0% found this document useful (0 votes)
13 views20 pages

Role of Information Technologies in Business

The document discusses various hardware and software components of computers and information systems. It provides descriptions of components like processors, memory types, storage devices, printers, displays, networking hardware, operating systems, productivity software, and more. It compares different component types like structured vs unstructured data, RAM vs ROM, backups vs archives, and gives examples of specific hardware parameters and their measurement units.

Uploaded by

valerix1405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views20 pages

Role of Information Technologies in Business

The document discusses various hardware and software components of computers and information systems. It provides descriptions of components like processors, memory types, storage devices, printers, displays, networking hardware, operating systems, productivity software, and more. It compares different component types like structured vs unstructured data, RAM vs ROM, backups vs archives, and gives examples of specific hardware parameters and their measurement units.

Uploaded by

valerix1405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

1.

ROLE OF INFORMATION TECHNOLOGIES IN


BUSINESS

1) Characterize the main differences between data, information and knowledge


Information is essentially processed data. Knowledge is what we
know.

2) What is metadata? Give at least three examples


Metadata is defined as the data providing information about
one or more aspects of the data; Means of creation of the
data. Purpose of the data. Time and date of creation
3) What is the difference between structured and unstructured data?
Structured data is highly specific and is stored in a predefined
format, where unstructured data is a conglomeration of many varied
types of data that are stored in their native formats. This means
that structured data takes advantage of schema-on-write and
unstructured data employs schema-on-read

4) Which type of data is typically processed in organizational IS? Why


“An information system (IS) can be any organized combination of
people, hardware, software, communications networks, data resources,
and policies and procedures that stores, retrieves, transforms, and
disseminates information in an organization.”

5) What is the main purpose of IS of an organization?


 Input involves capturing and assembling elements that enter the
system to be processed
 Processing involves transformation processes that convert input into
output.
 Output involves transferring elements that have been produced by a
transformation process to their ultimate destination

6) What components does the IS of an organization consist of?


The IS consists of hardware, software, communication technologies,
data and people.
2. COMPUTER HARDWARE
1) List at least two important parameters of the processor (CPU) and explain
the units in which they are measured
The number of steps the processor can execute in one second is
called a frequency, and it is usually measured in GHz, This
parameter is called a word size (or word length) and it is
measured in bits.
2) What is the purpose of main (operating) memory in a PC? Is this hardware
component absolutely necessary for the functioning of the PC?
It stores the information your computer is actively using so
that it can be accessed quickly. The more programs your system
is running, the more you'll need. SSDs (solid state drives)
are also important components and will help your system reach
its peak performance.

3) What is the purpose of CMOS memory in a PC? Is this hardware


component absolutely necessary for the functioning of the PC?
The CMOS (Complementary Metal-Oxide Semiconductor) chip stores
the settings that you make with the BIOS configuration
program. The BIOS offers you many different options for most
system components controlled by the BIOS, but until the
settings are stored in the CMOS, the system is unable to run.

4) What happens with data in RAM after switching off the PC?

If you turn off your PC, the information in your RAM is gone,
but the data saved in your long-term storage (SSD or HDD) is
saved.

5) What happens with data in ROM after switching off the PC?
ROM stands for READ ONLY MEMORY and is non-volatile memory.
When the computer is shut down the data remains stored.

6) Which memory stores the basic data about PC configurations and setup?
The BIOS is stored permanently on your computer's ROM, rather than
its hard drive, since your motherboard cannot access the hard drive
until it has loaded the settings from the BIOS.

7). Which memories reach the highest speed of data processing ?

Registers are the fastest type of memory, which are located


internal to a processor.

8. List at least two important parameters of the hard disk drive and explain
the units in which they are measured.
The most common parameter of hard HDD is its already mentioned
capacity. The typical capacity today varies around 1TB.
Another important parameter is physical rotational speed
measured in revolutions per minute

9. What is the purpose of the hard disk drive in a PC? Is this hardware
component absolutely necessary for the functioning of the PC?
HDDs are used either as the primary or secondary storage
device in a computer.

