Showing posts with label PTI Assignment. Show all posts
Showing posts with label PTI Assignment. Show all posts

Thursday, January 17, 2013

PTI Assignment


Discovering Computers 2011 - Living in a Digital World
Chapter 15
For Mr. TriDjoko Wahjono


True / False
1. T   6. F
2. F   7. T
3. T   8. T
4. T   9. T
5. F   10. F

Multiple Choice
1. A   5. D
2. C   6. B
3. C   7. D
4. A   8. B

Matching
1. E   6. B
2. D   7. F
3. J   8. I
4. G   9. A
5. H   10. C

Short Answer
1. - Trade school programs often have smaller classrooms, which gives you more one-on-one time with the professor.
    - Student completion rate, placement record, facilities, tuition and fees, services.
2. - Keeping up to date of the informations about new products and services in technology.
    - Participate in educational activities such as workshops and seminars.
3. - Depends on your personal strengths and goals, follow your strengths and think about your long-term career.
    - Self-study, Online training classes, Instructor-led training, web resources.
4. ->to verify whether a person is capable as a programmer or developer.
     >Networking and Web Design certification.
    - Java programmers, Mobile application developers, Oracle database managers, Programming consultants, SQL programmers, Web Software developers, XML developers.
5. - The process through which computer hardware is tested to ensure it is compatible with specific software packages, and operates as intended in critical situations.
    - Cable installation technicians, computer repair technicians, corporate trainers, help desk specialists, IT consultants, system engineers and administrators.

PTI Assignment


Discovering Computers 2011 - Living in a Digital World
Chapter 14
For Mr. TriDjoko Wahjono


True / False
1. T   6. F
2. F   7. T
3. F   8. T
4. T   9. T
5. F   10. T

Multiple Choice
1. C   5. A
2. B   6. D
3. A   7. A
4. B   8. D

Matching
1. H   6. G
2. F   7. A
3. B   8. J
4. E   9. I
5. D   10. C

Short Answer
1. - The growth and increase in the organization's finances and earnings.
    - Planning, organizing, leading, and controlling.
2. - A computer program that allows publishing, editing, and modifying content as well as maintenance from a central interface.
    - Web type of content, Component type of content, and Enterpries type of content.
3. - Server virtualization provides the capability to divide a physical server logically into many virtual servers. Storage virtualization provides the capability to create a single logical storage device from many physical storage devices.
    - Grid Computing is the federation of computer resources from multiple to reach a common goal. Cloud Computing is the use of computing resources that are delivered as a service over a network. Companies use these computing because these new technologies provide flexible and massive online computing power.
4. - Business to Consumer, Business to Business, Consumer to Consumer, Peer to Peer, m-Commerce.
    ->m-commerce : it deals with conducting the transactions with the help of mobile devices.
     >peer to peer : it is a discipline that deal itself which assists people to instantly shares related computer files and computer sources without having to interact with central web server.
     >Business to Business : It consists of largest form of Ecommerce. This model defines that buyer and seller are two different entities.
5. - The location of backed-up data, supplies, and equipment, the personal responsible for gathering backup resources and transporting them to the alternate computer facility, and a schedule indicating the order.
    - Critical resources, hardware and software, and the operator.

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 13
For Mr. TriDjoko Wahjono


