ITS101 Final Exam Revision - Term 1 2023/2024 PDF
Document Details
Uploaded by PositiveSeal
2023
NASSER VOCATIONAL TRAINING CENTRE
Shaima Yusuf Hasan
Tags
Summary
This is a revision document, containing questions and answers to prepare for an ITS101 exam covering topics in computer technology, and business principles. The document features examples, definitions, and analyses.
Full Transcript
ITS101 Final exam revision – term 1 - 2023/2024 LA A1 1. The main goal to open a business is called: The business purpose 2. One functional area of a retail organization is “Sales department” 3. The project IT infrastructure passes through 4 stages or steps: a. Planning b. Analysis of possibilities...
ITS101 Final exam revision – term 1 - 2023/2024 LA A1 1. The main goal to open a business is called: The business purpose 2. One functional area of a retail organization is “Sales department” 3. The project IT infrastructure passes through 4 stages or steps: a. Planning b. Analysis of possibilities and limitations c. Implementation d. evaluation and improvements 4. Examples with their type/sector: • A plumber - Profit-based service provider • Apple manufacturer - Profit-based product provider • Governmental schools - Non-profit-based service provider • A supermarket - Profit-based reselling provider 5. the stages of project IT infrastructure building a. Planning b. Analysis c. Implementation d. Evaluation and improvement 6. A correct "purpose" has to define the organization and states its goal clearly, as an example: purpose of a governmental school: “An organization that educates students, improves their knowledge and soft skills, and eventually qualify them for their next stage of education or to work” 7. "Human resources" is a department that exists in most of the organizations. We can call it "Functional area" as well LA A2 1. 2. - Barcode scanner is an example of Automatic data processing device Data capture and collection device If you are planning to contact your classmate, the best device to use is: Laptop Tablet Mobile Wearable computer Because - - - - - - 3. Servers are digital devices 4. Point-of-sale system is a mandatory digital device used in retail field 5. Do you recommend that a "Teacher" uses a "Projector" or a "TV" to display the lesson slides, videos, etc...? Give 2 reasons 6. The Server is a powerful, central, and focused digital device 7. 4 examples of "Data capture and collection" devices Page 1 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 a. b. c. d. Barcode scanner RFID Optical mark reader Sensors LA A3 1. 2. 3. 4. Rather than a printer, we can use a Braille Embosser to assist blind people and help them read For a tablet, we use Touch screen, and Stylus as input devices An “Actuator” output device usually works with a Sensor input device While travelling, the best option to store your pictures is in - - - - - - - storage device. Suggest then explain 5. Voice screen reading is an “Accessibility” facility that supports people with sight problems 6. Why "HDD Hard disk drive" is better than a USB flash disk? Give 2 reasons 7. The sensor works as an input device with and actuator as output device. 8. Output peripherals used in a "smartphone": a. touch screen b. speaker 9. "Braille Embosser" is a type of printer which mainly supports blind people 10. We can use a 3D printer in construction field LA A4 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. The car parking system is working with: Realtime OS Operating system types: Mobile Single-user Single-task OS PC Single-user Multi-task OS Traffic Light Realtime OS Server Multi-user OS Explain how an OS can provide Traceroute utility for networking To manage the memory and ensure enough space for running applications, an OS un-allocates memory space and send the contents temporarily to: The backing store in the hard disk People with short experience in user interfaces, can use these 2 interfaces: Graphical User Interface Menu-based Interface The most suiting user interface for a PC has shortage in resources (limited CPU speed, RAM space) is: Command-line interface Menu-based Interface is the best to be used for a coffee machine selections To record a cold store sale, it’s better to use: Adapted Interface A virus can affect the performance of an OS Your budget is limited, you best get Open-source application for your new business For troubleshooting a system, you can detect the issues using System profiler utility The Defragmenter, and Partitioner utilities organize the files on a disk in a way that speeds up the performance of a system You can divide your disk space based on file types using Partitioner utility Page 2 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 14. Why would you prefer using a specific utility tool? 15. a “File Extension”: • tells the user what type of data the file contains • tells the OS which icon to display and which software to use to open the file when the icon is double clicked 16. Examples of file extensions with their content types • PNG – Image • PPT – Application • MP4 – Video • MP3 – Audio 17. Terms with definitions • Lossy compression – the compression which reduces the file size by losing some of its quality • Lossless compression – the compression which allows restoring the file quality when decompressed 18. Lucy would like to share her images with the copy center for printing, what should she consider? 