0% found this document useful (0 votes)
10 views7 pages

Business Information Systems Assign 1 - Complete

Uploaded by

ronell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

Business Information Systems Assign 1 - Complete

Uploaded by

ronell
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Lyceum

BIS2245/2020/2/A1

Business Information Systems for October


2020 Examination

Assignment 1

Student Name: Ronell Kristin


Pauchcowrie
Student No: 156859

RK Pauchcowrie 156859 7805050240089


Question One
Name three types of operating systems commonly found on tablets smart phones:
 Android OS
 Iphone OS
 Blackberry OS

Question Two
Describe phishing as a threat to users on the internet
Phishing can be described as a social engineering attack, and is done so that user data can
be obtained. Data such as login details, card numbers and passwords. The attacker pretends
to be a trusted, well known source in order to entice their victims to open email links or
messages. Once this happens malware can be installed, the system can be frozen and
sensitive, confidential information can be revealed. This leads to theft of funds,
unauthorized purchases or even identity theft.

Question Three
In your own words describe secondary storage devices and name 4 types
A secondary storage device is any storage unit that serves as an addition to the computers
primary storage RAM and cache memory. The secondary storage unit allows for greater data
storage ranging from megabytes to petabytes. Most computer programs and applications
can be stored on these devices including the operating system, device drivers, applications
and general user data. Examples of secondary storage devices are:
 Hard Disk Drive
 The tape disk drive
 Compact disk Drive
 Floppy Disk Drive

Question Four
Describe the function of the CPU
The CPU of a computer is a piece of hardware that carries out all the instructions of a
computer program. It can be described as the brain of the computer and each and every
instruction no matter how big or small must go through the CPU. It performs basic
arithmetical, logical and input/output operations.

RK Pauchcowrie 156859 7805050240089


Question Five
In your own words describe the difference between hacking and computer piracy
Hacking can be described attempting to gain access to unauthorized or undisclosed areas,
where you do not have permission to be in. For example if someone tries to gain access to
my computer from a different location without my permission and utilize my files for their
own benefit. Piracy is when computer software is duplicated. This is illegal but done in most
cases for monetary gain. For example when music is downloaded off the internet illegally
the copies and sold.

Question Six
Describe 3 main functions an operating system performs
 It manages the computers resources such as the central processing unit, memory,
disk drives and printers
 Establishes a user interface
 Executes & provides services for applications software.

Question Seven
Discuss the different types of network servers
 File Server – Provide a central storage location for data files allowing users to locate
their work irrespective of the work station being used. They are able to share their
work with other users. Complex security measures are implemented to control or
limit what information users are able to access. File servers can also provide a
central control over the network.
 Print Server – These are the computers to which printers are attached. The printer
can be shared with other users on the network. Any of the users are able to print as
if the printer is attached to their computer.
 Communication Server – These machines provide a connection between the network
and the outside world. Being able to connect to a computer in another country is as
simple as connecting to a computer in the same room. An IP sharer can also be used
in place of a communications server. It is a scaled down computer with no keyboard,
display or hard drive.
 Application Server – Some networks hold their application software on a central
server. In the event that an upgrade or a configuration needs to be done only the
application server needs to be modified.
 SQL Server – Stores the database as well as the functionality to manipulate the
database. A client computer sends a request to the SQL server, it then executes the
request and returns the results to the client.
 List Server – manages mailing lists.

RK Pauchcowrie 156859 7805050240089


Question 8
Describe cloud computing with reference to its advantages
Cloud computing can be described as the practice of using a network of remote severs
hosted on the internet to store, manage, and process data, rather than using a local server
or a personal computer. Cloud computing can be easily implemented and allows businesses
to maintain the same applications and processes without having technical challenges. It can
be accessed easily and quickly. You are able to access your data anywhere and at any time
and this improves productivity and efficiency. There is no need for a physical storage center
as everything is hosted in the cloud, however, data must be backed up in the event of a
disaster. Overhead technology cots are minimized and extra time and resources can be
used elsewhere. Cloud computing offers fast and reliable delivery of data with less
downtime.