True/False
1. T   6. F
2. T   7. F
3. T   8. T
4. T   9. F
5. T   10. F

Multiple Choice
1. B   5. A
2. C   6. C
3. C   7. D
4. A   8. B

Matching
1. G   6. E
2. D   7. A
3. J   8. H
4. I   9. B
5. C   10. F

Short Answer
1. - A compiler takes all the code and translates it into something a computer can understand, while and interpreter takes code and translates it line by line.
    ->Advantages : Useful for program development when execution speed is not important (the debugging features can be build in), Debugging is easier, no lengthy compile time.
     >Disadvantages : Usually slower in execution, no object code is produced.
2. - simplicity, modularity, modifiability, extensibility, maintainability, re-usability.
    - a software development methodology that uses minimal planning in favor of rapid prototyping.
3. - IDE Provides comprehensive facilities to computer programmers for software development (source code editor, build automation tools, and a debugger).
    ->Visual Basic : allows programmers easily to build complex task-oriented object-based programs.
     >Visual C++ : object-oriented programming language that enables programmers to write Windows, Windows mobile, and .NET applications quickly and efficiently.
     >Visual C# : combines programming elements of C++ with and easier, rapid development environment.
4. - Defines a set of rules for encoding documents in a format that is bot human-readable and machine-readable.
    ->DOM : A cross platform and language-independent convention for representing and interacting with objects in HTML, XHTML, and XML documents.
     >SAX : An event-based sequential access parser API developed by the XML-DEV mailing list for XML documents.
5. - Reviews program code (removes dead code, program instructions that program never executes), Reviews documentation.
    - To make the programmer easier if there are changes in software.

PTI Assignment


Discovering Computers 2011 - Living in a Digital World
Chapter 12
For Mr. TriDjoko Wahjono


True / False
1. T   7. F
2. T   8. F
3. F   9. T
4. F   10. T
5. F   11. F
6. T

Multiple Choice
1. A   5. C
2. B   6. D
3. C   7. A
4. A   8. D

Matching
1. H   6. G
2. D   7. F
3. A   8. J
4. B   9. C
5. I   10. K

Short Answer
1. - A set of activities to build an information system.
    - Planning, Analysis, Design, Implementation, Maintenance.
2. -> Operational feasibility measures how well the proposed information system will work.
     > Schedule feasibility measures whether the established deadlines for the project are reasonable.
     > Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
     > Economic feasibility measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.
    - Identify the areas for which information is required, create the necessary research questions, determine the sources of data, research to gather the raw data, confirm that the data is correct, process te data to derive meaningful information and then translate into goals and requirements.
3. - UML is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
    - Class diagram is a static diagram, but use case diagram is a dynamic diagram
4. - Perform maintenance activities, monitor system performance, and assess system security.
    - Corrective maintenance is the process of diagnosing and correcting errors in an information system, Adaptive maintenance is the process of including new features or capabilities in an information system, Performance monitoring is the process to determine whether the system is inefficient or unstable at any point, Perfective maintenance is the process to investigate solutions to make the information system more efficient and reliable.
5. - a plan which summarizes in writing all safeguards that protect the organization's information assets.
    - Identify all information assets of an organization, Identify all security risks that may cause an information asset loss, and identify the safeguards that exist to detect, prevent, and recover from a loss.

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 11
For Mr. TriDjoko Wahjono


True / False
1. F   7. T
2. T   8. T
3. F   9. F
4. T   10. F
5. F   11. T
6. T   12. F

Multiple Choice
1. B   5. C
2. D   6. D
3. A   7. D
4. C   8. C

Matching
1. J   6. C
2. D   7. B
3. E   8. A
4. G   9. H
5. I   10. F


Short Answer
1. - First, It scans/monitors the programs by its code, if it found a program code tat matches with the virus code in its signature database, it will consider that program a virus. Second, it scans/monitors the programs by analyzing its behavior, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or block that behavior.
    - A message warning the recipient of a non-existent computer virus threat.

2. - A government-backed program helping businesses and individuals protect the environment through superior energy efficiency.
    - The users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.
3. - The relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.
    - Learn how to read online privacy policies, Get a seperate account for your personal e-mail, Be careful when using social networking sites and picture/video sharing sites, Learn about and then use the privacy features in your browser, Make sure that online transactions are secure.
4. - Abandon any outdated email software, Tighten up your browser's security settings.
    - A clickjack takes the form of embedded code or a script that can execute without the user's knowledge.
5. - Many businesses use content filtering to limit employees Web access. Some schools, libraries, and parents use content filtering to restrict access to minors.
    - Rating system is a system that rate every websites. If content at the website goes beyond the rating limits set in the web browser software, a user cannot access the website.