19. Mohammed has short experience in using the PC. He has a laptop with limited resources, so he decided to use the Command-line interface to perform most of the system tasks instead of the Graphical user interface. Evaluate his decision, and give him a suggestion: 20. Operating system types: ATM Machine OS: Single-user Single-task Laptop OS: Single-user Multi-task Web Server: Multi-user Multi-task 21. Interface names Command Line GUI Page 3 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 Menu-based 22. (tracert "ip") is a command used on the (cmd) to Trace the route of data being transmitted over the network 23. 24. 25. In memory management, the OS: Decides which processes to allocate memory to Transfers data to the "virtual memory" temporarily to free RAM for new processes Factors affecting the performance of the operating system Virtual memory space CPU speed Single User - Single Task operating systems require fewer resources (i.e., CPU speed, RAM capacity) 26. The (Baking Store "Virtual Memory") is a memory space on the hard disk used to temporarily store active files in "Memory Management process" 27. Ahmed would like to make a voice call over the internet VOIP, but the call is not being sent because of the limited speed internet connection he has. Suggest a utility tool that can help Ahmed make his call successfully. Then explain how it can help. 28. "Selected by user" utility are tools which are selected and downloaded by the user 29. When you plan to upgrade your system by changing some hardware components, you can view your current system specifications using System Profiler 30. The displayed picture is for Defragmenter / Optimizer utility 31. Ali would prefer using Canva application to create his presentation, not PPT. What was Ali thinking of when he made his selection / in other words - What are the factors which affected his selection? (Give 2 factors) 32. Open-source software: Free or low initial cost, but maintenance may cost Proprietary software: High initial cost, but maintenance is free of charge 33. Compression: is a tool that allows decreasing the files/data size by lowering the quality and has 2 types: Page 4 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 Lossy: The JPG image loses its quality during compression permanently Lossless: The PNG image temporarily loses its quality during compression, then it restores it back when decompressed 34. Hasan just finished editing his video to upload it on Instagram. Which file type would you recommend for Hasan to save his file as? Why? LA A5 1. • • • 2. • • • 3. • • • • 4. • • • 5. 6. 7. 8. 9. 10. 11. Network guided connection types Cat5 – cheap comparing to other types and used for short distances Coaxial – used in television cabling Fiber optic – specialist skills required to install Device – peripheral guided connection types VGA – analogue low-cost connection HDMI – digital connection transmits video and sound USB – connects peripherals which are close to each other Network unguided connections Wi-Fi – connects devices wirelessly to LAN and WAN 3G/4G – provides internet whilst on the move Satellite broadband – provides connectivity to (rural areas with no service coverage) Microwave – allows point-to-point connections like (radio service in the car) Device – peripheral unguided connection Bluetooth – used to connect a wireless mouse to a laptop Wi-Fi direct – used to display the mobile screen on a TV Wi-Fi – used to link a printer wirelessly to a PC Wireless connection is unguided connection method For rural remote areas with no internet service coverage by the service providers, “Satellite Broadband” is the best selection as a connection method. The only issue with it is that - - - - - Unguided – Wireless connection uses electromagnetic spectrum to link devices together Twisted pair cable is cheap, flexible, and has 2 types: shielded and unshielded Device – peripheral guided connection types a. VGA: Transfers analogue data and doesn’t support sound b. HDMI: Transfers digital voice and video data c. USB: Short cable that connects multiple devices Microwave connection is single-point and is not safe for individual direct use on their personal devices Wi-Fi direct and Wi-Fi are connections that use Wi-Fi radio waves to connect devices LA A6 1. 2. 3. 4. 