Final Examination Semester 3 / Year 2011

Size: px
Start display at page:

Download "Final Examination Semester 3 / Year 2011"

Transcription

1 Final Examination Semester 3 / Year 2011 COURSE : INFORMATION TECHNOLOGY COURSE CODE : BUSS1063 TIME : 2 1/2 HOURS DEPARTMENT : COMMERCE LECTURER : LEE HUAH Student s ID : Batch No. : Notes to candidates: 1) The question paper consists of 4 pages, 4 sections and 27 questions. 2) Answer all questions. 3) Use the Standardized Answer Form for all sections. 4) Return the question paper with your answer booklet.

2 Section A: Choose one proper answer for the following questions. (10 questions X 2 = 20 marks) 1) Some computers are able to maintain simultaneous connections to many users through a technique called A) nanolinking. B) hot syncing. C) spider syncing. D) parallel processing. E) timesharing. 2) Which of these statements is true? A) Software companies could produce error-free products if they were willing to reduce profits. B) Some large software systems, such as Linux, contain no bugs. C) Software testing can prove the existence of bugs, but it cannot prove that the software is 100 percent bug-free. D) Techniques for producing bug-free software are used for critical military applications, but they re too expensive for most other applications. E) All of these statements are true. 3) What does the speed of the computer depend on? A) The architecture of the processor B) The clock speed of the processor C) The word size of the processor D) The number of processors E) All of the above 4) Hard disk drives have the disadvantage that A) they hold less information than CDs do. B) they are more likely to fail than other computer components. C) they cannot be backed up. D) their contents are lost when they lose power. E) All of the above 5) An application program is A) a program that lets users create new applications. B) a program that lets users apply for jobs. C) a program that lets someone use a computer for a particular purpose. D) a program that updates the operating system of a computer. E) none of the above. 1/4

3 6) Which of these is the correct hierarchy for a standard database? A) Database, field, record, table B) Database, table, record, field C) Database, record, field, table D) Database, record, table, field E) Database, table, field, record 7) What happens when you boot up a PC? A) Portions of the operating system are copied from disk into memory. B) Portions of the operating system are copied from memory onto disk. C) Portions of the operating system are compiled. D) Portions of the operating system are emulated. E) None of the above 8) Which of the following does not affect bandwidth? A) The amount of network traffic B) The software protocols of the network C) The type of network connection D) The type of information being transmitted E) The physical media that make up the network 9) Which of the following is not typically performed by management information systems (MIS)? A) Providing detailed reports, summary reports, and exception reports B) Extracting relevant data from databases of the transaction processing systems C) Providing managers with information needed to make decisions D) Making recommendations for improving performance E) Organizing and summarizing data in useful ways 10) Which statement about machine translation is true? A) The most successful programs do word-by-word translation backed up by huge dictionaries containing all known words in both languages. B) The most successful programs extract the meaning of the underlying text then use their understanding of the author s intent to guide the translation. C) Many programs use a statistics-based approach based on a huge number of examples of correct and incorrect translations. D) The most successful machine language programs first translate the source text into a neutral language, usually Esperanto, then translate from the neutral language into the desired target language. E) Computer translation programs are generally written in natural languages such as COBOL or BASIC. 2/4

4 Section B: Key terms test questions. (10 questions X 3 = 30 marks) Explain the following key terms which used in information technology. 1) Social responsibility 2) Decision table 3) Firmware 4) Optical character recognition (OCR) 5) Phishing 6) Firewall 7) Algorithm 8) Relational database 9) Social networking 10) File-management utility 3/4

5 Section C: Short answer questions. (5 questions X 6 = 30 marks) 1) What kinds of computer applications require the speed and power of a supercomputer? Give three examples. 2) Describe three techniques used in game-playing software, and explain how they can be applied to other AI applications. 3) Give three general reasons for the importance of computer networking. 4) Most computer software falls into one of three categories: compilers and other translator programs, software applications, and system software. Describe and give examples of each. 5) Describe at least three functions of an operating system. Section D: Essay questions. (2 questions X 10 = 20 marks) 1) In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals? (10 Marks) 2) What is the difference between writing a program and designing an information system? How are they related?. (10 Marks) 000 4/4