Saturday, December 29, 2012

PTI Assignment


Discovering Computers 2011 - Living in a Digital World
Chapter 10
For Mr. TriDjoko Wahjono

True / False

1. T   6. F
2. T   7. T
3. F   8. T
4. T   9. F
5. F   10. T

Multiple Choice

1. B   5. A
2. A   6. B
3. D   7. B
4. B   8. A

Matching

1. E   6. A
2. G   7. I
3. C   8. D
4. B   9. H
5. J   10. F

Short Answer

1. - The process of comparing data with a set of rules or values to find out if the data is correct.
    - Alphabetic checks, numeric checks, range checks, consistency checks, and completeness checks.
2. - Data redundancy means same information is duplicated in several files. This makes data redundancy.
    - Data are scattered in various files, and the files may be in different format, writing new application program to retrieve data is difficult.
3. - An approach whereby a pool of related data is shared by multiple application programs; offers significant advantages over traditional file-based approach.
    - Reduced Data Redundancy — Most data items are stored in only one file, which greatly reduces duplicate data. Improved Data Integrity — When users modify data in the database, they make changes to one file instead of multiple files. Shared Data — The data in a database environment belongs to and is shared, usually over a network, by the entire organization. Easier Access — The database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges. Reduced Development Time — It often is easier and faster to develop programs that use the database approach.
4. - I might use a Simple Query Wizard for a query that searches for and lists all items and monsters database in a game.
    - Query by Example (QBE) is a database query language that has a graphical user interface to assist users with retrieving data.
5. - Can store more types of data, access this data faster, and allow programmers to reuse objects.
    - A multimedia database stores images, audio clips, and/or video clips. A groupware database stores documents such as schedules, calendars, manuals, memos, and reports. A computer-aided design (CAD) database stores data about engineering, architectural, and scientific designs. A hypertext database contains text links to other types of documents.

Tuesday, November 6, 2012

PTI Assignment (GSLC 6th Week)

For Mr. TriDjoko Wahjono

Seagate Technology :
An American company that is one of the world's largest manufacturers of hard disk drives.
Seagate has been a leader in the development of the hard disk drives since releasing the 5 MB ST-506 drive in 1980, the first 5.25-inch hard drive.


SanDisk Corporation :

An American multinational corporation that designs, develops and manufactures data storage solutions in a range of form factors using the flash memory, controller and firmware technologies.
SanDisk became a publicly traded company on NASDAQ in November 1995.
SanDisk produces many different types of flash memory, including various memory cards and a series of USB removable drives.

Samsung Storage Devices :
Samsung Storage Devices span the spectrum of solutions for saving your data, images, audio, and video files. Including Hard Disk Drives, Optical Disc Drives, and Solid State Drives.
This drives support OEMs and consumers in desktop/notebook PCs, consumer electronics, enterprise storage and more.

Hitachi :
A Japanese multinational engineering and electronics conglomerate company headquartered in Chiyoda, Tokyo, Japan. It is the parent of the Hitachi Group and forms part of the DKB Group of companies.
Hitachi is a diversified company and has 11 business segments: Information and Telecommunication Systems, Electrical Systems, Social and Industrial Systems, Automotive Systems, Electronic Component Devices, Construction, and Financial services.

Windows 8 :
Windows 8 is the current release of the Windows operating system, produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablets, and home theater PCs. Development of Windows 8 started before the release of its predecessor in 2009. Its existence was first announced at CES 2011, and followed by the release of three pre-release versions from September 2011 to May 2012. The operating system was released to manufacturing on August 1, 2012, and was released for general availability on October 26, 2012.

Windows 7 :
Windows 7 is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs; Windows 7 was released to manufacturing on July 22, 2009, and reached general retail availability worldwide on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time. Windows 7 is succeeded by Windows 8, released on 26 October 2012.

