Monday, January 21, 2013

The Answer of PTI Chapter 15


True/False
  1. T
  2. F
  3. T
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. T
Multiple choice
  1. A
  2. C
  3. C
  4. A
  5. D
  6. B
  7. D
  8. B
Matching
  1. E
  2. D
  3. J
  4. G
  5. H
  6. B
  7. F
  8. I
  9. A
  10. C
Short Answer

1.  Advantage of attending trade school  is time savings. Students often complete trade school programs in a shorter time than college and university programs.

The factor is  ask the advisor if the trade school has an articulation agreement with a nearby college or university, compare the curricula, laboratory facilities, instructors, and types of jobs the school's graduates have obtained.

2. The benefits of professional growth and continuing education is providinggeneral and specific information about equiptment,software, services, and issues in the computer industry because technology changes so rapidly.

Some ways we can keep up to date about industry trends and technologies are joining a workshop, seminar,conferences, convention, and participate in professional growth,
3. It's better if we choose the certification with our interest of the career and what is our goal. After that, we can get a lot of benefits from there.

Options for preparing certification:
Instructor-led training =  It is available in a variety of forms, including seminars, which typically are held for several days during a week; boot camps, which immerse students in intensive course work for up to two weeks; and academicstyle classes, which span a period of several weeks or months.
- Online training classes = it allows students to set their own pace in an interactive environment and combines the technological advantages of computer-based training with the connectivity of the Internet or a company’s intranet.
Self-study = it helps professionals prepare for certification at their own pace and supplement other training methods.
- Web resources = It generally contains descriptions of the available certifications, with FAQs and links to authorized training and testing centers.

4. The focus of programmer or developer certification is training programs that prepare applicants for the certification test.
Types of certification are beneficial to those interested in programmer / developer certification are:
- Certified Software Development Associate (CSDA)
- Certified Software Development Professional (CSDP)
- IBM Certified Solution Developer
- Microsoft Certified Professional Developer (MCPD)
- Sun Certified Enterprise Architect (SCEA)
- Sun Certified Java Developer (SCJD)
- Sun Certified Java Programmer (SCJP)
- Sun Certified Mobile Application Developer (SCMAD).
People who might be interested in programmer/developer certification are:
- Java programmers
- Mobile application developers
- Oracle database managers
- Programming consultants
- SQL programmers
- Web software developers
-XML developers.

5. Hardware certifications vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company’s current and future computing needs.

People who might be interested in hardware certification are:
- Cable installation technicians
- Computer repair technicians
- Corporate trainers
- Help desk specialists
- IT consultants
- System engineers and administrators

The Answer of PTI Chapter 14


True/False
  1. T
  2. F
  3. F
  4. T
  5. F
  6. F
  7. T
  8. T
  9. T
  10. T
Multiple Choice
  1. C
  2. B
  3. A
  4. B
  5. A
  6. D
  7. A
  8. D
Matching
  1. H
  2. F
  3. B
  4. E
  5. D
  6. G
  7. A
  8. J
  9. I
  10. C
Short Answer

1.  Manager is responsible to coordinate and controll an organization’s resources.
The four activities are :
-Planning = involves establishing goals andobjectives
-Organizing = includes identifying and combining resources, such as money and people, so that the  company can reach its goals and objectives.
-Leading = sometimes referred to as directing, involves communicating instructions and authorizing others to perform the necessary work.
-Controlling =  involves measuring performance and, if necessary, taking corrective action.

2. A Content Management System is an information system that combines the databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content. The type of the content are files and data which is called metadata.

3. Types of virtualization:
-Server virtualization provides the capability to divide a physical server logically into many virtual servers.
-Storage virtualization provides the capability to create a single logical storage device from many physical storage devices.
 Cloud computing is an Internet service that provides computing needs to computer users. The company use it because it allows the company to differentiate its network and server infrasructure.
Grid computing combines many servers and/or personal computers on a network, such as the Internet, to act as one large computer. The company use it because they may only pay for the use of a grid that base on the amount of processing time.

4.  Types of e-commerce:
E-Retail: also called e-tail, occurs when retailers use the Web to sell their products and services.
Entertainment and Media:  Music, videos, news, sporting events, and 3-D multiplayer games are a growing part of the Web’s future. Newsprint on the Web is not replacing the newspaper, but enhancing it and reaching different populations.
Health: Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. Some Web sites offer the capability to listen in on health-related seminars and discussion.
Finance
Travel The Web

5. Backup Plan contains all program and data file. To be succesfull, the employee must be trained in the backup and recovery procedures.

The Answer of PTI Chapter 13

True/False

  1. T
  2. T
  3. T
  4. T
  5. T
  6. F
  7. F
  8. T
  9. F
  10. F
Multiple Choice
  1. B
  2. C
  3. C
  4. A
  5. A
  6. C
  7. D
  8. B
Matching
  1. G
  2. D
  3. J
  4. i
  5. C
  6. E
  7. A
  8. H
  9. B
  10. F
Short Answer
1. A compiler is a separate program that converts the entire source program into machine language before executing it. The compiler stores the object code on storage media for execution later. However,  An interpreter reads a code statement, converts it to one or more machine language instructions, and then executes those machine language instructions.

The advantages of an interpreter is :
when the interpreter finds any error messages in a program, it will display the feedback immediately.

The disadcantages of an interpreter is :
the interpreted programs do not run as fast as compiled programs. It is because the interpreter must translate the source program to machine language first for each time the program will execute.

2.  A major benefit of OOP is the ability to reuse and modify the existing objects. For example, when a programmer creates an object, it is available using by any other existing or future program.

Users begin working with sections of the program as they are completed. An important concept in RAD is the use of prebuilt components.

3. An integrated development environment includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a  debugger.


Programming languages in the Visual Studio:
Visual Basic is a programming language that allows programmers easily to build complex task-oriented object-based programs.
Visual C++ is a programming language based on C++ language.
Visual C# is a programming language that combines programming elements of C++ with an easier, rapid development environment.

4.  XML separates the Web page content from its format, allowing the Web browser to display the contents of a Web page in a form appropriate for the display device.
Two applications of XML:
RSS 2.0 that stands for Really Simple Syndication
ATOM that are specifications that content aggregators use to distribute content to subscribers.

5. Review the program code: first, programmers review the program for any dead code and remove it. Dead code is any program instructions that a program never executes.  Next, programmers should run the program one final time to verify it still works.
Review all the documentation: After reviewing the program code, the programmer gives the program and all of its documentation to the systems analyst. The documentation includes all charts, solution algorithms, test data, and program code listings that contain global and internal comments.

 It is important because  proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

Thursday, January 10, 2013

The Answer of PTI Chapter 12


True/False
1.F
2.T
3.F
4.F
5.F
6.T
7.F
8.F
9.F
10.T
11.F

Multiple Choice
1.A
2.B
3.C
4.A
5.C
6.D
7.A
8.D

Matching
1.D
2.E
3.A
4.B
5.I
6.G
7.F
8.J
9.C
10.K

Short Answer
1. -System development is a set of activities used to build an information system.
- 1. Planning
• Review project requests
• Prioritize project requests
• Allocate resources
• Form project development Team
2. Analysis
• Conduct preliminary investigation
• Perform detailed analysis activities:
-Study current system
-Determine user requirements
-Recommend solution
3. Design
• Acquire hardware and software, if necessary
• Develop details of system
4. Implementation
• Develop programs, if necessary
• Install and test new system
• Train users
• Convert to new system
5. Operation, Support, and Security
• Perform maintenance activities
• Monitor system performance
• Assess system security

2. – • Operational feasibility measures how well the proposed information system will work.
• Schedule feasibility measures whether the established deadlines for the project are
reasonable.
• Technical feasibility measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
• Economic feasibility, also called cost/benefit feasibility, measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs.