N04/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Monday 15 November 2004 (afternoon) 1 hour 15 minutes INSTRUCTIONS TO CANDIDATES

N04/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Monday 15 November 2004 (afternoon) 1 hour 15 minutes INSTRUCTIONS TO CANDIDATES c IB COMPUTER SCIENCE STANDARD LEVEL PAPER 1 DIPLOMA PROGRAMME PROGRAMME DU DIPLÔME DU BI PROGRAMA DEL DIPLOMA DEL BI N04/5/COMSC/SP1/ENG/TZ0/XX 88047013 Monday 15 November 2004 (afternoon) 1 hour 15 minutes

More information

Final Examination Semester 2 / Year 2011

Final Examination Semester 2 / Year 2011 Southern College Kolej Selatan 南方学院 Final Examination Semester 2 / Year 2011 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS 1003 TIME : 2 HOURS 30 MINUTES DEPARTMENT : COMPUTER SCIENCE LECTURER : DR. LEE

More information

CSC 101 Questions: Chapter 1: Multiple Choice: 1. When did the World Wide Web become available to users? a. 1960s b. 1970s c. 1980s d.

CSC 101 Questions: Chapter 1: Multiple Choice: 1. When did the World Wide Web become available to users? a. 1960s b. 1970s c. 1980s d. CSC 101 Questions: Chapter 1: Multiple Choice: 1. When did the World Wide Web become available to users? a. 1960s b. 1970s c. 1980s d. 2000s 2. When did Web 2.0 sites like MySpace and Flickr become popular?

More information

BA.(Hons) Communication. Cohort: BC/05/PT Year 2. Examinations for / Semester 2

BA.(Hons) Communication. Cohort: BC/05/PT Year 2. Examinations for / Semester 2 BA.(Hons) Communication Cohort: BC/05/PT Year 2 Examinations for 2005-2006 / Semester 2 MODULE: IT and Communication MODULE CODE: COMM 1401 Duration: 2 Hours Reading Time: 10 Minutes Instructions to Candidates:

More information

IT Information Systems & Technology Multiple Choice Question Paper

IT Information Systems & Technology Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information

More information

Final Examination Semester 3 / Year 2008

Final Examination Semester 3 / Year 2008 Southern College Kolej Selatan 南方学院 Final Examination Semester 3 / Year 2008 COURSE : COMPUTER ORGANIZATION & OPERATING SYSTEM COURSE CODE : CSIS2053 CLASS : CS06-C, CS07-B,CS07-C TIME : 2 ½ HOURS DEPARTMENT

More information

Introduction to Computer World Fall 2016

Introduction to Computer World Fall 2016 Introduction to Computer World Fall 2016 Introduction to Information and Communication Technologies CSD 102 Email: mehwish.fatima@ciitlahore.edu.pk Website: https://sites.google.com/a/ciitlahore.edu.pk/ict/

More information

CSCA0102 IT and Business Applications Chapter 7. Data and Information

CSCA0102 IT and Business Applications Chapter 7. Data and Information CSCA0102 IT and Business Applications Chapter 7 Data and Information Data and Information Data Data is raw, unorganized facts that need to be processed. Data can be something simple and seemingly random

More information

What Operating Systems Do An operating system is a program hardware that manages the computer provides a basis for application programs acts as an int

What Operating Systems Do An operating system is a program hardware that manages the computer provides a basis for application programs acts as an int Operating Systems Lecture 1 Introduction Agenda: What Operating Systems Do Computer System Components How to view the Operating System Computer-System Operation Interrupt Operation I/O Structure DMA Structure

More information

Lecture 2 Winter 2006 Essentials of Computing

Lecture 2 Winter 2006 Essentials of Computing Information Technology Lecture 2 Winter 2006 Essentials of Computing 1 Objectives Identify the five components of a computer system. Explain the four categories of hardware and their functions. Discuss

More information

Types and Functions of Win Operating Systems

Types and Functions of Win Operating Systems LEC. 2 College of Information Technology / Software Department.. Computer Skills I / First Class / First Semester 2017-2018 Types and Functions of Win Operating Systems What is an Operating System (O.S.)?

