NASDAQ in November 1995. As of September 2011, its market capitalization is US$9.95 billion. SanDisk produces many different types of flash memory, including various memory cards and a series of USB removable drives. SanDisk markets to both the high-end and low-end sector demand for flash memory, and markets to other equipment makers as well as direct to consumers.

The company is headquartered in Milpitas, California, with offices or manufacturing facilities in 10 locations in Asia (including Taiwan, China and Japan), 6 locations in Europe (including the UK, Ireland and Spain), and 3 locations in Israel (Kfar Sava, Tefen and Omer)

SanDisk creates transformational memory products at world-class manufacturing facilities that produce more than two million products each day. We serve three high-growth mega markets–mobile, computing, and consumer electronics–each of which increasingly requires flash memory to deliver compelling benefits to consumers and businesses.

Samsung Storage devices are storage devices under trademark of Samsung. A South Korean multinational conglomerate company headquartered in Samsung Town, Seoul. It comprises numerous subsidiaries and affiliated businesses, most of them united under the Samsung brand, and is the largest South Korean chaebol.

Samsung storage devices are promoting Energy-saving High-performance Storage Solutions which Samsung’s storage devices span the spectrum of solutions for saving your data, images, audio, and video files. They have a broad line of energy saving Hard Disk Drives, fast and efficient Optical Disc Drives, and leading-edge Solid State Drives ready for consumers application. Their drives support OEMs and consumers in desktop/notebook PCs, consumer electronics, enterprise storage and more.

 

Hitachi, Ltd. (株式会社日立製作所 Kabushiki-gaisha Hitachi Seisakusho?) (Japanese pronunciation: [çitatɕi]) is a Japanese multinational engineering and electronics conglomerate company headquartered in Chiyoda, Tokyo, Japan. It is the parent of the Hitachi Group (Hitachi Gurūpu) and forms part of the DKB Group of companies. Hitachi is a diversified company and has 11 business segments: Information and Telecommunication Systems, Electrical Systems, Social and Industrial Systems, Automotive Systems, Electronic Component Devices, Construction, and Financial services.

Hitachi is listed on the Tokyo Stock Exchange and is a constituent of the Nikkei 225 and TOPIX indices. Hitachi was ranked 38 on the 2012 Fortune Global 500 list and was ranked 129 on the 2012 Forbes Global 2000 list.

Hitachi was founded in 1910 by electrical engineer Namihei Odaira. The company’s first product was Japan’s first 5-horsepower electric induction motor, initially developed for use in copper mining. Odaira’s company soon became the domestic leader in electric motors and electric power industry infrastructure.

The company began as an in-house venture of Fusanosuke Kuhara‘s mining company in Hitachi, Ibaraki prefecture. Odaira moved headquarters to Tokyo in 1918. Long before that, he coined the company’s toponymic name by superimposing two kanji characters: hi meaning “sun” and tachi meaning “rise”. The young company’s national aspirations were conveyed by its original brand mark, which evoked Japan’s imperial rising sun flag.

Hitachi entered talks with Mitsubishi Heavy Industry in August 2011 about a potential merger of the two companies, in what would have been the largest merger between two Japanese companies in history.[3][4] The talks subsequently broke down and were suspended.[5]

In October 2012 Hitachi agreed to acquire the United Kingdom-based nuclear energy company Horizon Nuclear Power, which plans to construct up to six nuclear power plants in the UK, from E.ON and RWE for £700 million.

 

Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.[41] The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with computer hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems.

Software applications for word processing, Internet browsing, Internet faxing, e-mail and other digital messaging, multimedia playback, computer game play and computer programming are common. The user of a modern personal computer may have significant knowledge of the operating environment and application programs, but is not necessarily interested in programming nor even able to write programs for the computer. Therefore, most software written primarily for personal computers tends to be designed with simplicity of use, or “user-friendliness” in mind. However, the software industry continuously provide a wide range of new products for use in personal computers, targeted at both the expert and the non-expert user.

PC(Personal Computer)

Microsoft Windows

Microsoft Windows is the collective brand name of several software operating systems by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs)[42][43] generated by Apple’s 1984 introduction of the Macintosh. The most recent client and server version of Windows are Windows 8 and Windows Server 2012, respectively, which was available at retail on October 26, 2012.

