Exercise Chapter 15

I.   True/False

  1. T
  2. F
  3. T
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. T

II.   Multiple choice

  1. A
  2. C
  3. C
  4. A
  5. D
  6. B
  7. D
  8. D

III.  Matching

  1. E
  2. D
  3. J
  4. G
  5. H
  6. B
  7. F
  8. i
  9. A
  10. C

IV.    Short Answer

1.   Advantage of attending trade school  is time savings. Students often complete trade school programs in a shorter time than college and university programs. Factors you should consider when selecting a trade school is  ask the advisor if the trade school has an articulation agreement with a nearby college or university. An articulation agreement ensures that if you transfer to a college or university, you will receive credit for most of the courses taken at your current school.

2.   The benefits of professional growth and continuing education is staying aware of new products and services in the computer industry is a challenging task because technology changes so rapidly.

Some ways you can keep up to date about industry trends and technologies are participate in professional growth and continuing education activities such as workshops, seminars, conferences, conventions, and trade shows, also read one or more computer industry publications regularly or visit news, blogs, wikis, or technical Web sites.

3.   About choosing the certification it is best if you choose the one that meet your interest, goal, and especially that has immediate benefits for your current job.

Four options for preparing certification:

  • Self-study: Flexible self-study programs help professionals prepare for certification at their own pace and supplement other training methods.
  • Online training classes: Online training allows students to set their own pace in an interactive environment and combines the technological advantages of computer-based training with the connectivity of the Internet or a company’s intranet.
  • Instructor-led training: Instructor-led training is available in a variety of forms, including seminars, which typically are held for several days during a week; boot camps, which immerse students in intensive course work for up to two weeks; and academicstyle classes, which span a period of several weeks or months.
  • Web resources: The certification sponsor’s Web site generally contains descriptions of the available certifications, with FAQs and links to authorized training and testing centers.

4.   The focus of programmer or developer certification is training programs that prepare applicants for the certification test. Other types of certification are beneficial to those interested in programmer / developer certification are Certified Software Development Associate (CSDA), Certified Software Development Professional (CSDP), IBM Certified Solution Developer, Microsoft Certified Professional Developer (MCPD), Sun Certified Enterprise Architect (SCEA), Sun Certified Java Developer (SCJD), Sun Certified Java Programmer (SCJP), and Sun Certified Mobile Application Developer (SCMAD).

People who might be interested in programmer/developer certification are Java programmers, Mobile application developers, Oracle database managers, Programming consultants, SQL programmers, Web software developers, XML developers.

5.   Hardware certifications vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company’s current and future computing needs. People who might be interested in hardware certification are Cable installation technicians, Computer repair technicians, Corporate trainers, Help desk specialists, IT consultants, System engineers and administrators

 

Exercise chapter 14

I.   True/False

  1. T
  2. F
  3. F
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. T

II.   Multiple Choice

  1. C
  2. B
  3. A
  4. B
  5. A
  6. D
  7. A
  8. D

III.   Matching

  1. H
  2. F
  3. B
  4. E
  5. D
  6. G
  7. A
  8. J
  9. i
  10. C

IV.  Short Answer

1.   Responsibilities of managers:  coordinating and controlling an organization’s resources.

 Four activities that managers perform to coordinate resources:

  • Planning
  • Organizing
  • Leading
  • Controlling

2.   A Content Management System (CMS) is an information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.

3.   Two types of virtualization:

  • Server virtualization provides the capability to divide a physical server logically into many virtual servers.
  • Storage virtualization provides the capability to create a single logical storage device from many physical storage devices.

 Cloud computing is an Internet service that provides computing needs to computer users. For example, an employee working during the day in California could use computing power in a Paris network system located in an office that is closed for the evening.  Grid computing combines many servers and/or personal computers on a network, such as the Internet, to act as one large computer.  Grid computing often is used in research environments, such as climate research and life science problems.

 Why companies use them?  Because,  as the demand for computing resources increases, companies may find that using outside computing resources is more economical than building new computing capacity internally.

4.   Five types of e-commerce:

  • E-Retail, also called e-tail, occurs when retailers use the Web to sell their products and services.
  • Finance.  Online banking allows users to pay bills from their computer or mobile device, that is, transfer money electronically from their account to a payee’s account such as the electric company or telephone company.
  • Travel The Web: provides many travel-related services. If you need directions, you simply enter a starting point and destination, and many Web sites provide detailed directions along with a map. Users can make airline reservations and reserve a hotel or car.
  • Entertainment and Media:  Music, videos, news, sporting events, and 3-D multiplayer games are a growing
    part of the Web’s future. Newsprint on the Web is not replacing the newspaper, but enhancing it and reaching different populations.
  • Health: Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. Some Web sites offer the capability to listen in on health-related seminars and discussion.

5.   A backup plan contains copies of data worth saving. For a backup plan to be successful, the organization must back up all critical resources. Also, additional people, including possibly nonemployees, must be trained in the backup and recovery procedures because organization personnel could be injured in a disaster.

