January 17, 2013

PTI Assignment Chapter 15


True/False
1. True
2. False
3. True
4. True
5. False
6. False
7. True
8. True
9. True
10. False

Multiple Choice
1. A     
2. C
3. C
4. A
5. D
6. B
7. D
8. B

Matching
1. E
2. D
3. J
4. G
5. H
6. B
7. F
8. I
9. A
10. C

Short Answer
1.- Cost
This is pretty obvious, and even more important with our economy fluctuating everyday. Trade schools can cost only about an 1/8 of the price for a four year degree.
-A Job Waiting For You When You Graduate
Vocational schools give you the exact skills you need for the job market after you graduate.
-Hands-On Training
Tech schools teach you what you need to know…not all the extra stuff like at other colleges.
-Job Security
Most of the programs offered at trade schools are for careers that need to be done in person, by the people who are closest.
- A Successful Future
After graduating, you will always have a career and you will be making good money, without having to pay off college debt.

Factors should you consider when selecting a trade school :
- Find out of the hours of instruction meet or exceed the minimum requirements to get a job (or state-approved certification, if this is the main criteria needed to get a job).
- Make sure they are current with industry standards.
- Get feedback from other sources.
- Compare the price of tuition.
- Make sure this is what you want to do.

2.-The benefits of professional growth and continuing education is keeping up to date information about new products and services in the computer industry , because nowdays technology changes so rapidly.
-One way to stay informed is to participate in professional growth and continuing education activities such as workshops, seminars, conferences, conventions, and trade shows. Another way to keep up to date about industry trends and technologies is to read one or more computer industry publications regularly or visit news, blogs, wikis, or technical Web sites.

3. Consider your career path during the long term. Then, assess your background knowledge and experience. Finally, research certifications to find those that best match your needs.
Four options for preparing for certification are
1) Self-study: Flexible self-study programs help professionals prepare for certification at their own pace and supplement other training methods.
2) Online training classes: Online training allows students to set their own pace in an interactive environment and combines the technological advantages of computer-based training with the connectivity of the Internet or a company’s intranet.
3) Instructor-led training: Instructor-led training is available in a variety of forms, including seminars, which typically are held for several days during a week; boot camps, which immerse students in intensive course work for up to two weeks; and academicstyle classes, which span a period of several weeks or months. Some sponsors hold their own training sessions and also authorize independent training centers.
4) Web resources: The certification sponsor’s Web site generally contains descriptions of the available certifications, with FAQs and links to authorized training and testing centers.

4. The focus of programmer/developer certification is to verify whether a person is capable as a programmer or a developer. Other types of certification are beneficial to those interested in programmer/developer certification are Networking and Web design certification.

-People in the following jobs may be interested in a programmer/developer certification:
• Java programmers
• Mobile application developers
• Oracle database managers
• Programming consultants
• SQL programmers
• Web software developers
• XML developers

5. Hardware certification is the process through which computer hardware is tested to ensure it is compatible with specific software packages, and operates as intended in critical situations.

-People in the following careers may be interested in hardware certification:
• Cable installation technicians
• Computer repair technicians
• Corporate trainers
• Help desk specialists
• IT consultants
• System engineers and administrators

PTI Assignment Chapter 14


Rickvian Aldi / 01PBT / 1601253441

True/False

1. True
2. False
3. False
4. True
5. False
6. False
7. True
8. True
9. True
10. True

Multiple Choice

1. C     
2. B
3. A
4. B
5. A
6. D
7. A
8. D

Matching

1. H     
2. F
3. B
4. E
5. D
6. G
7. A
8. J
9. I
10. C

Short Answer

1.- There are many specific duties that will vary widely depending on what type of activity the manager is responsible for. But in general terms, managers are usually responsible to ensure that the people assigned to them are doing their tasks correctly. The definition of “correctly” is where there is a good degree of variation from job to job, but it usually involves managing a budget for the people assigned to the manager, ensuring that the tasks of those people are completed on whatever schedule has been established, working through personnel issues like training if necessary, salary issues, bad performance, etc.
-Four activities managers perform to coordinate resources are planning, organizing, leading, and controlling.

2. A content management system (CMS) is an information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.
They are based on the user’s actions, the content management system processes content, categorizes the content, indexes the content so that it later can be searched, and stores the content.

3. Types of virtualization :
1) Server virtualization provides the capability to divide a physical server logically into many virtual servers.
2) Storage virtualization provides the capability to create a single logical storage device from many physical storage devices.

Grid computing is where more than one computer coordinates to solve a problem together. Often used for problems involving a lot of number crunching, which can be easily parallelisable.
Cloud computing is where an application doesn’t access resources it requires directly, rather it accesses them through something like a service. So instead of talking to a specific hard drive for storage, and a specific CPU for computation, etc. it talks to some service that provides these resources. The service then maps any requests for resources to its physical resources, in order to provide for the application. Usually the service has access to a large amount of physical resources, and can dynamically allocate them as they are needed.
As the demand for computing resources increases, companies may find that using outside computing resources is more economical than building new computing capacity internally. Cloud and grid com puting are two new technologies that provide flexible and massive online computing power.

4. Five types of e-commerce are Business to Business, Business to Consumer, Consumer to Business, Consumer to Consumer, and Mobile E-commerce

-Business to Business
Business to business, or B2B, e-commerce consists of online transactions between companies, with no involvement of either company’s retail consumers. For example, an automobile manufacturer that requires 50,000 lug nuts orders them through the vendor’s website. Both the automobile manufacturer and the lug nut manufacturer sell their products to individual consumers through other outlets, but the automobile manufacturer’s order excludes both companies’ retail consumers. B2B e-commerce reduces errors while enhancing efficiency.