10. Which memory is the most appropriate for backup of large documents
(size of several GB)?
(НD)

11. Which memory is the most appropriate for distribution of software?


(SDD)
12. What is the main difference between optical discs CD-R, CD-ROM and CD-
RW?
After writing to a CD-R, it becomes a CD-ROM. A Compact Disc
Re-Writable (CD-RW) is an erasable disc that can be reused.
The data on a CD-RW disc can be erased and recorded over
numerous times. NOTE: CD-RW media may not be readable outside
of the drive it was created in

13. What is the main difference between optical discs CDs, DVDs and BR?
CDs can store up to 700 MB (megabytes) of data, and DVDs can
store up to 8.4 GB (gigabytes) of data. Blu-ray discs, which
are the newest type of optical media, can store up to 50 GB of
data.

14. What is the main difference between magnetic tape and magnetic disk?
In magnetic tape for data recording, magnetic material is
coated on only one side of the tape. While in magnetic disk
for data recording, magnetic material is coated on both side
of the platters.

15. Explain the main difference between backing up and archiving data.
A backup is a copy of your current data that you use to
restore original data if it's ever damaged. An archive is
historical data you must keep long-term retention reasons,
such as complianc)
16. List at least four hardware components of the PC that influence the
quality of image we can see on the monitor.
 CPU.
 GPU.
 RAM
 Storage
 Monitor

17. What is the purpose of a graphics card in a PC? Is this hardware


component absolutely necessary for the functioning of the PC?
Without a graphics card to perform the necessary calculations,
the workload would be too much for the computer to handle. The
graphics card accomplishes this task using four main
components: A motherboard connection for data and power. A
graphics processor (GPU) to decide what to do with each pixel
on the

18. What is the difference between an LCD and LED display?


The difference is in the backlights. While a standard LCD
monitor uses fluorescent backlights, an LED monitor uses
light-emitting diodes for backlights.

19. What are the advantages and disadvantages of inkjet versus laser
printers?
Laser printers can print much faster than inkjet printers can.
Most are equipped with high-capacity paper trays, so they can
print more pages at a given time.
It is expensive to replace ink cart cartridges.

20. List at least two important parameters of a printer and explain them.
 the possibility of color printing,
 print speed (number of pages per minute)

21. Which kind of printer is suitable for household (few printed pages per
week) and which for a firm (few hundred printed pages per week)?

22. Explain the scanner’s purpose and add at least three parameters.
It is designed to transfer data from paper into electronic form

 the quality of scanning


 Speed
 maximum physical resolution

23. What is the purpose of a bus in a PC? Is this hardware component


absolutely necessary for the functioning of the PC?
A bus is a system of connections that transfer data between
individual computer components as well as between the computer
and its peripheral devices

24. What is the purpose of the sound card in a PC? Is this hardware
component absolutely necessary for the functioning of the PC?
A sound card (also referred to as an audio card) is a
peripheral device that attaches to the ISA or PCI slot on a
motherboard to enable the computer to input, process, and
deliver sound necessary one if you want to hear sound from
your PC on wired headphones or speakers

25. Explain the similarities and differences between a modem and network
card.
A network interface card or NIC is used to connect to a
digital network, While modem takes this digital traffic and
changes it to a different format to talk.

26. What are the two main functions of UPS connected to the desktop
computer
surge protection and battery backup

3. COMPUTER SOFTWARE
1. What kind of program and which specific application is suitable for
processing information about customers and suppliers and carried business
transactions of the company?
At the most basic level, CRM software consolidates customer
information and documents it into a single CRM database so
business users can more easily access and manage it

2. What kind of program and which specific application is suitable for


creating the logo for the company?
Abobe Illustrator CorelDRAW Adobe Photoshop
3. What kind of program and which specific application is suitable for
modification of scanned and taken pictures?

4. What is the difference between a spreadsheet and a relational database


management system?
The main technical difference between a spreadsheet and a
database comes down to the way they store data.

5. What is the difference between word processing and DTP (Desktop


Publishing)?
Word processing software is used to create and manipulate a
text document, such as a resume or report. Software programs
include Microsoft Word, Pages, Writer and WordPerfect. Desktop
publishing (DTP) software is used to create page layouts of
documents for publication in print or online.

