Final Exam OL1 Fall 2013

Total Page:16

File Type:pdf, Size:1020Kb

Final Exam OL1 Fall 2013

Final Exam "OL1" Fall 2013 IFSM 201 –Section XXXX

By typing my signature below, I pledge that this is my own work done in accordance with the UMUC policy on academic dishonesty and plagiarism http://www.umuc.edu/policies/academicpolicies/aa15025.cfm. I have not received or given any unauthorized assistance on this assignment/examination

______(Typed signature represents actual signature)

Instructions: Your responses should demonstrate your understanding of the course content and your analysis and critical thinking; you are not expected to just re-iterate what is in the textbook and the course modules, but to integrate the information and apply it to the specific question. Proper APA style must be used for any citations and references that you use. Place your answers within this document directly below each question (add sufficient space/extra lines as needed) and submit to your UMUC Assignments Folder as an attached MS Word document. This exam is worth 15 points towards the final course grade. Filename: yourlastname Final (example: Brown Final)

1. (15%) Design a wireless network for your home network. A. What is a network? A Network is a series of computers and its components (like hardware) that are interconnected so that they can share resources and data. B. Describe how the home network would be used by your family members. My WLAN would be used in several ways that include things like allowing my computers to share and transfer files (that include photos and music) between each other (minimizing the use of flash drives). My WLAN would allow all of the computers to print to any one of the different printers in the home (laser or photo etc). The internet connection would also be available to all computers simultaneously; eliminating the need to pay for multiple ISP accounts. If desirable, multi-player home computer games could be played by individuals in the household from their separate computers in chorus. C. Name at least five devices you would connect to your network 1) Wireless Laser Printer / Wireless Photo Printer 2) Wireless Router 3) Laptop 4) Cell Phones 5) Scanner D. In order to fully implement your home network, what types of hardware, software, connectivity components, etc., would be required? 2 Laptops, 1 Desktop, 1 Wireless Router, 1 Wireless Photo Printer, 1 Wireless Laser Printer, 2 cell phones, 1 scanner, Operating System, Network Management, Firewall Application Software, and a Cable Modem (for internet connection) E. Security issues will need to be considered. What are the risks to your network? What will you need to fully protect your home network? 2. (10%) Name and describe three specific ways that people's privacy is being threatened. Explain what measures can be taken to guard privacy in the situations you’ve described. 3. People’s privacy is threatened mainly through a breach of the aspects of confidentiality, identity theft and information collection. Confidentiality breaches usually involve an unauthorized disclosure of information to unauthorized people. Confidentiality is needed although it is not enough to guarantee people’s privacy (Anupam & Lauren, 2008). It can be eliminated through encryption of information and restriction of access to systems that hold personal information of individuals. Identity theft involves a scenario whereby a person usually uses the identity/ credentials of another person for ill intentions such as gaining access to information and data theft. Identity theft can be avoided by making use of double authentication and verification in order to ensure that a person is who he/she claims to be. Information collection serves to violate people’s privacy even in cases whereby the information is not used. In addition, information can be collected using methods that respect privacy, but they can be processed in a way that it interferes with privacy. This can be reinforced by ensuring information security and that information gathered is used for its intended purpose without making the information available to secondary users. This helps in eliminating potential cases associated with information disclosure .

4. (10%) RAM is a temporary storage space that is used to store program instructions and data. But accessing RAM is inherently inefficient because a CPU runs faster than RAM. What special storage space (other than RAM) might a computer access that also temporarily stores program instructions and data? Describe how this storage space works, where it is located in the computer and how the speed compares with other types of storage such as the RAM or hard drive.

5. (10%) Define the term ergonomics. Why is ergonomics important when a computer is designed? What purpose does ergonomics serve in an office or home setting? What are the consequences of a poor ergonomically-designed workspace?

6. (10%) Define the term computer-based information systems. In your definition, discuss three types of information systems, the audience or level of management served by each, and how the systems benefit the organization.