Exercise Chapter 13

I.   True/False

  1. T
  2. T
  3. T
  4. T
  5. T
  6. F
  7. F
  8. T
  9. F
  10. F

II.   Multiple Choice

  1. B
  2. C
  3. C
  4. A
  5. A
  6. C
  7. D
  8. B

III.   Matching

  1. G
  2. D
  3. J
  4. i
  5. C
  6. E
  7. A
  8. H
  9. B
  10. F

IV. Short Answer

  1. How Compiler is different from a Interpreter:  A compiler is a separate program that converts the entire source program into machine language before executing it. The machine language version that results from compiling the 3GL is called the object code or object program. The compiler stores the object code on storage media for execution later. Whereas,  An interpreter, by contrast, translates and executes one statement at a time. An interpreter reads a code statement, converts it to one or more machine language instructions, and then executes those machine language instructions.

 The advantage of an interpreter is  that when it finds errors, it displays feedback immediately. The programmer can correct any errors before the interpreter translates the next line of code.  The disadvantage is that interpreted programs do not run as fast as compiled programs. This is because an interpreter must translate the source program to machine language each time the program executes.

2.  A major benefit of OOP is the ability to reuse and modify existing objects. For example, once a programmer creates an Employee object, it is available for use by any other existing or future program.

How RAD is used for developing software:  RAD (rapid application development) is a method of developing software, in which a programmer writes and implements a program in segments instead of waiting until the entire program is completed. Users begin working with sections of the program as they are completed. An important concept in RAD is the use of prebuilt components.

3.   An IDE (integrated development environment) includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a  debugger (to remove errors, which is discussed later in the chapter).

Programming languages in the Visual Studio suite:

  • Visual Basic is a programming language that allows programmers easily to build complex task-oriented object-based pro grams.
  • Visual C++ is a programming language based on C++.
  • Visual C# is a programming language that combines programming elements of C++ with an easier, rapid development environment.

4.   XML separates the Web page content from its format, allowing the Web browser to display the contents of a Web page in a form appropriate for the display device. For example, a smart phone, a PDA, and a notebook computer all could display the same XML page or use different formats or sections of the XML page.

Two applications of XML:

  • RSS 2.0, which stands for Really Simple Syndication
  • ATOM, which are specifications that content aggregators use to distribute content to subscribers.

5.  Two activities performed by the programmer when documenting a solution:

  • Review the program code: first, programmers review the program for any dead code and remove it. Dead code is any program instructions that a program never executes.  Next, programmers should run the program one final time to verify it still works.
  • Review all the documentation: After reviewing the program code, the programmer gives the program and all of its documentation to the systems analyst. The documentation includes all charts, solution algorithms, test data, and program code listings that contain global and internal comments.
     Proper documentation is important because  Proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

Exercise chapter 12

I.    True/False
1. F
2. T
3. F
4. F
5. F
6. T
7. F
8. F
9. T
10. T
11. F

II.    Multiple Choice
1. A
2. B
3. C
4. A
5. C
6. D
7. A
8. D

III.    Matching
1. H
2. E
3. A
4. B
5. i
6. G
7. F
8. J
9. C
10. K

IV.    Short Answer
1. System development is a set of activities used to build an information system.
 Five phases of the system development life cycle (SDLC):
  a. Planning
• Review project requests
• Prioritize project requests
• Allocate resources
• Form project development team
   b. Analysis
• Conduct preliminary investigation
• Perform detailed analysis activities: Study current system, determine user requirements, and recommend solution.
c. Design
• Acquire hardware and software, if necessary
• Develop details of system
d. Implementation
• Develop programs, if necessary
• Install and test new system
• Train users
• Convert to new system
e. Operation, Support, and Security
• Perform maintenance activities
• Monitor system performance
• Assess system security

2. Four types of feasibility:
a. Operational feasibility measures how well the proposed information system will work. Will the users like the new
system? Will they use it?
b. Schedule feasibility measures whether the established deadlines for the project are reasonable.
c. Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed
to deliver and then support the proposed information system.
d. Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed
information system will be greater than its lifetime costs.
Six techniques used to gather data and information: review documen tation, observe, survey, interview, conduct joint-
application design sessions, and research.

3. The UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development. The
UML is a graphical tool that enables analysts to document a system. It consists of many inter related diagrams. Each diagram
conveys a view of the system. UML is used to specify, visualize, modify, construct and document the artifacts of an object-
oriented software-intensive system under development.
 How a use case diagram different from a class diagram:
A use case diagram graphically shows how actors interact with the information system. An actor is a user or otherentity
such as a program. The function that the actor can perform is called the use case. Thus, a use case diagram shows actors and
their use cases. Whereas, a class diagram graphically shows classes and subclasses in a system.

4. Three major activities of the operation, support, and security phase:
a. Perform maintenance activities
b. Monitor system performance
c. Assess system security
Type of maintenance activity:
a. Post-implementation system review, is to discover whether the information system is performing according to the
users’ expectations.
b. Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
c. Adaptive maintenance is the process of including new features or capabilities in an information system.
d. Performance monitoring is to determine whether the system is inefficient or unstable at any point.
e. Perfective maintenance, investigate solutions to make the information system more efficient and reliable.

5. A computer security plan summarizes in writing all of the safeguards that are in place to protect an organization’s
information assets. The goal of a computer security plan is to match an appropriate level of safeguards against the
identified risks.
Three things a computer security plan should do:
a. Identify all information assets of an organization, including hardware, software, documentation, procedures, people,
data, facilities, and supplies.
b. Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to
occur. Place an estimated value on each risk, including lost business. For example, what is the estimated loss if customers
cannot access computers for one hour, one day, or one week?
c. For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.