6. Can a sound card be a part of the operating system? Give reasons.


No. An audio card is a technical part of the PC
itself, with which programs work. In the operating
system, a special component of the OS, the Audio
Driver, is responsible for this.

7. Can an e-mail client program be a part of the operating system? Give


reasons
Not. Email is part of a separate software. It is neither a
built-in program nor a built-in system component.
8.Can an OCR (Optical Character Recognition) application be a part of office
software suite? Give reasons.
Optical character recognition is not a built-in OS component,
and is installed directly by special UTILITIES

9. Can a text editor be a part of the operating system? Give reasons.


Yes. Because in modern operating systems, the simplest text
editors are installed by default, which means they are part of
the operating system. But there are also text editors that are
not part of the OS and need to be purchased separately.

10. List at least four kinds of applications that are considered standard parts
of office software suites today.
 Word Processing Software.
 Graphics Software.
 Spreadsheet Software.
 Presentation Software.
 Web Browsers.

11. Give a specific example of how OCR (Optical Character Recognition)


software can be used.
Examples of OCR are text extraction tools, PDF to . txt
converters, and Google's image search function.

12. Explain the meaning and describe the structure of relational databases.
A relational database is a collection of information that
organizes data in predefined relationships where data is
stored in one or more tables (or "relations") of columns and
rows, making it easy to see and understand how different data
structures relate to each other

13. Describe client-server databases and compare them with desktop


databases.

14. Microsoft Outlook is an example of a personal information manager. List


at least three main functions of this kind of programs.
Though primarily an email client, Outlook also includes such
functions as calendaring, task managing, contact managing,
note-taking, journal logging and web browsing.
15. Geographic information system is a combination of two applications.
Which ones? What are they used for?
A geographic information system (GIS) is a type of database
containing geographic data (that is, descriptions of phenomena
for which location is relevant), combined with software tools
for managing, analyzing, and visualizing those data.

16. What is a macro and how can we create it?


If you have tasks in Microsoft Excel that you do repeatedly,
you can record a macro to automate those tasks. A macro is an
action or a set of actions that you can run as many times as
you want. When you create a macro, you are recording your
mouse clicks and keystrokes.

17. What is the difference between a bitmap and a vector graphics editor?
Rather than a grid of pixels, a vector graphic consists of
shapes, curves, lines, and text which together make a
picture. While a bitmap image contains information about the
color of each pixel, a vector graphic contains instructions
about where to place each of the components.

18. Explain the principle of mail merge and give at least one example of its
use in practice. Which applications are combined in this tool?
Mail merge lets you create a batch of documents that are
personalized for each recipient. For example, a form letter
might be personalized to address each recipient by name. A
data source, like a list, spreadsheet, or database, is
associated with the document

19. Which hardware and software components are necessary to transform


text documents into electronic form editable by a word processor?

20. Explain the main functions of the computer’s operating system in relation
to end user.
(An operating system has three main functions: (1) manage the
computer's resources, such as the central processing unit,
memory, disk drives, and printers, (2) establish a user
interface, and (3) execute and provide services for
applications software)

21. Explain the main functions of the operating system in relation to end user
applications.
(Functions of an operating system. An operating system
provides three essential capabilities: It offers a UI through
a CLI or GUI; it launches and manages the application
execution; and it identifies and exposes system hardware
resources to those applications -- typically, through a
standardized API. UI)

22. Explain the main functions of the operating system in relation to


computer hardware.
An operating system is responsible for identifying,
configuring, and providing applications with common access to
underlying computer hardware devices

23. What is the difference between traditional applications installed on PC,


portable applications and web-based applications?
Simply speaking, a desktop application is a computer program
that runs locally on a computer device, such as desktop or
laptop computer, in contrast to a web application, which is
delivered to a local device over the Internet from a remote
server.

24. Describe the principle and advantages of cloud computing.


On the other hand, cloud computing substantiates the use of multiple
resources which includes computing resources in order to serve
unified service to the end-user
Cloud computing operates on a similar principle as web-based email
clients, allowing users to access all of the features and files of
the system without having to keep the bulk of that system on their
own computers.

