ITM11A1 IT Management Assignment

Assignment Help Management Theories
Reference no: EM132898697

ITM11A1 IT Management - College of Business and Economics

Section A

1. Differentiate between processors on larger computers and processors on personal computers; define microprocessor

2. Describe the system clock, and define clock cycle, superscalar, and clock speed

3. Are multi-core processors better than single-core processors? Contrast the two technologies

4. Define word size, and tell how it is measured and what its effect on processing speed is?

5. What is the rationale for the arrangement of keys in the typing area? Review the history of the QWERTY keyboard.

6. Why use a wireless mouse? Define wireless mouse, and discuss why some users might opt for this type of input device.

7. What happens if dust touches the surface of a platter on a hard disk? Explain what a head crash is

8. Why would you use an external hard drive instead of a second internal hard drive? Review the many advantages that external hard drives have over internal hard drives if you discount the transfer rate of external hard drives.

9. Explain how an operating system enables users to control a network or administer security.

10. Summarize the features of several desktop operating systems: Windows, macOS, UNIX, Linux, and Chrome OS.

11. Why use open source software? Explain the advantages of open source software for both users and customers.

12. What is an intranet? Define intranet and extranet, and survey students about their experience with both. Ask students to consider another type of company besides the one mentioned in the textbook that could make use of an extranet.

Section B: Critical thinking
This section must be written in form of an Essay, include source of references when using third party materials, the length and depth of each question is at your own discretion but considered mark allocation when debating.

1. From 1989 to 1998, the maximum clock speed of Intel's processors increased 350 percent. New micron production processes and copper-based circuits continue the acceleration. Much faster - and cheaper - processors are anticipated. In the midst of this progress, there are whispers of "planned obsolescence" among some naysayers.

Faster processor speed and new software that demands it, they argue, will make a PC bought today obsolete in two years. Besides, they continue, is the increased speed really necessary? What do you think? Is greater processor speed a benefit for manufacturers and consumers alike, or is it a boon for builders and a burden for buyers? Why?

2. Despite its drawbacks, the keyboard continues to be the most popular input device. Why is this true? Keyboards generally have two ways to enter numbers - the numeric keypad and the row of number keys above the alphabetic keys in the typing area. From your perspective when do you think each set of keys would be used, which method is easiest to use. Why?

3. Some of the computers you purchase today include a webcam, which allows you to make video calls or take snapshots. But how valuable is this? Is it really worth the extra money or the hidden cost built into the price of the computer? Some people argue that once you use this technology it will become a part of your repertoire and you will discover many uses. Do you think this is true? For instance, you could use the camera to monitor the babysitter or housekeeper. Do you agree with this? Can you list some other ways that you would use this technology?

4. For more than 10 years, intelligent smart cards incorporating tiny chips have been in use throughout Europe. The United States has adopted the use of this technology recently, and the trend is continuing. Smart card technology offers the potential for improving

security on the Internet and enhancing the security of networked systems by verifying user identification. Acting like a computer, it can hold and update sensitive and critical data, such as medical history, and could replace identification cards and other records. The market indicates that this technology will play an important role in contemporary life. Before the smart card becomes mainstream, however, roadblocks to its successful implementation must be overcome. Many experts argue that the smart card is not secure and safe enough to store vital information. This always has been a source of controversy. Why have smart cards been more popular in Europe than in the United States? Do you think the average American is willing to store his or her medical or personal information on an intelligent smart card? Would you? What misconceptions affect the way American society perceives the use of this technology? Is security the main issue in acceptance of the smart card?

5. Today's operating systems include a variety of features. They support a graphical user interface, monitor performance, and administer security. Most operating systems also include a variety of file and disk management tools. These tools offer functions such as managing files, viewing images, uninstalling programs, diagnosing problems, scanning disks, defragmenting disks, backing up files and disks, and displaying screen savers. Do you think an operating system should include these features? Are these features useful? What other features could be included in an operating system? If you were to write an overview of the perfect operating system, what features would you include?

6. A primary reason many companies implement an intranet is to enhance productivity. The implementation of an intranet, however, can cause a number of problems within a company. Security can be an issue. The intranet is only as secure as its weakest link, which generally is the people managing and using the intranet. Without proper security, companies may open backdoors from the Internet to the intranet, unauthorized links to unsecured locations, and improper use of passwords. Other issues relate to who controls and maintains the information, access levels, and how to determine who has what level of access. Policies and procedures must be developed. Who should be responsible for a company's intranet? Because an intranet generally is for all employees, should everyone have an opportunity to participate in writing the policies and procedures? What safeguards can be used to ensure the proper use of passwords? How should access levels be determined?

Attachment:- IT Management.rar

Reference no: EM132898697

Questions Cloud

What its broader impact or potential for broader impact : -What its broader impact or potential for broader impact is on relevant parties and/or society's aim to be more open to diversity, inclusivity, and oneness.
What the sale of a depreciable asset resulting in a loss : What the sale of a depreciable asset resulting in a loss indicates that the proceeds from the sale are? Greater than carrying amount.
Operational workflows of system : In the unified modeling language (UML), usecase modeling captures different aspects of the operational workflows of a system.
University database : Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements.
ITM11A1 IT Management Assignment : ITM11A1 IT Management Assignment Help and Solution, College of Business and Economics - Assessment Writing Service - Describe the system clock, and define clock
What will be the implications of taxing authority : What will be the implications of taxing authority will not closely monitor the compliance of the businesses in the country? How it will affect the government op
What is the approximate amount of life insurance needed : Assuming an annual investment return of 5% and an average tax rate of 30%, what is the approximate amount of life insurance needed?
Calculate plant stand count at harvest : A researcher carried out a field experiment on common beans fasceolus vulgaris l. If the following data was obtained from the experiment. Answer the following q
Identify courses of action that tamira could have taken : Tamira Nelson, the accountant for Picton Enterprises, Identify several courses of action that Tamira could have taken instead of the one she took.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd