Transcript
1. Explain the five parts of an information system. What part do people play in this system? a. People: make people, or end users more productive. Procedures: Rules or guidelines for people to follow when using software, hardware, and data. Software: A program consisting of the step-by-step instructions that tell the computer how to do its work. The purpose of software is to convert data (unprocessed facts) into information (processed facts). Hardware: Equipment that processes the data to create information. Data: Raw, unprocessed facts, including text, numbers, images, and sounds. 2. a) RAM and ROM Random Access Memory (RAM) chips hold programs and data that are currently being accessed a. Volatile b. Cache memory or RAM cache Additional RAM can be added using an expansion module called a DIMM Read-only memory (ROM) § Information stored by the manufacturer § Non-volatile and cannot be changed CPU can read, or retrieve data and programs in ROM but the computer cannot change ROM Contain special instructions § Start the computer § Access memory § Handle keyboard input b) Socket, Chips, Microprocessors, Slots, Bus lines, Expansion Cards 3. CDs, DVDs, and Blu-ray are all optical disc formats. All three come in read only, write once, and rewritable versions. CDs have the smallest capacity (650 MB to 1 GB), followed by DVDs (4.7 GB to 17 GB), with Blu-ray having the largest capacity (25 to 100 GB). Although Blu-ray media are the same size as CDs and DVDs, the discs require special drives. Most Blu-ray drives can also read CDs and DVDs as well. 4. Windows – most widely used Mac OS – powerful and easy to use UNIX – network; originally designed for Web, Servers on the Web, Mainframe computers, Microcomputers LINUX – non proprietary; free from the Web, Alternative to windows, Open source, Not proprietary, Google Chrome OS based on Linux
5. a) “Hackers” and “crackers” – hackers gain unauthorized access to computer systems “for fun”, crackers on the other hand, create and share programs designed to gain unauthorized access to computer systems. Their motives are malicious and can be very destructive and costly. b) Viruses –migrate through networks and operating systems and most attach themselves to different programs and databases; can alter and/or delete files; can damage system components; Computer Fraud and Abuse Act (key term) makes spreading a virus a federal offense Worms – a special type of virus, Doesn’t attach to a program, Fills the computer with self-replicating information or can be a carrier of a more traditional virus Trojan horse – programs that are disguised as something else; like worms they are carriers of viruses; The most common type of Trojan horses appear as free computer games. Denial of service attacks – attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually ISPs c) Security involves protecting information, hardware, and software from unauthorized use, damage from intrusions, sabotage, and natural disasters o Encryption – coding messages to prevent people from reading your messages o Anticipating disasters o Physical security (key term)– protecting hardware o Data security (key term)– protecting software and data from unauthorized tampering or damage o Disaster recovery plan (key term)– describing ways to continue operating until normal computer operations can be restored; can create special emergency facilities called hot sites which are fully equipped backup computer centers or cold sites if hardware must be installed to be utilized o Preventing data loss o Use physical backups – off-site storage using tapes or disks in case of loss of equipment