Wednesday, December 26, 2012

PTI - Chapter 11


Chapter 11
True/False
1.                T
2.                T
3.                F
4.                T
5.                F
6.                T
7.                T
8.                T
9.                F
10.             F
11.             T
12.             F

Multiple Choice
1.       B
2.       D
3.       A
4.       C
5.       C
6.       D
7.       D
8.       C

Matching
1.       J
2.       D
3.       E
4.       G
5.       I
6.       C
7.       B
8.       A
9.       H
10.   F

Short Answer
1.       There are two ways that an antivirus programs detect and identify a virus.
First, it scans/monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program a virus.
Secondly, it scans/monitors the programs by analyzing its behavior, such as modification of critical system files/important data files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.

 Virus hoax is a message warning the recipient of a non-existent computer virus threat. The message is usually a chain e-mail that tells the recipient to forward it to everyone they know.

2.       Energy star is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices. Energy efficient choices can save families about a third on their energy bill with similar savings of greenhouse gas emissions, without sacrificing features, style or comfort. Energy star helps you make the energy efficient choice.

How users should handle obsolete computers is the users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.

3.       Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.

Five ways to safeguard your personal information :
-      Don’t use your primary email address
-      Don’t give out your phone number
-      Don’t give up your birth date
-      Don’t ever give up your credit card number, driver’s lisence number, or social security number
-      Be savvy

4.       Two methods for avoiding phishing attacks :
-      Never fill out forms in e-mail messages that ask for personal financial information
-      If you do provide personal information (like a credit card number), do so only via a secure website or the telephone
How Clickjacking works :
Clickjacking is possible because seemingly harmless features of HTML web pages can be employed to perform unexpected actions. A clickjacked page tricks a user into performing undesired actions by clicking on a concealed link. On a clickjacked page, the attackers load another page over it in a transparent layer. The users think that they are clicking visible buttons, while they are actually performing actions on the hidden page. The hidden page may be an authentic page; therefore, the attackers can trick users into performing actions which the users never intended. There is no way of tracing such actions to the attackers later, as the users would have been genuinely authenticated on the hidden page.


5.       Many businesses use content filtering to limit employees’ Web access. One approach to content filtering is through a rating system of the Internet Content Rating Association (ICRA). Another approach to content filtering is to use filtering software. 
ICRA, which is similar to those used for movies and videos. Major Web sites such as Yahoo!, AOL, and MSN use the rating system established by the ICRA. If the content at the web site goes beyond the rating limits set in the Web browser software, a user cant access the website. Concerned parents can set the rating limits and prevent this limits from being changed by using a password.
 

Tuesday, December 25, 2012

PTI - Chapter 10

I.     True/False



    1.   T

    2.   T

    3.   F

    4.   T

    5.   F

    6.   F

    7.   T

    8.   T

    9.   F

    10. T



II.     Multiple Choices

    1. B

    2. A

    3. D

    4. B

    5. A

    6. B

    7. B

    8. A



III.     Matching

    1.  E

    2.  G

    3.  C

    4.  B

    5.  J

    6.  A

    7.   I

    8.  D

    9.  H

    10. F



IV.     Short Answer


1.   Validation is the process of comparing data with a set of rules or values to find out if the data is correct.

Five types of validity checks: Alphabetic checks, Numeric checks, Range checks, Consistency checks, Completeness checks.


2.    In data redundancy each department or area in an organization has its own files in a file processing system, by duplicating data it wastes resources such as storage space and people’s time, also data redundancy can increase the chance of error.

Isolated data often it’s difficult to access data stored in separate files in different department. Sharing data from multiple, separate files to generate such a list in a file processing system often is a complicated procedure and usually requires the experience of a computer programmer.


3.   When an organization uses a database approach, many programs and users share the data in the database.

Five strengths of the database approach:


·         Reduces Data Redundancy, most data items are stored in only one file, which greatly reduces duplicated data.

·         Improved data Integrity, when users modify data in the database, they make change to one file instead of multiple files.

·         Shared data, The data in a database environment belongs to and is shared, usually over a network, by the entire organization.

·         Easier Access, the database approach allows nontechnical users to access and maintain data, providing they have the necessary privileges.

·         Reduces Development Time, it often is easier and faster to develop programs that use the database approach.


4.   How to use a Simple Query Wizard:

·         Select the fields from the Available Fields list you want to be displayed in the resulting query.

·         Assign a name to the query, so that you can open it later.

·         View the query result on the screen.

Query by example is a feature that has a graphical user interface to assist users with retrieving data.


5.   Advantages of object-oriented database:

They can store more type of data, access this data faster, and allow programmers to reuse object.