Linux :
Linux (i/ˈlɪnəks/ lin-əks or /ˈlɪnʊks/ lin-uuks) is a Unix-like computer operating system assembled under the model of free and open source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released 5 October 1991 by Linus Torvalds.
Linux was originally developed as a free operating system for Intel x86-based personal computers. It has since been ported to more computer hardware platforms than any other operating system. It is a leading operating system on servers and other big iron systems such as mainframe computers and supercomputers: more than 90% of today's 500 fastest supercomputers run some variant of Linux, including the 10 fastest. Linux also runs on embedded systems (devices where the operating system is typically built into the firmware and highly tailored to the system) such as mobile phones, tablet computers, network routers, televisions and video game consoles; the Android system in wide use on mobile devices is built on the Linux kernel.

Android :
Android is a Linux-based operating system designed primarily for touchscreen mobile devices such as smartphones and tablet computers. It is currently developed by Google in conjunction with the Open Handset Alliance. Initially developed by Android Inc, whom Google financially backed and later purchased in 2005, Android was unveiled in 2007 along with the founding of the Open Handset Alliance, a consortium of 86 hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices.



Monday, November 5, 2012

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 5
For Mr. TriDjoko Wahjono

True / False
1. T   7. F
2. T   8. F
3. F   9. T
4. T   10. T
5. F   11. T
6. F   12. T

Multiple Choice
1. C   5. D
2. A   6. C
3. B   7. C
4. C   8. C

Matching
1. B   6. A
2. G   7. H
3. D   8. F
4. J    9. I
5. E   10. C

Short Answer
1. - Optical Mouse, Laser Mouse, Air Mouse
    - The way they detect movement of the mouse that are transmitted to the pointer.
2. - Point, Click, Drag, Double-click, Right-click
    - Point: Move the mouse until the pointer on the desktop is positioned on the item of choice
       Ex : Position the pointer on the screen
      Click: Press and release the primary mouse button, which usually is the left mouse button
       Ex : Select or deselect items on the screen or start a program or program feature
      Right-Click: Press and release the secondary mouse button, which usually is the right mouse button
       Ex : Display a shortcut menu
      Double-Click: Quickly press and release the left mouse button twice without moving the mouse
       Ex : Start or choose a program or a program's feature
      Drag: Point to an item, hold down the left mouse button, move the item to the desired location on the screen, and then release the left mouse button.
       Ex : Move an object from one location to another or draw pictures
3. - OCR : is a technology that involves reading type-written, computer-printed, or hand-printed characters form ordinary documents and translating the images into a form that the computer can process.
    - OMR : is a technology that reads hand-drawn marks such as small circles or rectangles.
4. - Fingerprint reader
    - Captures curves and indentations of a fingerprint to identify wether the inputted fingerprint are the right one
5. - Rules for company with 15 or more employees to make a reasonable attempt to accommodate the need of physically challenged workers.
    - Gesture recognition and Computerized implant devices are a way for human to provide a natural computer interface for the physically challenged people through a means of just moving a small part of the body that are still functioning

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 4
For Mr. TriDjoko Wahjono

True / False
1. T   7. T
2. F   8. T
3. T   9. F
4. T   10. F
5. F   11. F
6. T   12. F