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management

More information

Lecture 2 - Fundamental Concepts

Lecture 2 - Fundamental Concepts Lecture 2 - Fundamental Concepts Instructor : Bibhas Ghoshal (bibhas.ghoshal@iiita.ac.in) Autumn Semester, 2015 Bibhas Ghoshal IOSY 332C & IOPS 332C: OS Autumn Semester, 2015 1 / 43 Lecture Outline Operating

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Silberschatz, Galvin and Gagne 2009 Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System

More information

Introduction to Computers. Created By: N.AlJaffan Modified By:S.Abudawood. Copyright 2008 N.AlJaffan KSU

Introduction to Computers. Created By: N.AlJaffan Modified By:S.Abudawood. Copyright 2008 N.AlJaffan KSU Introduction to Computers Created By: N.AlJaffan Modified By:S.Abudawood 1 Introduction to Computers What Is A Computer? Computer is an electronic device: device: accepts input processes data stores data

More information

7/20/2008. What Operating Systems Do Computer-System Organization

7/20/2008. What Operating Systems Do Computer-System Organization Introduction to Operating Systems Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management

More information

SALVO-a fourth-generation language for personal computers

SALVO-a fourth-generation language for personal computers SALVO-a fourth-generation language for personal computers by MARVIN ELDER Software Automation, Inc. Dallas, Texas ABSTRACT Personal computer users are generally nontechnical people. Fourth-generation products

More information

Chapter 1: Introduction. Chapter 1: Introduction

Chapter 1: Introduction. Chapter 1: Introduction Chapter 1: Introduction Chapter 1: Introduction What Operating Systems Do Computer-System Organization Computer-System Architecture Operating-System Structure Operating-System Operations Process Management

More information

Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc.

Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc. An Operating System (OS) is an interface between computer user and computer hardware. An operating system is software which performs all the basic tasks like file management, memory management, process

More information

Faculty of Environment and Technology

Faculty of Environment and Technology Faculty of Environment and Technology Academic Year: 12/13 Examination Period: January Module Leader: Module Code: Title of Module: Craig Duffy UFCEHX-20-2 Computer Networks and Operating Systems Duration

More information

CONCEPTS OF MANAGEMENT COMPUTING

CONCEPTS OF MANAGEMENT COMPUTING CONBUS1 NOVEMBER 2013 EXAMINATION DATE: 11 NOVEMBER 2013 TIME: 14H00 17H00 TOTAL: 100 MARKS DURATION: 3 HOURS PASS MARK: 40% (BUS-EDP) CONCEPTS OF MANAGEMENT COMPUTING THIS EXAMINATION PAPER CONSISTS OF

More information

General Objective:To understand the file system management. Specific Objectives: At the end of the unit you should be able to:

General Objective:To understand the file system management. Specific Objectives: At the end of the unit you should be able to: F2007/Unit8/1 Unit 8 OBJECTIVES General Objective:To understand the file system management Specific Objectives: At the end of the unit you should be able to: define the file system management list the

More information

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them) Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication

More information

What Is A Trap Instruction Explain Its Use In >>>CLICK HERE<<<

What Is A Trap Instruction Explain Its Use In >>>CLICK HERE<<< What Is A Trap Instruction Explain Its Use In Operating Systems Explain how applications interact with the operating system and how control flows something on its behalf. Return from trap handlers using

More information

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective CSET 3400 Unix System Administration (3 semester credit hours) CSET Elective IT Elective Current Catalog Description: Commands and methods to install and manage a UNIX system. System administration topics