4. COMPUTER SOFTWARE DEVELOPMENT AND DISTRIBUTION


1.Describe the principle and economic importance of backward compatibility
and give one particular example of its utilization in the software area.
Backward compatible (also known as downward compatible or
backward compatibility) refers to a hardware or software
system that can successfully use interfaces and data from
earlier versions of the system or with other systems. For
example, PlayStation 3 (PS3) is backward compatible with
PlayStation 1 (PS1) and most PlayStation 2 (PS2) systems.

2. How is OEM (Original Equipment Manufacturer) software sold, and what


are the advantages of this type of selling for the manufacturer, distributor
and software user?
It's cost-effective – This is perhaps the main benefit of OEM
software. By partnering with OEM, you'll reduce your
development costs as your company won't need to manufacture
products in its own factories. Instead, you simply integrate
the OEM software into your product and sell it under your own
brand name

3. What are the advantages of software with open source code for users?
is very often free or cheaper than proprietary software.
Therefore, you save on licensing and maintenance fees.
Moreover, most open-source solutions take less hardware power
to carry out their tasks. In other words, you can also save on
hardware costs!

4. Who and what is a demo version for? How is it different from the full
version? Why are there demo versions only for commercially distributed
software (proprietary software)?
Demo Version means a non-functional version of the Software
that is used for the purpose of demonstrating the look and
feel of the Software. Proprietary refers to software that is
owned by the individual or company who published it. Open
source refers to software that is available for anyone to
access or change the code.

5. What is the purpose of the beta version of a software product?


Beta testing is an opportunity for real users to use a product
in a production environment to uncover any bugs or issues
before a general release

6. What is the purpose of a demo version of a software product?


(The primary purpose of the demo is to close a deal)

7. What is the difference between update and upgrade?


Basically, think of an upgrade as a less frequent, more
drastic change to the software you are currently using. A
software update, on the other hand, can be more frequent, fix
little bugs or make small tweaks, and is often used to repair
the product.

8. What is the difference between shareware, freeware, open-source and


public domain software?
Freeware is closed source. Shareware software is a software
that are freely distributed to users on trial basis

9. A software company announced a cross upgrade of its antivirus program


valid till the end of the year. Describe what the company is offering its
customers.

10. What is the same and what is different about particular distributions of
the Linux operating system.
The first major difference between various Linux distributions
is their target audiences and systems. For example, some
distributions are customized for desktop systems, some
distributions are customized for server systems, and some
distributions are customized for old machines, and so on.

11. You have got a really interesting program for video processing distributed
as shareware. You can legally, without the author’s permission, a. use it for
home-made video processing, b. change it a little and sell it to your
company’s clients? Explain.

12. You have got an interesting graphics program distributed as shareware.


You can legally, without the author’s permission, a. use it for creating
promotion campaigns for your clients, b. copy for a friend. Explain.

13. In each of the following sentences one word is wrong. Find it and replace
it with the right word. a. A program for optical character recognition (OCR) is
a standard part of software equipment of higher quality models.
b. Freeware is software able to be freely modified and used for free. c.
Shareware is software which can be distributed and used for free. d. By
scanning any document using the scanner we can get an electronic file which
can be directly edited by a word processor.

14. Decide whether the following statements are true or false. a. Shareware
is software that enables users to share common technical and programming
resources with other users on the local computer network. b. Freeware is a
service that enables free on-line communication between Internet users. c.
Public domain is a public data and communication network.

5. COMPUTER NETWORKS

1. What is a web server and how can it be used in an organization?


A web server is software and hardware that uses HTTP
(Hypertext Transfer Protocol) and other protocols to respond
to client requests made over the World Wide Web.

2. Which Internet service is the most suitable for: a. distribution of up-to-


date pricelists for regular customers? b. complex presentation about
company products? c. interactive communication of various users? d.
transfer of large multimedia files?
3. What is a network protocol and what is its role in computer networks?
A network protocol is an established set of rules that
determine how data is transmitted between different devices in
the same network. Essentially, it allows connected devices to
communicate with each other, regardless of any differences in
their internal processes, structure or design.

4. Describe a specific example of a service using client-server architecture.


Banking application: When a bank customer accesses banking
services with a web browser (the client), client initiates a
request to the webserver. Customer's login credentials can be
stored in a database, and webserver accesses database server
as a client.