OS X

Main article: OS X

OS X (formerly Mac OS X) is a line of operating systems developed, marketed, and sold by Apple Inc.. OS X is the successor to the original Mac OS, which had been Apple’s primary operating system since 1984. OS X is a Unix-based graphical operating system. The most recent version of OS X is OS X Mountain Lion.

AmigaOS

AmigaOS is the default native operating system of the Amiga personal computer. It was developed first by Commodore International, and initially introduced in 1985 with the Amiga 1000. Early versions (1.0-3.9) run on the Motorola 68k series of 16-bit and 32-bit microprocessors, while the newer AmigaOS 4 runs only on PowerPC microprocessors. On top of a preemptive multitasking kernel called Exec, it includes an abstraction of the Amiga’s unique hardware, a disk operating system called AmigaDOS, a windowing system API called Intuition and a graphical user interface called Workbench. A command line interface called AmigaShell is also available and integrated into the system. The GUI and the CLI complement each other and share the same privileges. The current holder of the Amiga intellectual properties is Amiga Inc. They oversaw the development of AmigaOS 4 but did not develop it themselves, contracting it instead to Hyperion Entertainment. On 20 December 2006, Amiga Inc terminated Hyperion’s license to continue development of AmigaOS 4. However, in 30 September 2009, Hyperion was granted an exclusive, perpetual, worldwide right to AmigaOS 3.1 in order to use, develop, modify, commercialize, distribute and market AmigaOS 4.x and subsequent versions of AmigaOS (including AmigaOS 5).

Linux.

Linux is a family of Unix-like computer operating systems. Linux is one of the most prominent examples of free software and open source development: typically all underlying source code can be freely modified, used, and redistributed by anyone.[44] The name “Linux” comes from the Linux kernel, started in 1991 by Linus Torvalds. The system’s utilities and libraries usually come from the GNU operating system, announced in 1983 by Richard Stallman. The GNU contribution is the basis for the alternative name GNU/Linux.[45]

Known for its use in servers as part of the LAMP application stack, Linux is supported by corporations such as Dell, Hewlett-Packard, IBM, Novell, Oracle Corporation, Red Hat, Canonical Ltd. and Sun Microsystems. It is used as an operating system for a wide variety of computer hardware, including desktop computers, netbooks, supercomputers,[46] video game systems, such as the PlayStation 3, several arcade games, and embedded devices such as mobile phones, portable media players, routers, and stage lighting systems.

 

Server OS

Server-oriented operating systems tend to have certain features in common that make them more suitable for the server environment, such as

  • GUI not available or optional
  • ability to reconfigure and update both hardware and software to some extent without restart,
  • advanced backup facilities to permit regular and frequent online backups of critical data,
  • transparent data transfer between different volumes or devices,
  • flexible and advanced networking capabilities,
  • automation capabilities such as daemons in UNIX and services in Windows, and
  • tight system security, with advanced user, resource, data, and memory protection.

Server-oriented operating systems can, in many cases, interact with hardware sensors to detect conditions such as overheating, processor and disk failure, and consequently alert an operator or take remedial measures themselves.

 

FreeBSD – Based on the original BSD, a free alternative to UNIX, FreeBSD is free and open source and is known for its stability and its devil mascot.

OpenBSD – Another BSD variant, OpenBSD is known for its security-conscious configuration. The developers of the OS are also responsible for OpenSSH and OpenSSL.

Solaris – Once the brain child of the now defunct Sun Microsystems, Solaris is a commercial UNIX variant that uses many of the open tools available for BSD and Linux. In addition, there is a free version called OpenSolaris. All Solaris products are now owned by Oracle.

Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation. All are part of Microsoft Servers. This brand includes the following software:

Microsoft has also produced Windows Small Business Server and Windows Essential Business Server (discontinued), software bundles which includes a Windows Server operating system and some other Microsoft Servers products.[3][4][5]

 

Mac OS X Server – Although most commonly perceived as a desktop OS, Mac OS X is a full-fledged Unix variant and contains many of the features of BSD. Like most commercial Unix offerings, OS X Server is designed to be run on Apple hardware, although there is a free and open source version, Darwin, that could technically run on anything.