Question 9
Describe the difference between personal computers and mainframes
A personal computer is designed for one user to be logged in at any given time while a
mainframe computer can have several users at the same time. Mainframe computers are
designed for operations that are complex such as bulk data input. They have high reliability
and security and can support workload sharing. Personal computers are generally smaller in
capacity and can easily be operated even by a child. Mainframe and personal computers
have different operating systems, with the operating system in the mainframe being more
powerful and able to handle large volumes of data. Mainframes computer systems are
usually used by government and other large organization’s whilst personal computers are
generally for home use.

Question 10
Three factors to be attended to in order to secure systems
Computer security, cyber security or information technology security is the protection of
computer systems and networks from theft and damage to their hardware, software or
electronic data.
 Ensure files are always backed up to a remote site. In the event of a disaster these
files can still be accessed.
 Computers must have a fire extinguisher nearby at all times, as the risk of
overheating is high.
 In a large organization computers and IT equipment could run into millions of rand in
value. It would be feasible to have security on site to protect and safeguard
equipment.

RK Pauchcowrie 156859 7805050240089


Question 11
What do we mean by machine code? How does this relate to binary code?
Binary code is the base layer. It’s the system of 1s and 0s that can be represented by an
electronic switch in a computer. Computers have billions of these tiny switches and the
electrical signals to operate them run at incredibly high speed. It’s the combination of
quantity and speed that make computers useful data processing tools, rather than an
expensive light switch.
Machine code is the next layer where a meaning is assigned to a binary code as a way to tell
the computer to perform a process.
Question 12
Name 5 types of fields and give an example of data that would be stored in each filed.
A database field is a single piece of information from a record. A database record is a set of
fields:
 Text field (First Name, Last name, Address, city)
 Date field (M/D/YY), (MM/DD/YYYY)
 Numeric field (0 -9)
 Yes/No Field (Answer questions with either yes or no answer)
 Dropdown field (Race – Asian, indian, white, black, Hispanic, other)
 Image field (bmp, gif, tiff, png)
 Hyperlink field (email address)

Question 13
Define web browser and give 3 examples of common browsers
Web browser is a software application for accessing information on the world wide web.
 Google chrome
 Safari
 Opera
 Microsoft internet explorer
Question 14
Name 3 types of printers commonly used
 Laser printers
 LED Printers
 3D Printers
 Inkjet printers

RK Pauchcowrie 156859 7805050240089


Question 15
Name and describe 5 types of computer viruses
Macro-Viruses
Very common and affects spreadsheets and word processors. This virus uses the macro
facility in these applications. Actions include: changing the summary information attached to
the documents and converting document files into template files
Worms
A small program that replicates itself until it fills all the computer memory both RAM and
disk. Eventually the computer will be unable to perform. Since a worm is a complete
program by itself and does not attach to legitimate programs it is not a virus in the strict
sense of the word.
Time Bombs
A virus that is activated at a particular date or time. Once activated it usually destroys or
corrupts data. Corruption might be worse than deletion because the user may not notice
and may make decisions based on incorrect data.
Logic Bombs
It is activated when the computer carries out a specific function
Trojan Horses
It hides entirely within another program. From there it can carry out its work unobtrusively.
Trojan Horses are usually associated with various forms of computer fraud.

Question 16
Word Processing & Spreadsheets
Word Processing software is used to manipulate a text document such as a report. You type
in information and the software provides tools for copying, deleting and various other types
of formatting. Some other features of word processing software are:
 Creating, editing, saving and printing documents
 Copying, pasting, moving and deleting text within a document
 Creating and editing tables
 Formatting text, such as bold, font type, underling or italicizing
 Inserting elements from other software, such as illustrations or photographs
 Correcting spelling and grammar.
Word processing software has numerous features to format pages. You can organize text
into columns, add page numbers, and format cover pages.

RK Pauchcowrie 156859 7805050240089


Spreadsheets
Spreadsheet software is an interactive computer application used for storing, organizing and
manipulating data and also contains built-in features and tools such as formulas, charts and
data analysis tools that make it easier to work with large volumes of data.
Other features include:
 Drawing of graphs & charts
 Sorting & Filtering Data
 Performing Calculations

RK Pauchcowrie 156859 7805050240089

You might also like