2013-01-16

IT Certification - 01 PAT

KLIK DI SINI


Kevin Pratama / 1601211110
Dhio Etanasti /  1601274364
Monica Elizabeth / 1601211501
Priscilla / 1601212100

2013-01-10

Answers to Chapter 13

True/False

1. T
2. T
3. T
4. T
5. T
6. F
7. F
8. T
9. F
10.F


Multiple Choice

1. B) Interpreter
2. C) Event Driven
3. C) Java
4. A) SQL
5. A) VBScript
6. C) SharePoint Designer
7. B) Flash
8. B) Encapsulation

Matching

1. G
2. D
3. J
4. I
5. C
6. E
7. A
8. H
9. B
10.F


Short Answer

1. Compiler = Separate program that converts the entire source program into machine language before executing it.
   Interpreter = Read a code statement, converts it into one or more machine language instructions, and then execute those machine language instructions.

    -> Advantage     = When it find errors, it display feedback immediately.
    -> Disadvantage = Interpreted programs do not run as fast as compiled programs, this is because an interpreter must translate the source program to machine language each time the program executes.

2. Major benefits of OOP is the ability to reuse and modify existing objects.

RAD is a method of developing software, in which a programmer writes and implements a program in segments instead of waiting until the entire program is completed.

3. IDE includes tools for building graphical user interfaces, an editor for entering program code, a compiler and/or interpreter, and a debugger.


Visual Studio Suite supports different programming languages by means of language services, which allow the code editor and debugger to support (to varying degrees) nearly any programming language, provided a language-specific service exists. Built-in languages include C/C++[6] (via Visual C++), VB.NET (via Visual Basic .NET), C# (via Visual C#), and F# (as of Visual Studio 2010[7]). Support for other languages such as M, Python, and Ruby among others is available via language services installed separately. It also supports XML/XSLT, HTML/XHTML, JavaScript and CSS. Individual language-specific versions of Visual Studio also exist which provide more limited language services to the user: Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++.

4. XML is used in many aspects of web development, often to simplify data storage and sharing.

XML Separates Data from HTML

If you need to display dynamic data in your HTML document, it will take a lot of work to edit the HTML each time the data changes.

With XML, data can be stored in separate XML files. This way you can concentrate on using HTML/CSS for display and layout, and be sure that changes in the underlying data will not require any changes to the HTML.

With a few lines of JavaScript code, you can read an external XML file and update the data content of your web page.
XML Simplifies Data Sharing

In the real world, computer systems and databases contain data in incompatible formats.

XML data is stored in plain text format. This provides a software- and hardware-independent way of storing data.

This makes it much easier to create data that can be shared by different applications.
XML Simplifies Data Transport

One of the most time-consuming challenges for developers is to exchange data between incompatible systems over the Internet.

Exchanging data as XML greatly reduces this complexity, since the data can be read by different incompatible applications.
XML Simplifies Platform Changes

Upgrading to new systems (hardware or software platforms), is always time consuming. Large amounts of data must be converted and incompatible data is often lost.

XML data is stored in text format. This makes it easier to expand or upgrade to new operating systems, new applications, or new browsers, without losing data.
XML Makes Your Data More Available

Different applications can access your data, not only in HTML pages, but also from XML data sources.

With XML, your data can be available to all kinds of "reading machines" (Handheld computers, voice machines, news feeds, etc), and make it more available for blind people, or people with other disabilities.
XML is Used to Create New Internet Languages

A lot of new Internet languages are created with XML.

Here are some examples:

    XHTML
    WSDL for describing available web services
    WAP and WML as markup languages for handheld devices
    RSS languages for news feeds
    RDF and OWL for describing resources and ontology
    SMIL for describing multimedia for the web


5. -> Review the program code for any dead code and remove it.
   -> Review all the documentation.

Proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

Answers to Chapter 12

True/False

1. T
2. T
3. F
4. F
5. F
6. T
7. F
8. F
9. T
10.T
11.F

Multiple Choice

1. A) Extreme Project Management
2. B) PERT Chart
3. C) Project Request
4. A) Mandated by Management Or Some Other Governing Body
5. C) Decision Table
6. D) System Proposal
7. A) Computer-Aided Software Engineering (CASE)
8. D) Acceptance

Matching

1. H
2. E
3. A
4. B
5. I
6. G
7. F
8. J
9. C
10.D

Short Answer

1. (620) Set of activities used to build an information system.

-> Planning
    @ Review project requests
    @ Prioritize project requests
    @ Allocate resources
    @ Form project development team

-> Analysis
    @ Conduct preliminary investigation
    @ Perform detailed analysis activities;
        * Study current system
        * Determine user requirements
        * Determine solution
-> Design
    @ Acquire hardware and software, if necessary
    @ Develop details of system

-> Implementation
    @ Develop programs, if necessary
    @ Install and test new system
    @ Train users
    @ Convert to new system

-> Operation, Support, and Security
    @ Perform maintenance activities
    @ Monitor system performance
    @ Assess system security

2. (624) -> Operational Feasibility
-> Schedule Feasibility
-> Technical Feasibility
-> Economic Feasibility

@ Review Documentation
@ Observe
@ Survey
@ Interview
@ JAD Sessions
@ Research

3. UML is a graphical tool that enables analysts to document a system. It consist of many irrelevant diagrams.

-> Case diagram graphically shows how user interact with the information system.
-> Class diagram graphically show classes and subclasses in a system.

4.(645) -> Perform maintenance activities
   -> Monitor system performance
   -> Assess system security

@ Corrective Maintenance
    Process of diagnosing and correcting errors in an information system.
@ Adaptive Maintenance
    Process of including new features or capability in an information system. To perform adaptive maintenance, the analyst returns tot he planning phase.
@ Perfective Maintenance
    Make the information system more reliable and efficient if the system is determined to be inefficient or unstable at any point.

5. Computer security plan is writing all of the safeguards that are in place to protect an organization's information assets.

@ Identify all information assets of an organization including hardware, software, documentation, procedures, people, data, facilities, and supplies.
@ Identify all security risks that may cause an information asset loss.
@ For each risk, identify the safeguard that exist to detect, prevent, and recover from a loss.

Answer to Chapter 11

True/False

1. T
2. T
3. F
4. T
5. F
6. T
7. T
8. T
9. T
10.T
11.T
12.F


Multiple Choice

1. B) Rootkit
2. D) All of The Above
3. A) Denial of Service Attack
4. C) Digital Forensics
5. C) Hardware Theft
6. D) Encryption Key
7. D) Power Usage Effectiveness (PUE)
8. C) Social Engineering


Matching

1. J
2. D
3. E
4. G
5. I
6. C
7. B
8. A
9. H
10.F

Short Answer

1. Antivirus scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified.

-> Virus hoax is an email message that warns users of nonexistent virus or other malware.


2. Encourages manufacturers to create energy-efficient devices that required little power when they are not in use.
-> Do not store it, recycle and refurbish it.

3. The right of individuals and companies to deny or restrict the collection and use of information about them.

-> Fill in only necessary information on rebate, warranty and registration forms.
-> Have an unlisted or unpublished telephone number.
-> Do not write your telephone number on charge or credit receipts.
-> Avoid shopping club and buyer cards.
-> Purchase goods with cash, rather then credit or checks.

4. -> Dont click web site link in an e-mail message; instead, retype the web address in your browser.
->  Install phishing filter.

Click-jacking tricking a Web user into clicking on something different to what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages


5. Many businesses use content filtering to limit employees' web access.

ICRA created a content description system which allowed webmasters and digital content creators to self-label their content in categories such as nudity, sex, language (vulgar terms etc.), violence, other potentially undesired material and online interactivity such as social networking and chat. There are context variables such as art, medicine and news—for example, a piece of content or site can be described as having depictions of nudes, but they are in an artistic context. A key point is that ICRA does not rate internet content, nor do they make value judgements about sites – the content providers self-label, and then parents and other concerned adults make a decision as to what is or is not appropriate for themselves or their children.