Multiple Choice
1. B   5. C
2. B   6. B
3. B   7. A
4. B   8. D

Matching
1. H   6. E
2. A   7. G
3. F   8. C
4. B   9. I
5. D   10. J

Short Answer
1. - Slate Tablet PC and Convertible Tablet PC
    - The location of the system unit
2. - The main circuit board of the system unit
    - Small piece of semiconducting material on which the integrated circuit are etched
3. - Fetching, Decoding, Executing, Storing
    - Storing the location from where the instruction was fetched
      Storing an instruction while the control unit decodes it
      Storing data while the ALU computes it
      Storing the results of a calculation
4. - Computers, peripherals, smart phones, PDAs, Cars, etc.
    - Purchasing a bluetooth wireless port adapter, bluetooth PC Cards and Express card modules for traditional notebook computers and tablet PCs, and Bluetooth cards for smart phone and PDAs.
5. - Remove dust and lint from difficult-to-reach areas and remove sticky liquid spilled on keyboards.
    - Before cleaning a computer, turn it off and unplug it from any electrical source. Disconnect all cables from the port. Use compressed air to blow away dust on the computer opening. Then wipe the case of the computer using antistatic wipe, use cleaning solution and a soft cloth to clean the computer screen. Also prepare antistatic wristband, vacuum cleaner, and antistatic wipe to clean the inside of the computer. If you are not comfortable cleaning the inside of your computer, call professional to do it for you.

Saturday, October 13, 2012

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 3

True / False
1. F     7. T
2. F     8. F
3. F     9. T
4. T     10. T
5. T     11. T
6. T     12. F

Multiple Choice
1. A     5. C
2. A     6. B
3. B     7. C
4. D     8. B

Matching
1. I     6. L
2. E    7. A
3. J     8. G
4. B    9. K
5. D   10. C

Short Answer

      1.       Types of utility programs :
·       A utility program is a type of system software that assists users with controlling or maintaining the operation of a computer, its devices, or its software. Utility programs typically offer features that provide an environment conducive to successful use of application software.
      Malware :
·    Malware is a program that acts without a user’s knowledge and deliberately alters the computer’s operations.
      2.      Features of presentation software :
·    Presentation software typically provides a variety of predefined presentation formats that define complementary colors for backgrounds, text, and graphical accents on the slides. This software also provides a variety of layouts for each individual slide such as a title slide, a two-column slide, and a slide with clip art, a picture, a chart, a table, or a diagram.
      Types of media might a person use to enhance a presentation :
·         Image, Music, Video, Chalkboard, and Visual Animation.
      3.      Using of travel and mapping software :
·     Display maps by searching for an address, postal code, telephone number, or point of interest.
·         Provides driving directions when a user enters a starting and destination point.
       Examples of reference software :
·         Encyclopedias, dictionaries, and health/medical guides.
      4.       Computer-based training :
·   A type of education in which students learn by using and completing exercises with instructional software
       CBT usage :
·    Beginning athletes use CBT programs to learn the intricacies of baseball, football, soccer, tennis, and golf.
·    The military and airlines use CBT simulations to train pilots to fly in various conditions and environments.
      5.       Website utilize Web-based training :
·      Many web sites offer WBT to the general public. Such training covers a wide range of topics, from how to change a flat tire to creating documents in Word.
      Ways that e-learning enhance communication :
·       To enhance communications, e-learning systems also may include video conferencing, e-mail, blogs, wikis, newsgroups, chat rooms, and groupware.

Wednesday, October 10, 2012

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Page 248, Beyond the Book

2. Three usages of computer technology in sports :

  1. Instant Replay : In NBA, instant replays is used at the end of all four quarters to determine whether or not a shot made at the last second was good or not. The basketball needs to leave a player's hand before the buzzer goes off for the points to count. Computer technology allows referees to watch the play in slow motion and make sure that the ball left the player's hand before the clock reached zero.
  2. Accuracy : Computer technology allows for increased accuracy in different sporting events. Tennis tournaments have sensors set up along the out-of-bounds and service lines that give off a signal if the ball touches them. If any portion of the tennis ball touches a line, it means the ball is "in". It can be difficult for umpires to make these calls from their vantage point. Swimming events use sensors to determine the winner of each race. Because many races are determined by hundredths of a second, it can be almost impossible to tell who won, even through replay. Sensors are set on the wall of the swimming pool, so that when a swimmer hits the wall, the time is recorded and the correct winner can be awarded.
  3. Cameras : At every sporting event, advanced computer technology is used in the cameras and broadcast quality of the event. There are multiple cameras set up for every game, match or contest, and in the NFL, networks have cameras set up all over the field to help viewers feel like they are part of the game. These cameras are held up by strings, stay behind the offense and have the capability of moving at any angle to ensure they stay our of the way of the action on the field. All of theses cameras have high definition capabilities, so every detail and nuance of the game can be seen on televisions by fans.