7. (10%) What are the differences and similarities between the four types of memory chips described in your textbook? In your response, demonstrate your understanding by using your own words. For a computer running Windows 8 and Microsoft Office 2013, what type of memory might you want and what is the recommended amount? There are different types of memory chips that can be used in enhancing computer memory; they include the Synchronous DRAM, Double Data Rate SDRAM, Rambus DRAM and DRAM. A notable similarity across all the types of the memory chips is their volatility, while they differ significantly on the data transfer rates and ultimately performance requirements. When upgrading to Windows 7 and Microsoft Office 2013, an upgrade on the RAM is required with at least 1 GB so as to meet the minimum system requirements. The following short answer questions are worth 3.5% each (total 35% for 10 questions).

7. When is it best to use a pie chart? Give two business examples in support of your answer. A pie chart is best when making statistical data comparisons and making visual representations of the data. Business examples that require the use of pie chart includes data representation of the volume of sales of the various products and representation of the percentage profit margins

8. What is conditional formatting with Highlight Cells Rules? Give one example of how this feature can be useful in business. Referencing in excel helps in the identification of cells or a range on an excel worksheet and serves to tell excel where to search for the values to be used in a formula. A relative cell reference implies that excel will adjust the formulas depending on where they have been copied. Absolute cell reference on the other hand does not serve to adjust the formula when they are copied to other cells. The F4 button can be used to switch between the absolute and relative cell reference. Absolute cell references are used in cases whereby one does not want excel to adjust the formulas. For instance, the formula (=A5+B8) can be converted to an absolute reference when copied to another cell by use of the dollar sign in the sections of the formula that do not need adjustments. This results to = (A5*$B$8).

10. What are the four ways to add a function to a formula? The four ways of adding a function to a formula in Excel include using the use of the Insert Function tool, using the Auto sum function, typing the formula and the function in the status bar and typing the formula and the function in the cell. It is important to note that using the cell and the status bar requires the use of “=” prior to insertion of the formula and function. For instance C5= (B4+B5)

11. Provide an example demonstrating the benefit of a relational database. Using a relational database helps in the avoidance of errors owing to the fact that data types in the data base are related, any cases of inconsistencies in the database and redundancy are likely to be indicated. This helps in facilitating data analysis and visualization, and manipulation of the data.

12. Why is it important to back up your database? What are two specific methods to perform this backup? Backing up the database plays an integral role in recovering the data in the event of natural disaster, damaged or hardware failure and theft of hardware.

13. What are the benefits of using Slide Master view in PowerPoint? The Slide Master views makes navigation in the slide presentation easy, facilitating the location of contents. The Master Slide View also facilitates the organization of the content in the slides by facilitating the insertion of footers, dates and slide numbers. The significant advantage of using a master slide is that it easy to modify the slides because a universal slide can be created to make adjustments to the rest of the slides, this helps in saving time in cases involving long presentations. 14. Describe how you would apply slide transitions to your PowerPoint presentation. What are two options you should consider when using transitions timing options for your animated objects? Slide transitions can be applied by going to the Animations Tab and selecting the type of transition applied to the presentation slides. The transition styles include fades and dissolves, wipes, push and cover, stripes and bars, and random transition style. 15. Name the five views available in Word, and identify which of those five is the default view. The views available in Word include print layout, Full Screen Reading, Web Layout, Outline and Draft views. The default view is the Print Layout view.

16. UMUC has recently conducted an analysis of the costs versus benefits of replacing WebTycho with a new learning management system. Staff, faculty and students were surveyed about their usage habits and opinions on the subject and ultimately the decision was made to purchase the new learning management system from an external vendor. Which three phases of the SDLC are described here?

Save the exam using the filename yourlastname Final (example: Brown Final) and submit your Completed Exam to your Assignment Folder by the deadline specified on your course syllabus schedule. No late exceptions.

Recommended publications