- six techniques used to gather data and information are review documentation, observe, survey, interview, conduct joint-application design sessions, and research.

3. – The UML is a graphical tool that enables analysts to document a system. It consists of many inter related diagrams. Each diagram conveys a view of the system.
- A use case diagram graphically shows how actors interact with the information system. An actor is a user or other entity such as a program. The function that the actor can perform is called the use case.
4. – The operation, support, and security phase consists of three major activities: (1) perform maintenance activities, (2) monitor system performance, and (3) assess system security.
-        A.These types of errors return the analyst to the planning phase to perform corrective maintenance, which is the process of diagnosing and correcting errors in an information system.
b. Adaptive maintenance is the process of including new features or capabilities in an information system.
c. The purpose of performance monitoring is to determine whether the system is inefficient or unstable at any point.
d. If it is, the systems analyst must investigate solutions to make the infor mation system more efficient and reliable, a process called perfective maintenance — back to the planning phase.
5.- A computer security plan summarizes in writing all of the safeguards that are in place to protect an organization’s information assets.
- 1. Identify all information assets of an organization, including hardware, software, documentation, procedures, people, data, facilities, and supplies.
2. Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur. Place an estimated value on each risk, including lost business. For example, what is the estimated loss if customers cannot access computers for one hour, one day, or one week?
3. For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss.

Thursday, January 3, 2013

The Answer of PTI chapter 11


 True/False
1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. F
10. F
11. T
12. F
 Multiple Choice
1. B
2. D
3. A
4. C
5. C
6. D
7. D
8. C
 Matching
1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10. F
 Short Answer
1. How antivirus programs detect and identify a virus:
- By looking for virus signatures. A virus signature, also called a virus definition, is a known specific pattern of
virus code.
- By inoculate existing program files. To inoculate a program file, the antivirus program records information such as
the file size
and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus
tam pers with the data describing the inoculated program file.
A virus hoax is an e-mail message that warns users of a nonexistent virus or other malware.
2. ENERGY STAR program: The United States Department of Energy (DOE) and the United States Environmental Protection Agency
(EPA)developed the ENERGY STAR program to help reduce the amount of electricity used by computers and related devices. This
program encourages manufacturers to create energy- efficient devices that require little power when they are not in use. For
example, many devices switch to sleep or power save mode after a specified number of inactive minutes or hours.
Users should handle obsolete computers by Recycling and refurbishing old equipment that are much safer alternatives for
the environment.
3. Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of
information about them.
Five ways to safeguard your personal information:
- Fill in only necessary information on rebate, warranty, and registration forms.
- Do not preprint your telephone number or Social Security number on personal checks.
- Have an unlisted or unpublished telephone number.
- If Caller ID is available in your area, find out how to block your number from displaying on the receiver’s system.
- Do not write your telephone number on charge or credit receipts.
4. Two methods for avoiding phishing attacks are:
- If you receive an e-mail message that looks legitimate and requests you update credit card numbers, Social Security
numbers, bank account numbers, passwords, or other private information, the FTC recommends you visit the Web site directly to
determine if the request is valid.
- Never click a link in an e-mail message; instead, retype the Web address in your browser.
How clickjacking works: With clickjacking, an object that can be clicked on a Web site, such as a button, image, or
link, contains a malicious program. When a user clicks the disguised object, a variety of nefarious events may occur. For
example, the user may be redirected to a phony Web site that requests personal information, or a virus may download to the
computer.
5. Many businesses use content filtering to limit employees’ Web access. These businesses argue that employees are
unproductive when visiting inappropriate or objectionable Web sites. Some schools, libraries, and parents use content
filtering to restrict access to minors.
Rating system used for content filtering: a rating system of the Internet Content Rating Association (ICRA), which is
similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established
by the ICRA. If content at the Web site goes beyond the rating limits set in the Web browser software, a user cannot access
the Web site. Concerned parents can set the rating limits and prevent these limits from being changed by using a password.