8. Three Online Social Networks / Media Sharing : 
  • Facebook : Facebook is a social networking service launched in February 2004, owned and operated by Facebook, Inc. As of September 2012, Facebook has over one billion active users, more than half of them using Facebook on a mobile device. Users must register before using the site, after which they may create a personal profile, add other users as friends, and exchange messages, including automatic notifications when they update their profile. Additionally, users may join common-interest user groups, organized by workplace, school or college, or other characteristics, and categorize their friends into lists such as "People From Work" or "Close Friends".
  • Twitter : Twitter is an online social networking service and microblogging service that enables its users to send and read text-based messages of up to 140 characters, known as "tweets". It was created in March 2006 by Jack Dorsey and launched that July. The service rapidly gained worldwide popularity, with over 500 million active users as of 2012, generating over 340 million tweets daily and handling over 1.6 billion search queries per day. Since its launch, Twitter has become one of the top 10 most visited websites on the Internet, and has been described as "the SMS of the Internet." Unregistered users can read tweets, while registered users can post tweets through the website interface, SMS, or a range of apps for mobile devices.
  • Google+ : Google+, sometimes abbreviated as G+, is a multilingual social networking and identity service owned and operated by Google Inc. It was launched in June 28, 2011. As of September 2012, it has a total of 400 million registered users of whom 100 million are active on a monthly basis. Unlike other conventional social networks which are generally accessed through a single website, Google has described G+ as a "social layer" consisting of not just a single site, but rather an overarching "layer" which covers many of its online properties.

PTI Assignment

Discovering Computers 2011 - Living in a Digital World
Chapter 2

True / False

1. F     7. T
2. F     8. T
3. T     9. F
4. F     10. F
5. T     11. F
6. F     12. T

Multiple Choice
1. C     5. A
2. B     6. A
3. C     7. C
4. A     8. C

Matching
1. H     6. I
2. B     7. D
3. F     8. G
4. E     9. J
5. A     10. C

Short Answer
1.       Three different types of broadband internet services :

·         Cable Internet Service : Provides high-speed Internet access through the cable television network via a cable modem.
·         DSL (Digital Subscriber Line) : Provides high-speed Internet connections using regular copper telephone lines.
·         FTTP ( Fiber to the Premises) : Uses fiber-optic cable to provide high-speed Internet access to home and business users.
       Regional ISP and National ISP :
·         Regional ISP : Provides Internet access to a specific geographic area.
·         National ISP : business that provides Internet access in cities and towns nation-wide.

      2.       Differences between Static Webpage and Dynamic Webpage :
·         Static Webpage : Visitors all see the same content.
·         Dynamic Webpage : Visitors can customize some or all of the viewed content such as desired stock quotes, weather for a region, or ticket availability for flights.
      What is a Web Site?
·         A collection of related Web Pages and associated items, such as documents and pictures, stored on a web server.
      3.       What is a Web Application?
·         Website that allows users to access an interact with software through a web browser on any computer or device that is connected to internet.
·         Example : Minigame, search, links, tags, extensions.
      4.       Three types of specification used by content aggregrators to distribute content :
·         RSS 2.0, Atom, Webslices.
      Accuracy of a Web Site :
·         Some of them are accurate enough to obtain information, because they’re written by someone that are already mastered in it.
      5.       What is Web Publishing?
·         Development and maintenance of Web pages.
       Five major steps in Web Publishing :
·         Plan a website
·         Analyze and design a website
·         Create a website
·         Deploy a website
·         Maintain a website