5. Describe two main types of Internet search on the World Wide Web and
give at least one specific example (address) for each type.

6. Give at least two examples to illustrate the argument: Computer networks


allow sharing of resources by users.

7. List at least two specific examples to illustrate the argument: Computer


networks allow communication of users.

8. Today we can see many devices (in addition to computers) connected to


the Internet. Present at least one of them and explain the usefulness of
Internet connection for this device.

9. Explain the client-server LAN architecture.


The client-server architecture refers to a system that hosts,
delivers, and manages most of the resources and services that
the client requests

10. Explain peer-to-peer LAN architecture.


A peer-to-peer (P2P) architecture consists of a decentralized
network of peers - nodes that are both clients and servers.

11. What is the difference between LAN and WAN?


A LAN, abbreviated from Local Area Network, is a network that
covers a small geographical area such as homes, offices, and
groups of buildings. Whereas a WAN, abbreviated from Wide Area
Network, is a network that covers larger geographical areas
that can span the globe

12. You found “www.harabura.sk” on a partner’s business card. Explain its


meaning and the meaning of the individual parts of this code.

13. You found “[email protected]” on a partner’s business card. Explain its


meaning and the meaning of the individual parts of this code.

14. Explain the difference between Internet and World Wide Web.
The world wide web, or web for short, are the pages you see
when you're at a device and you're online. But the internet is
the network of connected computers that the web works on, as
well as what emails and files travel across. Think of the
internet as the roads that connect towns and cities together.

15. Explain the meaning and the differences between the terms “web site”,
“web page” and “home page”.
The webpage is a single document on the web using a unique
URL, while a website is a collection of multiple webpages in
which information on a related topic or another subject is
linked together under the same domain address.

16. Explain the meaning and the differences between the terms “HTML
(Hypertext Markup Language)” and “XML (Extensible Markup Language)”.
XML stands for eXtensible Markup Language and is used to
transport and save data. The focus here is not on displaying
or the appearance of the data. On the other hand, HTML stands
for Hypertext Markup Language. This computer language helps to
make the data more interactive with multiple formatting
features.

17. What are the differences and what are the common features shared by
the Internet and intranet?
The main difference between the intranet and the internet is
that the internet is a global collection of computer networks
known as the world wide web. On the other hand, an intranet is
an online network only company employees can access.

18. What is the difference between the client and the server when it comes
to the World Wide Web?
A server host runs one or more server programs, which share
their resources with clients. A client usually does not share
any of its resources, but it requests content or service from
a server.

19. What is the difference between the client and the server when it comes
to e-mail?
Email servers are hardware, and there are multiple of them
worldwide in data centres—email servers transport and store
emails that are being sent. An email client is a software
program that you download and install on your computer (or
mobile device) to send and receive emails directly on your
desktop.

20. What is the difference between the client and the server when it comes
to ftp?
An FTP client provides the dual-direction transfer of data and
files between two computers over a TCP network or an Internet
connection. An FTP client works on a client/server
architecture, where the host computer is the client and the
remote FTP server is the central server.

21. What is the difference between hypertext and (traditional) text?


All traditional text, whether in printed form or in computer
files, is sequential, meaning that there is a single linear
sequence defining the order in which the text is to be
read.Hypertext is nonsequential; there is no single order that
determines the sequence in which the text is to be read.

22. What is the difference between ftp and telnet (or terminal service)?
Telnet enables a client user to access the resources of a
server remotely whereas FTP is used for copying a file from
one to another machine. The Telnet protocol uses port number
23 for the connection. On the contrary, FTP uses port 21 and
20 for control and data connections respectively.

23. What is spam and how can we avoid it?


Spam is another word for junk mail – those emails that you
didn't ask to get, and don't want to get. You'll have seen
them when you log on – adverts for dubious medical products,
dating sites, lotteries and the like

24. List at least four advantages of e-mail compared to traditional mail.


Emails are delivered extremely fast when compared to
traditional post. Emails can be sent 24 hours a day, 365 days
a year. Webmail means emails can be sent and received from any
computer, anywhere in the world, that has an internet
connection . Cheap - when using broadband , each email sent is
effectively free
25. Why is it useful to have a combination of ftp and web server (for the
company’s web presentation)?
FTP is used for file transfers between one system and another,
and it has several common use cases, including the following:
Backup. FTP can be used by backup services or individual users
to backup data from one location to a secured backup server
running FTP services.

