+ All Categories
Home > Documents > Tutorial pdt sem 1

Tutorial pdt sem 1

Date post: 05-Dec-2014
Category:
Upload: hazirma
View: 659 times
Download: 4 times
Share this document with a friend
Description:
 
14
1 TUTORIAL 1: INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Development Of Information Technology STRUCTURED QUESTIONS Answer all the questions. 1. Define the following terms: a) Information Technology b) Stand-alone computer c) Mainframe d) Client-server network e) Distributed computing f) Cloud computing 2. Give two (2) types of stand-alone computer. 3. Give three (3) advantages of mainframe. 4. List four (4) services that server can provide for users. 5. Explain what are client and server in the client server network. 6. Briefly explain three (3) components of cloud computing. 7. Give two (2) critical factors that determining the efficiency of cloud computing. 8. State four (4) top organizations that provide cloud computing. 9. List two (2) examples of cloud application
Transcript
Page 1: Tutorial pdt sem 1

1

TUTORIAL 1: INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Development Of Information Technology

STRUCTURED QUESTIONS Answer all the questions. 1. Define the following terms:

a) Information Technology b) Stand-alone computer c) Mainframe d) Client-server network e) Distributed computing f) Cloud computing

2. Give two (2) types of stand-alone computer.

3. Give three (3) advantages of mainframe.

4. List four (4) services that server can provide for users.

5. Explain what are client and server in the client server network.

6. Briefly explain three (3) components of cloud computing. 7. Give two (2) critical factors that determining the efficiency of cloud computing. 8. State four (4) top organizations that provide cloud computing. 9. List two (2) examples of cloud application

Page 2: Tutorial pdt sem 1

2

TUTORIAL 2: INTRODUCTION TO INFORMATION TECHNOLOGY 1.2 The Application Of Information Technology

STRUCTURED QUESTIONS Answer all the questions. 1. Discuss the applications of Information Technology in education.

2. Discuss the applications of Information Technology in health care. 3. Discuss the applications of Information Technology in finance.

4. Discuss the applications of Information Technology in manufacturing.

5. Discuss the applications of Information Technology in travel. 6. Discuss the applications of Information Technology in government.

7. Discuss the applications of Information Technology in science

8. Discuss the applications of Information Technology in publishing

Page 3: Tutorial pdt sem 1

3

TUTORIAL3 : NETWORK TOPOLOGY 2.1.1 Network Topology

STRUCTURED QUESTIONS Answer all the questions 1. Define what network topology is.

2. There are two types of layout in the network topology. State and give description on both network layout. 3. List three (3) types of commonly used network topology. 4. Draw a diagram on each of the network topologies. Give a brief explanation to all the topologies. 5. List three (3) advantages of each network. 6. List three (3) disadvantages of each network.

7. Identify the topology, based on the given statement:

Statement Topology

This network required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable.

Data transmitted on a ring network travels from device to device around the entire ring in one direction.

Hub and switch are commonly used device to provide a central connection point to all other devices in star network.

On a ring network, a cable forms a close loop with all computers and devices arrange along the ring.

All the computers and other devices on the network connect to a central device, thus forming a star.

Consists of a single central cable (backbone), to which all computers and other devices connect.

Page 4: Tutorial pdt sem 1

4

8. Identify the topology, based on the given diagram:

9. Suppose you have a small office office with five computers and two printers and you want to set up a Local Area Network (LAN) using a star and ring topology. Justify two (2) reasons for your choice of the topology.

Diagram Topology

Page 5: Tutorial pdt sem 1

5

TUTORIAL 4: INTERNET TECHNOLOGY 2.1 Network Basics

2.1.2 Classification Of Network STRUCTURED QUESTIONS Answer all the questions . 1. Define :

a) Local Area Network (LAN). b) Metropolitan Area Network c) Wide Area Network.

2. Differentiate all classification of network. Give three (3) differences. 3. Give one (1) type of network for LAN, MAN and WAN. 4. Sketch the diagram for each classification.