The labelling was done using a web-based questionnaire. The content creators checked which of the elements in the questionnaire are present or absent from their Web sites, and a small file is automatically generated using the RDF format, which is then linked to the content on one or more domains. Formerly, the system was based on PICS.

Users, especially parents of young children, could then use content filtering software to allow or disallow various types of content. One such application, ICRAplus, was maintained by ICRA itself. ICRA also had a validator which tested all versions of ICRA and old RSACi labels.

The descriptive vocabulary was drawn up by an international panel and designed to be as neutral and objective as possible. It was revised in 2005 to enable easier application to a wide range of digital content, not just websites.

The ICRA also intended to launch a service to verify the accuracy of ICRA labels and to provide this information to third-party tools and services, such as search engines.

Alternative labelling projects include Quatro, an EU-funded project which integrates content labels with quality and trust marks, and its successor, QuatroPlus.

2013-01-09

Answer to Chapter 10

True/False

1. T
2. T
3. F
4. T
5. F
6. F
7. T
8. T
9. F
10.T

Multiple Choice

1. B) Timely
2. A) Composite Key
3. D) File Maintenance
4. B) Determines Whether A Number Is Within A Specified Range
5. A) Less Complexity
6. B) Data Dictionary
7. B) Principle of Highest Access
8. A) Decides on The Proper Placement of Fields

Matching

1. E
2. G
3. C
4. B
5. J
6. A
7. I
8. D
9. H
10.F

Short Answer

1. The process of checking that a software system meets specifications and that it fulfills its intended purpose.

-> ALpha/Numeric Check
-> Range Check
-> Consistency Check
-> Completeness Check
-> Check Digit


2. It cause same fields to be stored in multiple files, which is a waste of storage space and people's time, and also increase the chance of errors.

-> Difficult to be accessed.

3. Approach whereby a pool of related data is shared by multiple application programs; offers significant advantages over traditional file-based approach.

(page 525-526)
-> Reduce Data Redundancy
-> Improve Data Integrity
-> Shared Data
-> Easier Access
-> Reduce Development Time

4. Guide for user to creating a query step by step.

-> Database query language for relational database.

5. Store more type of data, access this data faster, allow programmers to reuse objects, stores unstructured data more efficiently than a relational database.

-> Multimedia database
    Stored image, audio clips, and/or video clips.
-> Groupware database
    Stores document such as schedules, calendars, manuals, memos, and reports.
-> Computer-aided design (CAD)
    Stores data abour engineering, architectural, and scientific designs.
-> Hypertect database
    Contains links to other types of documents

Answer to Chapter 9

Chapter 9

True/False

1. T
2. F
3. T
4. F
5. T
6. T
7. F
8. F
9. F
10.T
11.T

Multiple Choice

1. C) Visual Voice Mail
2. C) A Web Conference
3. C) Provides for storage and management of a company's documents
4. D) Mashup
5. B) Hubs and switches
6. A) RFID
7. D) Coaxial Cable
8. B) Mobile TV


Matching

1. E
2. J
3. H
4. D
5. F
6. A
7. G
8. B
9. C
10.I

Short Answer

1. The capability that allows users to send and receive short text messages, typically fewer than 300 characters on phone or another mobile devices or computer.

->Mobile to mobile : send a message from your mobile device to another mobile device.

->Mobile to email: send a message from your mobile device to an email address anywhere in the world

->Web to mobile: send a message from a text messaging website to a mobile device, or request that a web site alert a mobile device with messages of breaking news and other updates, such as sports scores, and weather forecast.

->Mobile to provider: send a message by entering common short code (CSC) which is a four or five digits number assigned to a specific  content or, wireless service provider followed by the message, such as a vote for television program contestant or entry for sweepstakes.