5. A WAN contains a group of LANs Give an example of a PAN In a VPN, Encryption technique is applied to increase the security level while data transmission You need to transfer your files from the mobile to the laptop, you best set up a PAN You need to make a payment online, you must use a VPN Page 5 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 6. If you would like to increase the coverage range and strengthen your Wi-Fi signal, you can add a Repeater to your network 7. A Bridge is used to direct the data correctly and reduce the network traffic 8. SOHO (Small Office Home Office) is non-professional level equipment 9. To create a VPN network, you do not need to construct a physical network infrastructure 10. WLAN is a local area network that uses wireless service 11. The following 4 devices can form a PAN together a. Mobile phone b. Air Pod c. Laptop d. Smartwatch 12. The VPN is a secure network that uses “Encryption” security technique 13. Using - - - - - - - we can extend the Wi-Fi covering range. Explain 14. A switch can combine the functionality of these 3 devices: a. Hub b. Firewall c. Bridge 15. Router can be called as “Wireless Access Point” 16. To reduce the network traffic, we can add a bridge. How can it work? 17. 2 considerations when choosing the network components: LA A7 1. 2. 3. 4. • • 5. 6. • • - TCP/IP protocol is the basic communication language of the internet HTTPS is the secure version of the standard HTTP which uses cryptography technique Security is an issue when transmitting data over a network, suggest 2 solutions: Bandwidth – measured in bits per second Latency – measured in milliseconds The latency can be an issue in live streaming like when: Playing online games Making video calls WinZip – 1 time compression Codecs – Compression while streaming Network No 1 is located in Bahrain and has 100 users, and network 2 is located in Japan and has 50 users – when the web server is located in China, the network which will face more latency is: No 1 7. The SSL security protocol is gradually being phased out and replaced with TLS 8. HTTPS protocol uses encryption technique to provide high level security 9. Some protocols with their uses a. TLS and SSL: Security b. SMTP, POP3, and IMAP: Mail c. HTTP, HTTPS, and FTP: Web pages d. H.323, SIP, and RTP: Voice and Video calls Page 6 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 10. Mention 2 factors which can slow down the connection speed, and increase latency LA A8 1. An employee needs to access the office files using his home laptop, it’s better for him to use: Cloud storage 2. Cloud services can save a user money. Explain 3. Remote desktop technology is used to access remote desktops and support fixing their technical issues 4. State the two cloud types: 5. When you are using the iCloud, OneDrive, or Google Drive, you are actually using Cloud storage 6. 2 disadvantages when using could services: a. Security issues b. Heavy use of bandwidth 7. To troubleshoot any cloud service, using remote desktop tool can help 8. A “bank” would like to use online cloud storage instead of buying their own servers to store their clients data. What would be your advice for them? LA A9 1. 2. • • • Give 2 examples of emerging technologies Some emerging technologies with their types: Digital device – Smartphone Networking – Cloud computing Data interrogation – Virtual reality LA B1 1. Terms and definitions A B Mohammed 02-07-2008 is Mohammed’s date of birth • A – Information • B – Data 2. In TROLLEY Market: • An Item price – Management level data • No. of items in a transaction – Operational level data • The added VAT to its price – Strategic level data 3. Explain: What can happen if the items stock level in Trolley is not recorded correctly by their system? 4. For a smart system, there should be Big data and Good data analysis at the backstage 5. Data Volume means how big is the data Page 7 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 6. 7. 8. 9. 10. Data Velocity means how fast can the data be entered and retrieved Variety is the different types the data contains Data Veracity means how accurate is the data Data Value means how important is the data Changing markets / Changes in organization or around / Global or national trends can affect Strategic level data 11. a. Management level data: is the initial data required to use the system like the "items names" in a store system b. Operational level data: is the frequently updated data during work like the "sales record" 12. What can happen if "NVTC students' marks" are not being recorded in a database? 13. The bigger was the data, the smarter was the system 14. the 5 Vs with their definitions a. Value: How important is the data b. Volume: The amount of data c. Velocity: How quick is the data input, analysis, and retrieve d. Veracity: Data accuracy e. Variety: Different types of data Big Data contains LA B2 1. 2. List of online communities: Forums Wiki Podcasts Social media Organizations do not need to pay for an online community initially but further payment is there for their advertisements - A limitation can be caused using online communities in organizations is that it: Can cause distractions for employees 3. Give one benefit an organization can get using online communities 4. Online community tools with the type of data it focuses on a. Wiki: Articles b. Vlog: Videos c. Chatrooms: Text messages d. Podcast: Sound clips 5. How can a factory benefit from online community tools? LA B3 1. 