Role of Information Technologies in Business
Role of Information Technologies in Business
4) What happens with data in RAM after switching off the PC?
If you turn off your PC, the information in your RAM is gone,
but the data saved in your long-term storage (SSD or HDD) is
saved.
5) What happens with data in ROM after switching off the PC?
ROM stands for READ ONLY MEMORY and is non-volatile memory.
When the computer is shut down the data remains stored.
6) Which memory stores the basic data about PC configurations and setup?
The BIOS is stored permanently on your computer's ROM, rather than
its hard drive, since your motherboard cannot access the hard drive
until it has loaded the settings from the BIOS.
8. List at least two important parameters of the hard disk drive and explain
the units in which they are measured.
The most common parameter of hard HDD is its already mentioned
capacity. The typical capacity today varies around 1TB.
Another important parameter is physical rotational speed
measured in revolutions per minute
9. What is the purpose of the hard disk drive in a PC? Is this hardware
component absolutely necessary for the functioning of the PC?
HDDs are used either as the primary or secondary storage
device in a computer.
10. Which memory is the most appropriate for backup of large documents
(size of several GB)?
(НD)
13. What is the main difference between optical discs CDs, DVDs and BR?
CDs can store up to 700 MB (megabytes) of data, and DVDs can
store up to 8.4 GB (gigabytes) of data. Blu-ray discs, which
are the newest type of optical media, can store up to 50 GB of
data.
14. What is the main difference between magnetic tape and magnetic disk?
In magnetic tape for data recording, magnetic material is
coated on only one side of the tape. While in magnetic disk
for data recording, magnetic material is coated on both side
of the platters.
15. Explain the main difference between backing up and archiving data.
A backup is a copy of your current data that you use to
restore original data if it's ever damaged. An archive is
historical data you must keep long-term retention reasons,
such as complianc)
16. List at least four hardware components of the PC that influence the
quality of image we can see on the monitor.
CPU.
GPU.
RAM
Storage
Monitor
19. What are the advantages and disadvantages of inkjet versus laser
printers?
Laser printers can print much faster than inkjet printers can.
Most are equipped with high-capacity paper trays, so they can
print more pages at a given time.
It is expensive to replace ink cart cartridges.
20. List at least two important parameters of a printer and explain them.
the possibility of color printing,
print speed (number of pages per minute)
21. Which kind of printer is suitable for household (few printed pages per
week) and which for a firm (few hundred printed pages per week)?
22. Explain the scanner’s purpose and add at least three parameters.
It is designed to transfer data from paper into electronic form
24. What is the purpose of the sound card in a PC? Is this hardware
component absolutely necessary for the functioning of the PC?
A sound card (also referred to as an audio card) is a
peripheral device that attaches to the ISA or PCI slot on a
motherboard to enable the computer to input, process, and
deliver sound necessary one if you want to hear sound from
your PC on wired headphones or speakers
25. Explain the similarities and differences between a modem and network
card.
A network interface card or NIC is used to connect to a
digital network, While modem takes this digital traffic and
changes it to a different format to talk.
26. What are the two main functions of UPS connected to the desktop
computer
surge protection and battery backup
3. COMPUTER SOFTWARE
1. What kind of program and which specific application is suitable for
processing information about customers and suppliers and carried business
transactions of the company?
At the most basic level, CRM software consolidates customer
information and documents it into a single CRM database so
business users can more easily access and manage it
10. List at least four kinds of applications that are considered standard parts
of office software suites today.
Word Processing Software.
Graphics Software.
Spreadsheet Software.
Presentation Software.
Web Browsers.
12. Explain the meaning and describe the structure of relational databases.
A relational database is a collection of information that
organizes data in predefined relationships where data is
stored in one or more tables (or "relations") of columns and
rows, making it easy to see and understand how different data
structures relate to each other
17. What is the difference between a bitmap and a vector graphics editor?
Rather than a grid of pixels, a vector graphic consists of
shapes, curves, lines, and text which together make a
picture. While a bitmap image contains information about the
color of each pixel, a vector graphic contains instructions
about where to place each of the components.