Page 6: Tutorial pdt sem 1

6

TUTORIAL 5: INTERNET TECHNOLOGY 2.2.1 Overview Of The Internet

2.2.1.1 Evolution Of Internet 2.2.1.2 The Internet Connection

STRUCTURED QUESTIONS Answer all the questions 1. Define the Internet.

2. What are the goals of ARPANET? 3. How did the Internet evolve? 4. Who is W3C? 5. What is Internet2? 6. Give two types of Internet connection. 7. Define dial-up connection. 8. Define broadband connection. 9. Define Internet Service Provider (ISP). 10. Give three (3) responsibility of an ISP. 11. List five (5) examples of the ISP. 12. List the relationship between various/types Internet connection and transmission media, communication

devices, ISP and data transfer rate. 13. There ARE many companies that provide Internet connections in Malaysia. Users may choose from various

types of Internet connection based on their requirements. a) Give the name of a network that had become the origin of today’s Internet. b) List three (3) examples of high speed Internet connection. c) State two (2) companies in Malaysia which are responsible to provide Internet access to clients.

Page 7: Tutorial pdt sem 1

7

TUTORIAL 6: INTERNET TECHNOLOGY 2.2.2.1 Web Browser 2.2.2.2 Web Address

STRUCTURED QUESTIONS Answer all the questions 1. What is IP Address? 2. Describe the purpose of IP address. 3. Give an example of IP address. 4. What is domain name? 5. Give an example of domain name. 6. Give the relationship between IP Address and Domain name. 7. Complete the table below:

Top Level Domain Description Top Level Domain Description

.gov .mil

.edu .biz

.org .com

.net

8. What is Domain Name System? 9. What is Web browser? 10. Give one purpose of Web browser? 11. List three (3) examples of Web browser. 12. Describe Web page and Web site. 13. A Web page has unique address called URL (Uniform Resource Locator) or Web address. What is Web

address? 14. List four components of URL. 15. What is the function of http:// and https://? 16. Complete the table below :

Part Stand For

http

https

Page 8: Tutorial pdt sem 1

8

17. Identify each part of the URL below;

a) http://www.kmns.matrik.edu.my/prog_kualiti/takwim.html b) http://www.kmns.matrik.edu.my/sinfo/pensyarah.html c) http://www.kmns.matrik.edu.my/math/index.html d) http://portal.kmns.matrik.edu.my/login/index.php

Page 9: Tutorial pdt sem 1

9

TUTORIAL 7: INTERNET TECHNOLOGY 2.2.2.1 The Internet

2.2.2.3 Web Page Navigation 2.2.2.4 Information Searching

STRUCTURED QUESTIONS Answer all the questions. 1. Differentiate between Hypertext and Hypermedia links.

2. What is the purpose of tabbed browsing? 3. What does the phrase surfing the web means? 4. List two (2) type of search tool of information searching. 5. Give the definition search engine. 6. What is important of search engine. 7. State 3 examples of search engine. 8. Give the definition subject directory. 9. State 3 examples of search directory. 10. List a method that user can use to search for each type of search tool. 11. What is the difference between Search engine and Subject directory. 12. Irfan need to search information about e- services. As a friend, suggest him;

a) Two (2) methods that he can use to search information above. b) Describe each of them

Page 10: Tutorial pdt sem 1

10

TUTORIAL 8: INTERNET TECHNOLOGY 2.3 Internet Services

STRUCTURED QUESTIONS Answer all the questions 1. Give definition of each internet services.

2. State an example of each internet services.

3. Briefly describe 2 (two) real time activities offering by internet services.

4. Briefly describe 2 (two) not real time activities offering by internet services.

5. Differentiate each of internet services below:

a) E-mail b) Mailing list c) Instant messaging d) Chat e) Voice over Internet Protocol (VoIP) f) Newsgroup g) Message board h) File Transfer Protocol (FTP)

6. Determine the suitable internet services for each statement below:

a) Yusuf like to inform and invite his classmate to celebrate his wedding anniversary. What types of internet services that he might choose. …………………………….

b) The services provided by YouTube application that gave benefit to the internet users………… c) The services used by internet users similar with letter posting…………………… d) Users safe airtime credit charges when called someone…………………… e) It is odds and improper manner when someone talks about different topic when using these

services……………… f) Sulaiman need to submit his assignment to the lecturer within 3 days. Suggest two (2) internet services

that he can use…………………… g) Othman download his work resources from his pc at home while he still working at office .Suggest two

(2) internet services that he can use………………………..