More information

Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016. By Sarah Ameer

Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016. By Sarah Ameer Unit 11 Computer Networks P1 M1 D1 Deadline:29/09/2016 By Sarah Ameer P1- Uses and features of a computer Network What is a computer network? This is group of computer systems which are linked together

More information

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

All Rights Reserved Index No. SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME All Rights Reserved Index No No. of Pages - 10 No of Questions - 05 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I INTAKE VIII (GROUP B)

More information

CompTIA FC0-U51. CompTIA IT Fundamentals.

CompTIA FC0-U51. CompTIA IT Fundamentals. CompTIA FC0-U51 CompTIA IT Fundamentals http://killexams.com/exam-detail/fc0-u51 or intranet against unauthorized access from the Internet or other outside networks. It restricts inbound and outbound access

More information

Topics. Operating System. What is an Operating System? Let s Get Started! What is an Operating System? Where in the Book are we?

Topics. Operating System. What is an Operating System? Let s Get Started! What is an Operating System? Where in the Book are we? Topics Operating System What is an OS? OS History OS Concepts OS Structures Introduction Let s Get Started! What is an Operating System? What are some OSes you know? Guess if you are not sure Pick an OS

More information

UNIT I OPERATING SYSTEMS OVERVIEW

UNIT I OPERATING SYSTEMS OVERVIEW UNIT I OPERATING SYSTEMS OVERVIEW Computer System Overview-Basic Elements, Instruction Execution, Interrupts, Memory Hierarchy, Cache Memory, Direct Memory Access, Multiprocessor and Multicore Organization.

More information

Unit 2 : Computer and Operating System Structure

Unit 2 : Computer and Operating System Structure Unit 2 : Computer and Operating System Structure Lesson 1 : Interrupts and I/O Structure 1.1. Learning Objectives On completion of this lesson you will know : what interrupt is the causes of occurring

More information

EEE 435 Principles of Operating Systems

EEE 435 Principles of Operating Systems EEE 435 Principles of Operating Systems Operating System Structure (Modern Operating Systems 1.7) Outline Operating System Structure Monolithic Systems Layered Systems Virtual Machines Exokernels Client-Server

More information

Final Examination Semester 2 / Year 2007

Final Examination Semester 2 / Year 2007 Southern College Kolej Selatan Final Examination Semester 2 / Year 2007 COURSE : COMPUTER SYSTEM COURSE CODE : CSIS1003 TIME : 2 1/2 HOURS DEPARTMENT : COMPUTER SCIENCE CLASS : CS07-B LECTURER : ROSLINDA

More information

Last Class: Memory management. Per-process Replacement

Last Class: Memory management. Per-process Replacement Last Class: Memory management Page replacement algorithms - make paging work well. Random, FIFO, MIN, LRU Approximations to LRU: Second chance Multiprogramming considerations Lecture 17, page 1 Per-process

More information

European University of Lefke. Instructor: Dr. Arif SARI

European University of Lefke. Instructor: Dr. Arif SARI European University of Lefke CIS 105 Operating Systems Instructor: Dr. Arif SARI Email: asari@eul.edu.tr Introduction 1.1 Silberschatz, Galvin and Gagne 2009 Chapter 1: Introduction, Silberschatz, Galvin

More information

Operating Systems: The Genie in the Computer. Chapter 6: Operating Systems: The Genie in the Computer. What is an operating system?