Other Commercial UNIX variants – Many of the large server companies included their own proprietary UNIX operating systems already installed on their servers. Some of the big names were IBM’s AIX and HP’s HP-UX.

Embedded OS

An embedded operating system is an operating system for embedded computer systems. These operating systems are designed to be compact, efficient at resource usage, and reliable, forsaking many functions that non-embedded computer operating systems provide, and which may not be used by the specialized applications they run. They are frequently also referred to as real-time operating systems, and the term RTOS is often used (but it’s not correct to call them so) as a synonym for embedded operating system.

List of embedded OS:

Personal digital assistants (PDAs)

Digital media players

Smartphones and Mobile phones

Routers

Other embedded

Mobile OS

Operating system that designed to be used on mobile devices, such as mobile phones, PDAs, Handheld, most of them are usually embedded. List of them can be seen above

 

 

 

 

 

 

 

 

Chapter 5 Discovering computer

Assignment assigned by Mr. Tri Djoko Wahjono

(A) True/False Mark T for True and F for False.

1. Once data is in memory, the computer interprets and executes instructions to process the data into information.(258) (T)

2. An input device is any hardware component that allows users to enter data and instructions into a computer. (260) (T)

3. The command associated with a function key performs the same task within each program with which you are interacting. (260) (F)

4. A touchpad is a small, flat, rectangular pointing device that is sensitive to pressure and motion (265) (T)

5. Touch-sensitive pads typically contain buttons and/or wheels that are operated with a thumb or finger. (267) (T)

6. To capture a signature, a user speaks his or her name into a signature capture pad. (268)  (F)

7. Resolution is the smallest element in an electronic image. (273) (F)

8. A whiteboard is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data. (276) (F)

9. Scanners capture data from a target document, which is the original form of the data. (277) (T)

10. A flatbed scanner works in a manner similar to a copy machine except it creates a file of the document in memory instead of a paper copy. (278) (T)

11. A DVD kiosk is a self-service DVD rental machine that connects to a host computer through a network. (285) (T)

12. A keyguard is a metal or plastic plate placed over the keyboard that allows users to rest their hands on the keyboard without accidentally pressing any keys. (286) (T)

 

(B) Multiple Choice Select the best answer.


  1. C. Ergonomic keyboard
  2. A. Predictive text input
  3. B. Multi touch
  4. C. Graphic tablet
  5. D. Voice recognition
  6. C. Music production software
  7. C. Radio signals
  8. C. Gesture recognition

 

(C) Matching Match the terms with their definitions.

  1. B. Symbol on the screen that indicates where the next character typed will appear
  2. G. Keyboard designed specifically for users who enjoy playing games on the computer
  3. D. Incorporates comfort, efficiency, and safety in the design of the workplace
  4. J. Stationary pointing device with a ball on its top or side
  5. E. Pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a keyboard
  6. A. Freestanding computer that usually includes a touch screen
  7. H. Used by video games and computer games as the input device that directs movements and actions of on-screen objects
  8. F. Controls the movement and actions of players or objects in video games or computer games
  9. I. Converts an analog video signal to a digital signal that a computer can process
  10. C. Obtains data directly at the location where the transaction or event takes place

 

(D)Short Answer Write a brief answer to each of the following questions.

 

  1. There are optical mouse, laser mouse, and air mouse. The reason that they are differentiated with each other is by their way of detecting movement. Optical mouse use light, laser mouse use laser light and air mouse use motion sensing.

 

  1. –     Rotate wheel roll the wheel forward or backward for example, scroll vertically (up and down).

–       Press wheel press the wheel button while moving the mouse for example, scroll continuously.

–       Tilt wheel press the wheel toward the right or left for example, scroll horizontally (left and right).

–       Right-click press and release the secondary mouse button, which usually is the right mouse button for example, display a shortcut menu.

–       Double-click quickly press and release the left mouse button twice without moving the mouse for example, start a program or program feature.

 

  1. a. Optical Character Recognition (OCR) is a technology that involves reading typewritten, computer printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.

    b. Optical Mark Recognition (OMR) is a technology that reads hand-drawn marks such as small circles or rectangles

 

  1. The most widely used biometric device today is fingerprint reader. A fingerprint reader, captures curves and indentations of a fingerprint to identify whether the ‘inputted’ fingerprint are the right one.