2. • • 3. The most reliable data source is the Primary Data sources and examples Primary data source – A survey or an observation Secondary data source – existing analyzed trends report Explain: What can happen if a month sales data is missing? Page 8 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 4. The best way to collect data quickly is through Survey 5. The most accurate, reliable and detailed data can be collected using Focus group 6. The following picture is representing 7. 8. 9. • • 10. 11. 12. 13. 14. 15. Validation – Type check “Extracting and sorting data” steps 1 – Data is extracted from unstructured sources 2 – Data is entered into the system for processing 3 – Data is stored in a database to add structure 4 – The database can be sorted and retrieved using SQL queries To predict future events (like the weather) it is recommended that we use Numerical modelling technique Text and numbers data presenting – More accurate and detailed Graphical data presenting as charts – gives immediate feel for the data It is recommended that a business owner makes “Trend Analysis” before starting his business When we need to generate an annual report using a system, the system interface must provide this feature Ahmed would like to start his new MARKET Business. He downloaded a ready data set from the internet to make trends analysis in his area, then he visited a nearby Market and interviewed its owner to get more information. a. The ready trends data set: Secondary data source b. The interview data: Primary data source What could happen if weather stations are not recording the temperature data accurately? In terms of HONESTY, the survey can be good and bad as data collection method Interviewing one person is a data collection method that is Less detailed - comparing to focus group 16. a. Page 9 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 Length check validation b. Range check validation c. Type check validation d. The accepted date format is D/M/Y while you have entered D-M-Y: Format check validation e. Double entry check verification f. At the end of a form you filled online, you must click the check box at the end to acknowledge that the information you have provided is correct: Proofreading check verification 17. Analyzing the DB mathematically to understand the data pattern / flow and help predicting future events is Numerical modeling 18. Ali would like to analyze his annual market sales record to find the month with highest sales rate. It is better that Ali preview the data in: Graphical way 19. State 2 error reduction tools used in an effective user interface, and explain briefly how they work Page 10 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 LA C1 1. The following picture is for Phishing data threat 2. 3. 4. 5. • • • • Give 1 expected implication of data threats on organizations State 2 threats to data A hacker can be ethical Malware – harmful software like a virus Hacker – a person who accesses systems unauthorizedly Phishing – a person who sends an email pretending to be from a reputed company to get personal information Accidental damage – human errors LA C2 1. Give an example of every data protection method: (Technique, Hardware, Software) 2. Antiviruses and Firewalls are not 100% effective when: - - - - - - 3. For Encryption, you need to keep the key secure; because a lost key means that the data is not retrievable 4. Encryption can be applied on stored and transmitted data 5. Backup technique ensures that data can be recovered after any data loss 6. • Antivirus – protects systems from malware • Firewall – protects systems from hackers 7. The most effective form of security is: Encryption LA C3 1. White hat hacking is an ethical process 2. As a student, what ethical / moral issues you may face while using your school network? (mention and explain one issue) 3. Enabling GPS location detector when installing or running an application is Privacy ethical issue 4. Page 11 of 12 Shaima Yusuf Hasan ITS101 Final exam revision – term 1 - 2023/2024 5. 6. 7. Developing (poor) countries get – Less internet access facilities Developed (rich) countries get – More internet access facilities The ever-growing demand for electronic devices means: Increased energy needed to run the devices Increasing amounts of techno-trash Netiquette is: Internet etiquette Acceptable behavior on the internet Jobs outsourcing and diseases spreading are results of: Globalization LA C4 1. In the displayed picture: - A – Correct setting position - B – Incorrect setting position 2. Denial of service is type of attack which overloads the system so it can no longer perform normally 3. Copyright is a legal factor which prevents illegal movies / applications download 4. State two consumer rights for the use of IT systems LA C5 1. 2. 3. 4. Why to legislate using IT systems? ISO set standards followed internationally to ensure high quality products and services WCAG is set of rules for making the web available to everyone W3C are international recommendations to describe the best practices of web development LA C6 1. 2. 3. - Acceptable use policies (AUPs) differ from one organization to another Give an example of “Acceptable use policy” set by your school for the computer lab 2 examples for IT outsourcing iCloud Use the services of a call canter company Page 12 of 12 Shaima Yusuf Hasan