Operating Systems: The Genie in the Computer. Chapter 6: Operating Systems: The Genie in the Computer. What is an operating system? Chapter 6: : The Genie in the Computer What do you have left on your computer after you strip away all of the games and application programs you bought and installed? : The Genie in the Computer In this

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

Types of Computers. Computer Technology (S1 Obj 1-1)

Types of Computers. Computer Technology (S1 Obj 1-1) Types of Computers Computer Technology (S1 Obj 1-1) Introduction There are many different types of computers available today. They are categorized into different types depending on their size and processing

More information

Chapter 1: Introduction. Operating System Concepts 8th Edition,

Chapter 1: Introduction. Operating System Concepts 8th Edition, Chapter 1: Introduction, Administrivia Project 0 due Monday. Reading: 2.1 2.7. Next Time: Operating system structure. 1.2 Outline Process management. Storage management and characteristics. Miscellaneous

More information

Computer Architecture 2/26/01 Lecture #

Computer Architecture 2/26/01 Lecture # Computer Architecture 2/26/01 Lecture #9 16.070 On a previous lecture, we discussed the software development process and in particular, the development of a software architecture Recall the output of the

More information

Assignment Number 8 Lab Assignment Due Date: Wednesday, October 31, 2018 CS 1057 C Programming - Fall 2018

Assignment Number 8 Lab Assignment Due Date: Wednesday, October 31, 2018 CS 1057 C Programming - Fall 2018 Assignment Number 8 Lab Assignment Due Date: Wednesday, October 31, 2018 CS 1057 C Programming - Fall 2018 Purpose: create a batch program use a version control system to obtain data (git) read and process

More information

DM510 Operating Systems. Jacob Aae Mikkelsen

DM510 Operating Systems. Jacob Aae Mikkelsen DM510 Operating Systems Jacob Aae Mikkelsen DM510 2014 DM510 Course Introduction Teacher: Jacob Aae Mikkelsen ( jamik@imada.sdu.dk ) Teaching Assistant: Daniel Fentz Johansen ( dfjohansen@gmail.com ) Course

More information

Operating System Concepts

Operating System Concepts Operating System Concepts Introduction INFO 2603 Platform Technologies 1 Week 3: 17-Sept-2018 Outline Operating System Software Main Memory Management Processor Management Device Management File Management

More information

Introduction to Information Technology ITP 101x (4 Units)

Introduction to Information Technology ITP 101x (4 Units) Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of

More information

CHAPTER 16 - VIRTUAL MACHINES

CHAPTER 16 - VIRTUAL MACHINES CHAPTER 16 - VIRTUAL MACHINES 1 OBJECTIVES Explore history and benefits of virtual machines. Discuss the various virtual machine technologies. Describe the methods used to implement virtualization. Show

More information

Topics. Operating System I. What is an Operating System? Let s Get Started! What is an Operating System? OS History.

Topics. Operating System I. What is an Operating System? Let s Get Started! What is an Operating System? OS History. Topics Operating System I What is an OS? OS History OS Concepts OS Structures Introduction Let s Get Started! What is an Operating System? What are some OSes you know? Pick an OS you know: What are some

More information

C++ Programming Language Lecture 1 Introduction

C++ Programming Language Lecture 1 Introduction C++ Programming Language Lecture 1 Introduction By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department Introduction In this course you will learn C++ and the legacy C code. It is

More information

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b.

8. A is approximately one billion bytes a. Kilobyte b. Bit c. Gigabyte d. Megabyte 9. SMPT, FTP and DNS are applications of the layer a. Data link b. SET 19 1. All of the following are examples of real security and privacy risks except a. Hackers b. Spam c. Viruses d. Identity theft 2. A(n) --- system is a small, wireless handheld computer that scans

More information

FINAL QUIZ. Marlene Galea

FINAL QUIZ. Marlene Galea FINAL QUIZ Marlene Galea Give 2 possible disadvantages of computerising a system Give 2 possible disadvantages of computerising a system - Dependency : users may grow increasingly dependent on the computerised

More information

Types of Data. PE 231 Education Media AND Technology. Information. Assessment. Information Concepts

Types of Data. PE 231 Education Media AND Technology. Information. Assessment. Information Concepts Types of Data Data Represented by PE 231 Education Media AND Technology Alphanumeric data Image data Audio data Numbers, letters, and other characters Graphic images or pictures Sound, noise, tones Video

More information

Managed Services Rely on us to manage your business services

Managed Services Rely on us to manage your business services Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these

More information

CS6401- Operating System QUESTION BANK UNIT-I

CS6401- Operating System QUESTION BANK UNIT-I Part-A 1. What is an Operating system? QUESTION BANK UNIT-I An operating system is a program that manages the computer hardware. It also provides a basis for application programs and act as an intermediary

More information

Read this before starting!