 

  1. Americans with Disabilities Act are rules for company with 15 or more employees to make a reasonable attempt to accommodate the need of physically challenged workers.Gesture recognition and Computerized implant devices are a way for human to provide a natural computer interface for the physically challenged people through a means of just moving a small part of the body that are still functioning.

Chapter 4 DISCOVERING COMPUTER

Assignment assigned by Mr. Tri Djoko Wahjono

(A)True/False Mark T for True and F for False.

1. The system unit is a case that contains electronic components of the computer used to process data. (210) (T)

2. The processor holds data waiting to be processed and instructions waiting to be executed. (213) (F)

3. The speed of the system clock is just one factor that influences a computer’s performance. (216) (T)

4. Replacing a motherboard is a fairly complicated process, whereas replacing a processor is much simpler. (218) (T)

5. A byte is the smallest unit of data the computer can process. (221) (F)

6. When the computer’s power is turned off, volatile memory loses its contents. (223) (T)

7. Current processors include advanced transfer cache (ATC), a type of L2 cache built directly on the processor chip. (227) (T)

8. Read-only memory refers to memory chips storing permanent data and instructions. (228) (T)

9. Hi-Speed USB is a more advanced and faster USB, with speeds 100 times higher than that of its predecessor. (234)

10. USB 3.0 is more than 10 times faster than USB 2.0. (234) (T)

11. Both USB 2.0 and USB 3.0 are backward compatible, which means they do not support older USB devices. (234) (F)

12. SAS (serial-attached SCSI) is a newer type of SCSI that transmits more reliably, but at slower speeds, than parallel SCSI. (235) (F)

 

(B)Multiple Choice Select the best answer.

  1. B. Central processing unit (CPU)
  2. A. Control unit
  3. B. Registers
  4. B. Massively parallel processing
  5. C. Firmware
  6. B. Port replicator
  7. A. Docking station
  8. D. Front side bus


 

(C) Matching Match the terms with their definitions.

  1. H. Main circuit board of the system unit
  2. A. Interprets and carries out the basic instructions that operate a computer
  3. F. Provides the capability to track computer hardware and software, diagnose and resolve computer problems, and secure computers from outside threats
  4. B. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as a processor
  5. D. Electronic components that store instructions, data, and results of processed data
  6. E. Can allocate available space on removable flash memory devices as additional cache
  7. G. Nonvolatile memory that can be erased electronically and rewritten
  8. C. Amount of time it takes the processor to read data, instructions, and information from memory
  9.  I. Device that plugs in a USB port on the system unit and contains multiple USB ports in which you plug cables from USB devices
  10. J. Connects the processor to cache

(D)Short Answer Write a brief answer to each of the following questions.

1.a. Slate Tablet PC , which typically does not include a keyboard, the system unit is behind the display.

b. Convertible Tablet PC, by contrast, the system unit is positioned below a keyboard, providing functionality similar to a traditional notebook computer

The difference is the display attaches to the system unit with a swivel-type hinge, which enables a user to rotate the display and fold it down over the keyboard to look like a slate Tablet PC or netbook.

2. The motherboard, sometimes called a system board, is the main circuit board of the system unit. The motherboard contains many electronic components including a processor chip, memory chips, expansion slots, and adapter cards.

A computer chip is a small piece of semiconducting material

3. The machine cycleis a set of four basic operations — fetching, decoding, executing, and storing — that the processor repeatsfor every instruction

Register functions include storing the location from where an instruction was fetched, storing an instruction while the control unit decodes it, storing data while the ALU computes it, and storing the results of a calculation

4. Many computers, peripherals, smart phones, PDAs, cars, and other consumer electronics are Bluetooth enabled,

3 ways of making Bluetooth enabled computer:

  1. You can purchase a Bluetooth wireless port adapter that will convert an existing USB port into a Bluetooth port
  2. For notebook computers, you can buy Bluetooth pc cards express card modules
  3. Bluetooth cards can be bought to make PDAs and smartphones to be Bluetooth enabled

 

5. Compressed air can be used to blow dust away from any unreachable by normal cleaning. For cleaning computer we should turn it off, and if necessary, unplug it from the electrical outlet, remove the battery, and disconnect all cables from the ports.