Reference no: EM132898697
ITM11A1 IT Management - College of Business and Economics
Section A
1. Differentiate between processors on larger computers and processors on personal computers; define microprocessor
2. Describe the system clock, and define clock cycle, superscalar, and clock speed
3. Are multi-core processors better than single-core processors? Contrast the two technologies
4. Define word size, and tell how it is measured and what its effect on processing speed is?
5. What is the rationale for the arrangement of keys in the typing area? Review the history of the QWERTY keyboard.
6. Why use a wireless mouse? Define wireless mouse, and discuss why some users might opt for this type of input device.
7. What happens if dust touches the surface of a platter on a hard disk? Explain what a head crash is
8. Why would you use an external hard drive instead of a second internal hard drive? Review the many advantages that external hard drives have over internal hard drives if you discount the transfer rate of external hard drives.
9. Explain how an operating system enables users to control a network or administer security.
10. Summarize the features of several desktop operating systems: Windows, macOS, UNIX, Linux, and Chrome OS.
11. Why use open source software? Explain the advantages of open source software for both users and customers.
12. What is an intranet? Define intranet and extranet, and survey students about their experience with both. Ask students to consider another type of company besides the one mentioned in the textbook that could make use of an extranet.
Section B: Critical thinking
This section must be written in form of an Essay, include source of references when using third party materials, the length and depth of each question is at your own discretion but considered mark allocation when debating.
1. From 1989 to 1998, the maximum clock speed of Intel's processors increased 350 percent. New micron production processes and copper-based circuits continue the acceleration. Much faster - and cheaper - processors are anticipated. In the midst of this progress, there are whispers of "planned obsolescence" among some naysayers.
Faster processor speed and new software that demands it, they argue, will make a PC bought today obsolete in two years. Besides, they continue, is the increased speed really necessary? What do you think? Is greater processor speed a benefit for manufacturers and consumers alike, or is it a boon for builders and a burden for buyers? Why?
2. Despite its drawbacks, the keyboard continues to be the most popular input device. Why is this true? Keyboards generally have two ways to enter numbers - the numeric keypad and the row of number keys above the alphabetic keys in the typing area. From your perspective when do you think each set of keys would be used, which method is easiest to use. Why?
3. Some of the computers you purchase today include a webcam, which allows you to make video calls or take snapshots. But how valuable is this? Is it really worth the extra money or the hidden cost built into the price of the computer? Some people argue that once you use this technology it will become a part of your repertoire and you will discover many uses. Do you think this is true? For instance, you could use the camera to monitor the babysitter or housekeeper. Do you agree with this? Can you list some other ways that you would use this technology?
4. For more than 10 years, intelligent smart cards incorporating tiny chips have been in use throughout Europe. The United States has adopted the use of this technology recently, and the trend is continuing. Smart card technology offers the potential for improving
security on the Internet and enhancing the security of networked systems by verifying user identification. Acting like a computer, it can hold and update sensitive and critical data, such as medical history, and could replace identification cards and other records. The market indicates that this technology will play an important role in contemporary life. Before the smart card becomes mainstream, however, roadblocks to its successful implementation must be overcome. Many experts argue that the smart card is not secure and safe enough to store vital information. This always has been a source of controversy. Why have smart cards been more popular in Europe than in the United States? Do you think the average American is willing to store his or her medical or personal information on an intelligent smart card? Would you? What misconceptions affect the way American society perceives the use of this technology? Is security the main issue in acceptance of the smart card?
5. Today's operating systems include a variety of features. They support a graphical user interface, monitor performance, and administer security. Most operating systems also include a variety of file and disk management tools. These tools offer functions such as managing files, viewing images, uninstalling programs, diagnosing problems, scanning disks, defragmenting disks, backing up files and disks, and displaying screen savers. Do you think an operating system should include these features? Are these features useful? What other features could be included in an operating system? If you were to write an overview of the perfect operating system, what features would you include?
6. A primary reason many companies implement an intranet is to enhance productivity. The implementation of an intranet, however, can cause a number of problems within a company. Security can be an issue. The intranet is only as secure as its weakest link, which generally is the people managing and using the intranet. Without proper security, companies may open backdoors from the Internet to the intranet, unauthorized links to unsecured locations, and improper use of passwords. Other issues relate to who controls and maintains the information, access levels, and how to determine who has what level of access. Policies and procedures must be developed. Who should be responsible for a company's intranet? Because an intranet generally is for all employees, should everyone have an opportunity to participate in writing the policies and procedures? What safeguards can be used to ensure the proper use of passwords? How should access levels be determined?
Attachment:- IT Management.rar