Read this before starting! Points missed: Student's Name: Total score: /100 points East Tennessee State University Department of Computer and Information Sciences CSCI 4717 Computer Architecture TEST 1 for Fall Semester, 2006 Section

More information

Lecture #10 Context Switching & Performance Optimization

Lecture #10 Context Switching & Performance Optimization SPRING 2015 Integrated Technical Education Cluster At AlAmeeria E-626-A Real-Time Embedded Systems (RTES) Lecture #10 Context Switching & Performance Optimization Instructor: Dr. Ahmad El-Banna Agenda

More information

UGANDA NATIONAL EXAMINATIONS BOARD Uganda Certificate of Education COMPUTER STUDIES. Paper 1. 2 hours 30 minutes

UGANDA NATIONAL EXAMINATIONS BOARD Uganda Certificate of Education COMPUTER STUDIES. Paper 1. 2 hours 30 minutes 840/1 Computer Studies Paper 1 Oct./Nov. 2009 2 1 /2 Hours UGANDA NATIONAL EXAMINATIONS BOARD Uganda Certificate of Education COMPUTER STUDIES Paper 1 2 hours 30 minutes Candidate s Name: Index No.. Candidate

More information

LECTURE SCHEDULE 2. Units of Memory, Hardware, Software and Classification of Computers

LECTURE SCHEDULE 2. Units of Memory, Hardware, Software and Classification of Computers LECTURE SCHEDULE 2 Units of Memory, Hardware, Software and Classification of Computers Units of Memory The memory unit is the principal storage of the computer. All the data and instructions that the computer

More information

Election System and Software

Election System and Software Election System and Software Examination Report January 2007 Tom Watson Examiner The following systems were examined in Austin on January 18 and 19, 2007: AutoMARK Voter Assist Terminal (VAT) 1.1.2258

More information

Examinations for Semester I / 2010 Semester II

Examinations for Semester I / 2010 Semester II Programme BSc (Hons) Accounting with Finance BSc(Hons) Financial Services Law BSc (Hons) Management -BATCH 1 G BSc (Hons) Management (Batch 1) General & Law BSc (Hons) Management (Batch 2) Mktg & Fin BSc

More information

Chapter 1: Introduction Operating Systems MSc. Ivan A. Escobar

Chapter 1: Introduction Operating Systems MSc. Ivan A. Escobar Chapter 1: Introduction Operating Systems MSc. Ivan A. Escobar What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. Operating system

More information

C H A P T E R 1. Introduction to Computers and Programming

C H A P T E R 1. Introduction to Computers and Programming C H A P T E R 1 Introduction to Computers and Programming Topics Introduction Hardware and Software How Computers Store Data How a Program Works Using Python Computer Uses What do students use computers

More information

peer) Poorly-connected hosts subscribe to a forwarding server packet compression and aggregation altering visual and temporal perceptions

peer) Poorly-connected hosts subscribe to a forwarding server packet compression and aggregation altering visual and temporal perceptions Peer-Server Systems Peer-to to-peer: minimizes latency, consumes bandwidth Client-server: effective aggregation and filtering, increases latency Hybrid peer-server: over short-haul, haul, high- bandwidth

More information

DL/1. - Application programs are independent from the physical storage and access method.