Four examples of object-oriented database:

·         A multimedia database stores images, audio clips, and/or video clips, for example, a GIS database stores maps and other geographic data.

·         A groupware database stores documents such as schedules, calendars, manuals, memos, and reports.

·         A computer-aided design database stores data about engineering, architectural, and scientific design.

·         A hypertext database contains text links to other types of documents. A hypermedia database contains test, graphic, video, and sound.

Monday, October 29, 2012

PTI - Chapter 4 and 5



Chapter 4
͒͒͒ True or False :
1.       T
2.       F
3.       T
4.       T
5.       F
6.       T
7.       T
8.       T
9.       F
10.   F
11.   F
12.   F
  ͒ Multiple Choice :
1.       B
2.       A
3.       B
4.       B
5.       C
6.       B
7.       A
8.       D
͒  Matching :
1.       H
2.       A
3.       F
4.       B
5.       D
6.       E
7.       G
8.       C
9.       I
10.   J
͒ Short Answer :
1.       2 types of Tablet PC        : With The Slate Tablet PC and A Convertible Tablet PC.

The difference is the display attaches to the system unit with a swivel-type hinge, which enables a user to rotate the display and fold it down over the keyboard to look like a slate Tablet PC. Besides, the slate Tablet PC doesn’t include a keyboard, but there is a keyboard for the convertible Tablet PC. Also, the system unit of the slate Tablet PC is behind the display, but the system unit in the convertible Tablet PC is positioned below a keyboard.

2.       Motherboard    : The electronic components and circuitry of the system unit, such as the processor and memory, usually are part of or are connected to a circuit board.

Computer Chip                 : a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

3.       4 basic operations            : Fetching, decoding, executing, storing.

The functions of registers are include storing the location from where an instruction was fetched, storing an instruction while the control unit decodes it, storing data while the ALU computes it, and storing the results of a calculation.

4.       Computers, peripherals, smart phones, PDAs, cars, and other consumer electronics.

If we have a computer that is not Bluetooth enabled, we can purchase a Bluetooth wireless port adapter  that will convert an existing USB port into a Bluetooth port.

5.     Compressed air                : to blow away dust from any openings on the computer or device case, such as drives, slots, ports, and fan vents. And lint from difficult-to-reach areas, removes sticky liquid spilled on keyboards.

How to prepare for cleaning our computer : before cleaning the exterior of a computer or mobile device, turn it off, and if necessary, unplug it from the electrical outlet, remove its battery, and disconnect all cables from the ports.


Chapter 5 :

͒ True or False :

1.      T
2.      T
3.      F
4.      T
5.      T
6.      F
7.      F
8.      F
9.      F
10.  T
11.  T
12.  T

͒ Multiple Choice :

1.      C
2.      A
3.      B
4.      C
5.      D
6.      C
7.      C
8.      C

͒ Matching :

1.       B
2.       G
3.       D
4.       J
5.       E
6.       A
7.       H
8.       F
9.       I
10.   C

͒ Short Answer :

1.       3 types of mouse devices : optical mouse, laser mouse, air mouse.

Optical mouse   : devices that emit and sense light to detect mouse’s movement.
Laser mouse      : enabling users to place the mouse on rougher surfaces such as carpeting    and park benches.
Air mouse           : is a motion-sensing mouse allows you to control objects, media players, and slide shows by moving the mouse in predetermined directions through the air.

2.       Point                     : move the mouse until the pointer on the desktop is positioned on the item of choice. Example : position the pointer on the screen.
Rotate wheel     : roll the wheel forward and backward. Example : roll vertically (up and down).
Press wheel       : press the wheel button while moving the mouse. Example : scroll continuously.
Tilt wheel            : press the wheel toward the right or left. Example : scroll horizontally.
Triple-click           : quickly press and release the left mouse button three times without moving the mouse. Example : select a paragraph.

3.       OCR       : can read and convert text documents into electronic files.
OMR      : a technology that reads hand-drawn mark such as small circles or rectangles.

4.       The most widely biometric device today is a fingerprint reader.

A fingerprint reader, or scanner, captures curves and indentations of a fingerprint. The reader can be set up to perform different functions for different fingers; for example, one finger starts a program and another finger shuts down the computer.

5.       ADA is a wide-ranging civil rights law that prohibits, under certain circumstances, discrimination based on disability.

With gesture recognition, the computer will detect human motions. Computers with gesture recognition capability have the potential to recognize sign language, read lips, track facial movements, or follow eye gazes. For paralyzed or speech impaired individuals, a doctor will implant a computerized device into the brain.