Page 11: Tutorial pdt sem 1

11

TUTORIAL 9: INTERNET TECHNOLOGY 2.4 Types Of Web Sites

2.5 Netiquette STRUCTURED QUESTIONS Answer all the questions. 1. List types of web sites. 2. Explain each type of web sites. 3. Differentiate each type of web sites below:

a) Blog and Wikipedia b) Marketing/businesses and Online social network c) Portal and Blog

4. What is netiquette?

5. Netiquette, or net etiquette, refers to etiquette on the Internet. How to get the good netiquette. 6. List the area where good netiquette highly stressed. 7. List the rules of netiquette on social interaction and communication electronically. 8. List three (3) values is in the rules of netiquette. 9. Identify the rules of netiquette refers to the statement below:

Statement The rules of netiquette that must be followed

Do not send uncompressed attachment.

Avoid misinterpreted and use emotions to express emotion.

To send the e-mail we must use proper grammar,spelling and punctuation. Do not use capital letter and use abbreviations and acronym for phrases. We must be polite which avoid offensive language.

Hani read e-mail belonging to Irfan at her lap top.

Don't use others' images, content, etc without permission and don't forward email, or use website content without permission.

Page 12: Tutorial pdt sem 1

12

TUTORIAL 10 : COMPUTER ETHICS AND SECURITY 3.1 Computer Ethics

3.1.1 Intellectual Property STRUCTURED QUESTIONS Answer all the questions.

1. Define Intellectual Property.

2. Give three (3) types of Intellectual Property.

3. Define copyright.

4. Define trademark. 5. Define patent. 6. Give one (1) difference of copyright, trademark, and patent

Copyright Trademark Patent

7. Explain the importance of Intellectual Property.

8. Copyright is a legal term that describe the right given to the creator for their literary and artistic work.

a) Give 3 examples of artistic work. b) Give 3 examples of literary work.

9. Give the correct terminology ( term) for each definition below :

Definition Terminology (Term)

Refers to creations of the mind used in commerce ( Inventions, literary and artistic works, symbols, names images and designs)

A distinctive sign which identifies certain goods or services.

A group of ethical behavior rules developed by organizations or by a professional society

Control the accessibility of information on the internet

Page 13: Tutorial pdt sem 1

13

TUTORIAL 11 : COMPUTER ETHICS AND SECURITY 3.2.1 Computer Security Risks

STRUCTURED QUESTIONS Answer all the questions.

1. Give the definition of computer security risk?

2. State all types of attack that can be launch through networks?

3. State and explain two type of hardware theft and vandalism.

4. What is information theft.

5. What type of computer security risk does software piracy fall to?

6. Give two causes for system failure?

7. List 3 common symptoms for a computer virus infection?

8. List type of security measures

9. Define what is and state process involved: a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspect : Awareness

10. State the suitable security measures for each statements below.

a) Haizam think to restore the files in his laptop by copying the backed up files to their original location. b) This process include encryption and decryption process. It also ensuring that no one can read the

message except the intended receiver. c) The importance of this software is to protects a computer against viruses d) Hardware/software that protects a network’s resources from intrusion by users on another network. e) Ensure that computers are safe from malicious threat by routine check to update from new virus, worm

or other malicious threat.

11. State the suitable security measures for each computer security risk below.

Computer Security Risk Security Measures

Computer viruses and other malware

Botnets, Denial of Service Attack and Spoofing

Spyware/Adware

Unauthorized access and use

Hardware theft

Page 14: Tutorial pdt sem 1

14

Software theft

Information theft

System Failure


Recommended