DL/1. - Application programs are independent from the physical storage and access method. DL/1 OVERVIEW The historical approach to data processing was to have individual files dedicated to each application. This led to considerable data duplication, and therefore wasted space and additional

More information

CS420: Operating Systems

CS420: Operating Systems OS Overview James Moscola Department of Engineering & Computer Science York College of Pennsylvania Contents of Introduction slides are courtesy of Silberschatz, Galvin, Gagne Operating System Structure

More information

OPERATING SYSTEMS UNIT - 1

OPERATING SYSTEMS UNIT - 1 OPERATING SYSTEMS UNIT - 1 Syllabus UNIT I FUNDAMENTALS Introduction: Mainframe systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered Systems Real Time Systems Handheld Systems -

More information

OPERATING SYSTEMS: Lesson 1: Introduction to Operating Systems

OPERATING SYSTEMS: Lesson 1: Introduction to Operating Systems OPERATING SYSTEMS: Lesson 1: Introduction to Jesús Carretero Pérez David Expósito Singh José Daniel García Sánchez Francisco Javier García Blas Florin Isaila 1 Why study? a) OS, and its internals, largely

More information

Chapter 1 Introduction to Computers and C++ Programming

Chapter 1 Introduction to Computers and C++ Programming Chapter 1 Introduction to Computers and C++ Programming 1 Outline 1.1 Introduction 1.2 What Is a Computer? 1.3 Computer Organization 1.4 Evolution of Operating Systems 1.5 Personal Computing, Distributed

More information

1. A washing machine is controlled by microprocessors. The name given to this type of microprocessor is: A a mainframe computer. B an output device

1. A washing machine is controlled by microprocessors. The name given to this type of microprocessor is: A a mainframe computer. B an output device SECTION A Answer ALL questions. For each question, choose an answer A, B, C or D and put a cross in the box. Mark only one answer for each question. If you change your mind, put a line through the box

More information

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System

Preview. Process Scheduler. Process Scheduling Algorithms for Batch System. Process Scheduling Algorithms for Interactive System Preview Process Scheduler Short Term Scheduler Long Term Scheduler Process Scheduling Algorithms for Batch System First Come First Serve Shortest Job First Shortest Remaining Job First Process Scheduling

More information

Lecture 1 Introduction (Chapter 1 of Textbook)

Lecture 1 Introduction (Chapter 1 of Textbook) Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 1 Introduction (Chapter 1 of Textbook) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The slides

More information

Chapter 1: Introduction. Operating System Concepts 9 th Edit9on

Chapter 1: Introduction. Operating System Concepts 9 th Edit9on Chapter 1: Introduction Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Objectives To describe the basic organization of computer systems To provide a grand tour of the major

More information

High Performance Computing. What is it used for and why?

High Performance Computing. What is it used for and why? High Performance Computing What is it used for and why? Overview What is it used for? Drivers for HPC Examples of usage Why do you need to learn the basics? Hardware layout and structure matters Serial

More information

M12/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Friday 18 May 2012 (afternoon) 1 hour 30 minutes INSTRUCTIONS TO CANDIDATES

M12/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Friday 18 May 2012 (afternoon) 1 hour 30 minutes INSTRUCTIONS TO CANDIDATES M12/5/COMSC/SP1/ENG/TZ0/XX 22127013 COMPUTER SCIENCE STANDARD LEVEL PAPER 1 Friday 18 May 2012 (afternoon) 1 hour 30 minutes INSTRUCTIONS TO CANDIDATES Do not open this examination paper until instructed

More information

Responding to Tracking Items

Responding to Tracking Items Responding to Tracking Items Flags and Referrals are intended to prompt students to take some action. Assigned advisors are included in notice of these flags because they are a key resource to students

More information

THE UNIVERSITY OF THE WEST INDIES

THE UNIVERSITY OF THE WEST INDIES THE UNIVERSITY OF THE WEST INDIES Semester l Semester II Supplemental/Summer School Examinations of December /April/May /July 2017 Originating Campus: Cave Hill Mona St. Augustine Course Code and Title:

More information

Workloads. CS 537 Lecture 16 File Systems Internals. Goals. Allocation Strategies. Michael Swift