18. Explain the principle of mail merge and give at least one example of its
use in practice. Which applications are combined in this tool?
Mail merge lets you create a batch of documents that are
personalized for each recipient. For example, a form letter
might be personalized to address each recipient by name. A
data source, like a list, spreadsheet, or database, is
associated with the document
20. Explain the main functions of the computer’s operating system in relation
to end user.
(An operating system has three main functions: (1) manage the
computer's resources, such as the central processing unit,
memory, disk drives, and printers, (2) establish a user
interface, and (3) execute and provide services for
applications software)
21. Explain the main functions of the operating system in relation to end user
applications.
(Functions of an operating system. An operating system
provides three essential capabilities: It offers a UI through
a CLI or GUI; it launches and manages the application
execution; and it identifies and exposes system hardware
resources to those applications -- typically, through a
standardized API. UI)
3. What are the advantages of software with open source code for users?
is very often free or cheaper than proprietary software.
Therefore, you save on licensing and maintenance fees.
Moreover, most open-source solutions take less hardware power
to carry out their tasks. In other words, you can also save on
hardware costs!
4. Who and what is a demo version for? How is it different from the full
version? Why are there demo versions only for commercially distributed
software (proprietary software)?
Demo Version means a non-functional version of the Software
that is used for the purpose of demonstrating the look and
feel of the Software. Proprietary refers to software that is
owned by the individual or company who published it. Open
source refers to software that is available for anyone to
access or change the code.
10. What is the same and what is different about particular distributions of
the Linux operating system.
The first major difference between various Linux distributions
is their target audiences and systems. For example, some
distributions are customized for desktop systems, some
distributions are customized for server systems, and some
distributions are customized for old machines, and so on.
11. You have got a really interesting program for video processing distributed
as shareware. You can legally, without the author’s permission, a. use it for
home-made video processing, b. change it a little and sell it to your
company’s clients? Explain.
13. In each of the following sentences one word is wrong. Find it and replace
it with the right word. a. A program for optical character recognition (OCR) is
a standard part of software equipment of higher quality models.
b. Freeware is software able to be freely modified and used for free. c.
Shareware is software which can be distributed and used for free. d. By
scanning any document using the scanner we can get an electronic file which
can be directly edited by a word processor.
14. Decide whether the following statements are true or false. a. Shareware
is software that enables users to share common technical and programming
resources with other users on the local computer network. b. Freeware is a
service that enables free on-line communication between Internet users. c.
Public domain is a public data and communication network.
5. COMPUTER NETWORKS
5. Describe two main types of Internet search on the World Wide Web and
give at least one specific example (address) for each type.
14. Explain the difference between Internet and World Wide Web.
The world wide web, or web for short, are the pages you see
when you're at a device and you're online. But the internet is
the network of connected computers that the web works on, as
well as what emails and files travel across. Think of the
internet as the roads that connect towns and cities together.
15. Explain the meaning and the differences between the terms “web site”,
“web page” and “home page”.
The webpage is a single document on the web using a unique
URL, while a website is a collection of multiple webpages in
which information on a related topic or another subject is
linked together under the same domain address.
16. Explain the meaning and the differences between the terms “HTML
(Hypertext Markup Language)” and “XML (Extensible Markup Language)”.
XML stands for eXtensible Markup Language and is used to
transport and save data. The focus here is not on displaying
or the appearance of the data. On the other hand, HTML stands
for Hypertext Markup Language. This computer language helps to
make the data more interactive with multiple formatting
features.
17. What are the differences and what are the common features shared by
the Internet and intranet?
The main difference between the intranet and the internet is
that the internet is a global collection of computer networks
known as the world wide web. On the other hand, an intranet is
an online network only company employees can access.
18. What is the difference between the client and the server when it comes
to the World Wide Web?
A server host runs one or more server programs, which share
their resources with clients. A client usually does not share
any of its resources, but it requests content or service from
a server.
19. What is the difference between the client and the server when it comes
to e-mail?