26. How can you use a smart phone for Internet access?
You can use your smartphone to access an internet connection
for your laptop, for example. You simply have to set up Wi-Fi
tethering, or your “personal hotspot,” on any Android or iOS
phone

27. Which program do you need for: a. integrated access to the majority of
Internet services? b. reading and sending e-mails?
28. What is the difference between static and dynamic webpages? Which of
them prevail?
A static website is one with stable content, where every user
sees the exact same thing on each individual page. On the
other hand, a dynamic website is one where content is pulled
on-the-fly, allowing its content to change with the user. In
this article, we're going to make sense of the whole static vs

29. What is the difference between catalog and fulltext Internet search?

30. Explain what is the banner and where we can find it.
Depending on how it's used, a banner is either a graphic image
that announces the name or identity of a site (and often is
spread across the width of the Web page) or is an advertising
imageBanners can be found plastered behind a window screen, as
billboards, atop skyscrapers, or towed by airplanes or blimps.

6. INFORMATION SECURITY
1. Explain how to ensure permanent efficiency of antivirus software in your
PC.
An alternative approach for evaluating antivirus software
performance is through the use of an on-demand detection tools
that can detect both the presence of threats on the scanned
computer and the availability of antivirus software.

2. Explain the term “computer virus” and list at least two main functions of
antivirus software.
3. Explain the term “computer virus” and list at least two ways how personal
computers can be infiltrated.
4. Describe macroviruses and list at least two precautionary measures
against them.
In terms of cybersecurity, a macro virus is a kind of virus
that's written in macro, a programming language rooted inside
software applications like Microsoft Office. This programming
language is handy because it allows users to automate tasks
into a few keystrokes and enhance workflow

5. Describe standard viruses (targeting executable files) and list at least two
precautionary measures against them.

6. Describe two main types of antivirus programs.


 Malware signature antivirus. Malware, or malicious software,
installs viruses and spyware on your computer or device
without your knowledge. ...
 System monitoring antivirus. This is where system monitoring
antivirus software comes into play

7. Explain the main advantage and disadvantage of antivirus software using


heuristic analysis compared with an antivirus using signaturebased detection.
 Advantages of Antivirus. Protection From Different Kinds of
Viruses. Protection From Spyware. Real-Time Protection.
Firewall Included. Ad Blocker Included. ...
 Disadvantages of Antivirus. Slows Down Your System. Regular
Updates Needed. Gated Protection. Complicated Customer
Support. No Absolute Protection.

8. Explain how we can protect data transmitted over public networks (like
the Internet) to prevent it from being read or changed by unauthorized
persons.
You can use a VPN layer between the users and the system or
implement an SSL/TLS to encrypt network traffic. Inside the
system, communications can be secured using IPsec, SSL/TLS, or
some other VPN technology.

9. Explain how we can protect data stored on our hard disk drive to prevent
its loss caused by technical failure or malfunction.
To prevent hard drive malfunctions, be sure to work with your
device appropriately and keep your computer away from
excessive dust. You can also ensure that a random malfunction
doesn't destroy your data by regularly backing up your hard
drive on an external drive or cloud server.

10. Explain how we can protect data in a local area network connected to the
Internet against unauthorized access or attacks from the Internet.
Windows and macOS have built-in firewalls – software designed
to create a barrier between your information and the outside
world. Firewalls prevent unauthorized access to your business
network and alert you to any intrusion attempts. Make sure the
firewall is enabled before you go online.

11. Explain how we can protect open documents against damage in case of a
power cut.

12. Explain the difference between data compression and data encryption.
For each action give at least one specific example of practical use.
Data compression is done with the intension of decreasing the
size of data, while encryption is done to keep the data secret
from third parties. Encrypted data cannot be decrypted easily.
It requires the possession of a special piece of information
called a key.

13. How can we protect data in a local area network against unauthorized
access by network users?
A firewall is designed to block unauthorized access to
computers and networks. In essence, a firewall is a set of
rules that controls network traffic — incoming and outgoing.

You might also like