2. Accepting and analyzing signals sent by satellites in order to determine the receiver’s geographical location.

 -> The data obtained from GPS then users apply it such as: creating a map, ascertaining the best route between two points, locating a lost person or stolen object, determining altitude and calculating speeds.


3. Different area of coverage.

->LAN = network that connects computers and device in limited geographical area such as a home, and office building.

->MAN = high speed network that connects local area networks in the metropolitan area such as a city or town.

->WAN = network that covers a large geographical area such as a country or the world.

Wireless LAN is a LAN that uses no physical wires. To access wireless LAN computer must have built-in wireless capability or the appropriate wireless network card, USB network adapter, or flash card.



4. Layout of the computers and device in communications network

->ISDN lines, DSL, FTTP, T-carrier lines and ATM


5. ISDN modem, DSL modem and cable modem

-> ISDN modem: send digital data and information from a computer to an ISDN line and receives digital data and information from an ISDN line

-> DSL modem:  send digital data and information from a computer to a DSL line and receive digital   data and information from DSL line

-> Cable modem: called a broadband modem, is a digital modem that sends and receives digital data over the cable television (CATV) network 

Answer to Chapter 8

True/False

1. F
2. F 
3. T 
4. T 
5. F 
6. T 
7. T 
8. F 
9. F 
10.T  

Multiple Choice

1. B) CMOS
2. B) Windows ReadyBoost
3. C) Gadget
4. A) Index
5. C) Contiguous sectors, which speeds
6. D) Windows Firewall
7. C) Adware
8. A) Phising Filter

Matching

1. F
2. C
3. G
4. D
5. E
6. H
7. A
8. B
9. I
10.J

Short Answer

1. ->Cold boot is when turning on a computer that has been power off completely, where as warm boot is the process of using the operating system to restart computer. Warm boot properly closes any running processes and programs, however it does not save any  unsaved work

   ->Memory resident means it remains in memory while the computer is running. Non resident memory is instructions remain on a storage medium until they are needed.



2. ->User interface is control how you enter data and instructions and how information is displayed on the screen.

->graphical user interface ; user interact with menus and visual images such as button and other graphical objects to issue commands.

Command Line Interface; users types command or presses special keys on the keyboard (such as function keys or key combination) to enter data and instructions.

3. ->The purpose is to provide updates to the programs include fixes to programs bugs ,or error, enhancements to security, modifications to device drivers, access to new or expanded components such as desktop themes or games and even updates to applications soft ware on the computer such as a web browser or an email programs.
-> After users who have registered and or to activated their software.

4. ->During the backup process, the utility monitors progress and alerts you if it needs additional media, such as another disc. Many backup programs compress, or shrink the size of, file during the backup process.
     -> Restore utility reserves the process and return backed files to their original form.

5. ->Windows Embedded CE is a scaled down windows operating system  designed for use on communications, entertainment and computing devices with limited functionally.
 ->Windows mobile is an operating system based on windows embedded CE, includes functionality, programs and a user interface designed for specific types of smart phones and PDAs.
->Blackberry operating system runs on handheld devices supplied by RIM (Research In Motion).
->Google Android is an operating system designed by google for mobile devices.

=>Windows embedded CE use for  VoIP telephones, industrial control devices, digital cameras, point of sale terminals, automated teller machine , digital photo frames. Besides that windows embedded CE support color, sounds multitasking, multimedia, email, internet access and web browsing.
=> Windows mobile operating system users have access to all the basic PIM (Personal Information Manager) functions such as contact list, schedules, task, calendars, and  notes. Also provides  numerous additional features that allows users to check email, browse the web, listen to music, take picture and etc.
=>Blackberry operating system uses to managing schedule, contacts and appointment as well as phone capabilities and provide wireless functionality
=>Google android allows programmers to design programs specifically for devices supporting this operating system.