-Business to Consumer
The type of e-commerce most easily recognized by most people, business to consumer (B2C) e-commerce consists of online transactions between consumers and online retailers or service providers. B2C typically operates in one of two ways. In one approach, the company operates a website where customers can buy the products or services directly from the company. The other model consists of a company maintaining a website that third-party companies use to sell products or services.

-Consumer to Business
A classic example of consumer to business (C2B) e-commerce is a person taking bids from different construction companies to build a home. The Internet opens the door for a much wider variety of C2B transactions. C2B e-commerce typically means that a person needs a professional to accomplish a task. The consumer posts a job description to a forum or website dedicated to C2B transactions, and solicits bids from businesses. After selecting a bidder, the consumer typically pays the business through an electronic medium. Websites that cater to C2B transactions frequently offer or require the consumer to use the site’s secure financial services.

5. The location of backup data, supplies, and equipment, The personnel responsible for gathering backup resources and transporting them to the alternate computer facility, and a schedule indicating the order in which, and approximate time by which, each application should be up and running.
For a backup plan to be successful, the organization must back up all critical resources. Also, additional people, including possibly nonemployees, must be trained in the backup and recovery procedures because organization personnel could be injured in a disaster.

PTI Assignment Chapter 13

Rickvian Aldi / 01PBT / 1601253441

True/False

1. True
2. True
3. True
4. True
5. True
6. False
7. False
8. True
9. False
10. False

Multiple Choice

1. B     
2. C     
3. C     
4. A     
5. A
6. C
7. D
8. B

Matching

1. G
2. D
3. J
4. I      
5. C     
6. E
7. A
8. H
9. B
10.F

Short Answer
1. A compiler converts the entire program into executable code before running, when running the program only the executable version of the code is running. An interpreter converts the code during run time, it converts the code 1 line at a time at the time that it is running.

Advantages of interpreter are :
- Interpreters are useful for program development when execution speed is not important. As the interpreter is in command of the execution process debugging features can be build in.
- Debugging is easier since the interpreter stops when it encounters an error. If an error is deducted there is no need to re translate the whole program.
- There is no lengthy “compile time”, i.e. you do not have to wait between writing a program and running it, for it to compile. As soon as you have written a program, you can run it.

Disadvantages if interpreter is Interpreters normally translate and execute programs line by line, converting each program statement into a sequence of machine code instructions and executing these instructions without retaining the translated version.

2. -Major benefit of OOP is the ability to reuse and modify existing objects.
-RAD (rapid application development) is a method of developing software, in which a programmer writes and implements a program in segments instead of waiting until the entire program is completed. Users begin working with sections of the program as they are completed.

3. An IDE (integrated development environment) includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.

Describe the programming languages in the Visual Studio suite.
- Visual Basic is a programming language that allows programmers easily to build complex task-oriented object-based pro grams.
- Visual C++ is a programming language based on C++. Not only is Visual C++ a powerful object-oriented pro gramming language, it enables program mers to write Windows, Windows Mobile, and .NET applications quickly and effi ciently.
- Visual C# is a programming language that combines programming elements of C++ with an easier, rapid development environment.

4.- XML separates the Web page content from its format, allowing the Web browser to display the contents of a Web page in a form appropriate for the display device. For example, a smart phone, a PDA, and a notebook computer all could display the same XML page or use different formats or sections of the XML page.

Describe two applications of XML :
1) RSS Rich Site Summary is a family of web feed formats used to publish frequently updated works—such as blog entries, news headlines, audio, and video—in a standardized format.
2) The Atom Syndication Format is an XML language used for web feeds, while the Atom Publishing Protocol (AtomPub or APP) is a simple HTTP-based protocol for creating and updating web resources.

5. -Review the program code and review all the documentation.
-Proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

PTI Assignment Chapter 12


Rickvian Aldi / 01PBT / 1601253441

True/False
1. True
2. True
3. False
4. False           
5. False           
6. True
7. False
8. False
9. True
10. True
11. False

Multiple choice
1. A
2. B
3. C
4. A     
5. C
6. D
7. A
8. D

Matching

1. H     
2. D     
3. A     
4. B     
5. I      
6. G
7. F
8. J
9. C
10. K

Short Answer

1.  System development is a set of activities used to
build an information system.

Five phases of the system development life cycle :
1) Planning, Establishes a high-level view of the intended project and determines its goals.
2) Analysis, Refines project goals into defined functions and operation of the intended application. Analyzes end-user information needs.
3) Design, Describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudocode and other documentation.
4) Implementation to construct, or build, the new or modified system and then deliver it to the users.
5) Operation, Support, and Security, perform maintenance activities, monitor system performance, assess system security.

2. Four types of feasibility are:
- Operational feasibility measures how well the proposed information system will work.
- Schedule feasibility measures whether the established deadlines for the project are reasonable.
- Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
- Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.

Six techniques used to gather data and information are:
-Review Documentation, -Observe
-Survey
-Interview
-JAD Sessions (Joint-application design sessions).
-Research.

3. Unified Modeling Language is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.

Difference of use case diagram and class diagram are that an use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program.  A class diagram graphically shows classes and subclasses in a system. On a class diagram, objects are grouped into classes.

4. The three major activities of the operation, support, and security phase are Perform maintenance activities, Monitor system performance, and Assess system security.

Type of maintenance activity.
1) Corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
2) Adaptive maintenance is the process of including new features or capabilities in an information system.
3) Performance monitoring is the process to determine whether the system is inefficient or unstable at any point.
4) Perfective maintenance is the process to investigate solutions to make the information system more efficient and reliable.

5. Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations.

Three things should a computer security plan do  :
1) Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and
supplies.
2) Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
3) For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.