Email servers are hardware, and there are multiple of them
worldwide in data centres—email servers transport and store
emails that are being sent. An email client is a software
program that you download and install on your computer (or
mobile device) to send and receive emails directly on your
desktop.
20. What is the difference between the client and the server when it comes
to ftp?
An FTP client provides the dual-direction transfer of data and
files between two computers over a TCP network or an Internet
connection. An FTP client works on a client/server
architecture, where the host computer is the client and the
remote FTP server is the central server.
22. What is the difference between ftp and telnet (or terminal service)?
Telnet enables a client user to access the resources of a
server remotely whereas FTP is used for copying a file from
one to another machine. The Telnet protocol uses port number
23 for the connection. On the contrary, FTP uses port 21 and
20 for control and data connections respectively.
26. How can you use a smart phone for Internet access?
You can use your smartphone to access an internet connection
for your laptop, for example. You simply have to set up Wi-Fi
tethering, or your “personal hotspot,” on any Android or iOS
phone
27. Which program do you need for: a. integrated access to the majority of
Internet services? b. reading and sending e-mails?
28. What is the difference between static and dynamic webpages? Which of
them prevail?
A static website is one with stable content, where every user
sees the exact same thing on each individual page. On the
other hand, a dynamic website is one where content is pulled
on-the-fly, allowing its content to change with the user. In
this article, we're going to make sense of the whole static vs
29. What is the difference between catalog and fulltext Internet search?
30. Explain what is the banner and where we can find it.
Depending on how it's used, a banner is either a graphic image
that announces the name or identity of a site (and often is
spread across the width of the Web page) or is an advertising
imageBanners can be found plastered behind a window screen, as
billboards, atop skyscrapers, or towed by airplanes or blimps.
6. INFORMATION SECURITY
1. Explain how to ensure permanent efficiency of antivirus software in your
PC.
An alternative approach for evaluating antivirus software
performance is through the use of an on-demand detection tools
that can detect both the presence of threats on the scanned
computer and the availability of antivirus software.
2. Explain the term “computer virus” and list at least two main functions of
antivirus software.
3. Explain the term “computer virus” and list at least two ways how personal
computers can be infiltrated.
4. Describe macroviruses and list at least two precautionary measures
against them.
In terms of cybersecurity, a macro virus is a kind of virus
that's written in macro, a programming language rooted inside
software applications like Microsoft Office. This programming
language is handy because it allows users to automate tasks
into a few keystrokes and enhance workflow
5. Describe standard viruses (targeting executable files) and list at least two
precautionary measures against them.
8. Explain how we can protect data transmitted over public networks (like
the Internet) to prevent it from being read or changed by unauthorized
persons.
You can use a VPN layer between the users and the system or
implement an SSL/TLS to encrypt network traffic. Inside the
system, communications can be secured using IPsec, SSL/TLS, or
some other VPN technology.
9. Explain how we can protect data stored on our hard disk drive to prevent
its loss caused by technical failure or malfunction.
To prevent hard drive malfunctions, be sure to work with your
device appropriately and keep your computer away from
excessive dust. You can also ensure that a random malfunction
doesn't destroy your data by regularly backing up your hard
drive on an external drive or cloud server.
10. Explain how we can protect data in a local area network connected to the
Internet against unauthorized access or attacks from the Internet.
Windows and macOS have built-in firewalls – software designed
to create a barrier between your information and the outside
world. Firewalls prevent unauthorized access to your business
network and alert you to any intrusion attempts. Make sure the
firewall is enabled before you go online.
11. Explain how we can protect open documents against damage in case of a
power cut.
12. Explain the difference between data compression and data encryption.
For each action give at least one specific example of practical use.
Data compression is done with the intension of decreasing the
size of data, while encryption is done to keep the data secret
from third parties. Encrypted data cannot be decrypted easily.
It requires the possession of a special piece of information
called a key.
13. How can we protect data in a local area network against unauthorized
access by network users?
A firewall is designed to block unauthorized access to
computers and networks. In essence, a firewall is a set of
rules that controls network traffic — incoming and outgoing.