Wednesday, January 29, 2014

18: PTI Assignment 17

PTI Assignment 17: Chapter Review (Chapter 15) of textbook Discovering Computers

Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.

By: Veronica Ong (1701317660) of class 01PCT 


Task: Chapter Review of Chapter 15 from the Textbook Discovering Computers.

1. What career opportunities are available in the computer industry?
Job opportunities in the computer industry generally are available in one or more of these
areas:
• General business and government
organizations and their IT departments
• Computer equipment field
• Computer software field
• Computer service and repair field
• Computer sales
• Computer education and training field
• IT consulting
Businesses and government organizations of all sizes use computers. Without computers, very few organizations could operate in today’s economy. Employees of all types, from office workers to shop foremen, use business software such as word processing to prepare basic documents. Other employees in the organization use computers for specialized activities such as the management of company finances.

17: PTI Assignment 16

PTI Assignment 16: Chapter Review (Chapter 14) of textbook Discovering Computers

Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.

By: Veronica Ong (1701317660) of class 01PCT 


Task: Chapter Review of Chapter 14 from the Textbook Discovering Computers.

1. What are the special information requirements of an enterprise-sized corporation?
The term, enterprise, commonly describes a business or venture of any size. In this chapter, the term enterprise refers to large multinational corporations, universities, hospitals, research laboratories, and government organizations. Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures.

16: PTI Assignment 15

PTI Assignment 15: Chapter Review (Chapter 13) of textbook Discovering Computers

Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.

By: Veronica Ong (1701317660) of class 01PCT 


Task: Chapter Review of Chapter 13 from the Textbook Discovering Computers.

1. How are machine languages different from assembly languages?
Two types of low-level languages are machine languages and assembly languages. Machine language, known as the first generation of programming languages, is the only language the computer directly recognizes. Machine language instructions use a series of binary digits or a combination of numbers and letters that represents binary digits. The binary digits correspond to the on and off electrical states. As you might imagine, coding in machine language is tedious and time-consuming.

15: PTI Assignment 14

PTI Assignment 14: Chapter Review (Chapter 12) of textbook Discovering Computers

Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.

By: Veronica Ong (1701317660) of class 01PCT 


Task: Chapter Review of Chapter 12 from the Textbook Discovering Computers.

1. What is system development, and what are the system development phases?
As a computer user in a business, you someday may participate in the modification of an existing system or the development of a new system. Thus, it is important that you understand system development. System development is a set of activities used to build an information system. Some system development activities may be performed concurrently. Others are performed sequentially. Depending on the type and complexity of the information system, the length of each activity varies from one system to the next. In some cases, some activities are skipped entirely. System development activities often are grouped into larger categories called phases. This collection of phases sometimes is called the system development life cycle (SDLC).

14: PTI Assignment 13

PTI Assignment 13: Chapter Review (Chapter 11) of textbook Discovering Computers

Lecturer: Mr. Tri Djoko Wahjono, Ir, M.Sc.

By: Veronica Ong (1701317660) of class 01PCT 


Task: Chapter Review of Chapter 11 from the Textbook Discovering Computers.

1. What are computer security risks, and what are the types of cybercrime perpetrators?
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. While some breaches to computer security are accidental, many are intentional. Some intruders do no damage; they merely access data, information, or programs on the computer before logging off. Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data. An intentional breach of computer security often involves a deliberate act that is against the law. Any illegal act involving a computer generally is referred to as a computer crime. The term cybercrime refers to online or Internet-based illegal acts.