Workloads. CS 537 Lecture 16 File Systems Internals. Goals. Allocation Strategies. Michael Swift Workloads CS 537 Lecture 16 File Systems Internals Michael Swift Motivation: Workloads influence design of file system File characteristics (measurements of UNIX and NT) Most files are small (about 8KB)

More information

Part 4: Using the Power Behind the Process Entering Data & Generating Reports

Part 4: Using the Power Behind the Process Entering Data & Generating Reports Part 4: Using the Power Behind the Process Entering Data & Generating Reports The Power Behind the Process, PowerPath s specially designed software, is an essential piece of the PowerPath System. PowerPath

More information

Remediation Clarifications

Remediation Clarifications Remediation Clarifications Transcript Title Slide (no narration) Webcast Focus This webcast contains scenarios about the online examinations during the initial training of students when remediation is

More information

Example: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps

Example: CPU-bound process that would run for 100 quanta continuously 1, 2, 4, 8, 16, 32, 64 (only 37 required for last run) Needs only 7 swaps Interactive Scheduling Algorithms Continued o Priority Scheduling Introduction Round-robin assumes all processes are equal often not the case Assign a priority to each process, and always choose the process

More information

Fundamentals of Networking Types of Topologies

Fundamentals of Networking Types of Topologies Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two

More information

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer General Certificate of Education (Ord.Level) Examination 2007 Information & Communication Technology I One hour Note: Answer all questions. In each of the questions 1 to 40 pick one of the alternatives

More information

Information Communications Technology (CE-ICT) 6 th Class

Information Communications Technology (CE-ICT) 6 th Class Information Communications Technology (CE-ICT) 6 th Class Lecture 2: Computer Concepts (Part A) Lecturer: Objectives Hardware Concepts Types of Computer Components of a Computer System Computer Performance

More information

Wed, October 12, 2011

Wed, October 12, 2011 Practical Occlusion Culling in Killzone 3 Michal Valient Lead Tech, Guerrilla B.V. Talk takeaway Occlusion culling system used in Killzone 3 The reasons why to use software rasterization (Some) technical

More information

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Network Technology

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems and Network Technology COURSE OUTLINE SCHOOL: School of Engineering Technology and Applied Science DEPARTMENT: Information and Communication Engineering Technology (ICET) PROGRAM: Computer Systems and Network Technology COURSE

More information

Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published

Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level INFORMATION TECHNOLOGY 9626/12 Paper 1 Theory MARK SCHEME Maximum Mark: 90 Published This mark

More information

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS

ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon. Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Website: http:// ICT-U CAMEROON, P.O. Box 526 Yaounde, Cameroon Schools and Programs DETAILED ICT-U PROGRAMS AND CORRESPONDING CREDIT HOURS Important note on English as a Second Language (ESL) and International

More information

CSC Operating Systems Spring Lecture - II OS Structures. Tevfik Ko!ar. Louisiana State University. January 17 th, 2007.

CSC Operating Systems Spring Lecture - II OS Structures. Tevfik Ko!ar. Louisiana State University. January 17 th, 2007. CSC 4103 - Operating Systems Spring 2008 Lecture - II OS Structures Tevfik Ko!ar Louisiana State University January 17 th, 2007 1 Announcements Teaching Assistant: Asim Shrestrah Email: ashres1@lsu.edu

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon

More information

Announcements. Operating System Structure. Roadmap. Operating System Structure. Multitasking Example. Tevfik Ko!ar

Announcements. Operating System Structure. Roadmap. Operating System Structure. Multitasking Example. Tevfik Ko!ar CSC 4103 - Operating Systems Spring 2008 Lecture - II OS Structures Tevfik Ko!ar Teaching Assistant: Asim Shrestrah Email: ashres1@lsu.edu Announcements All of you should be now in the class mailing list.

More information

Chapter 12. File Management

Chapter 12. File Management Operating System Chapter 12. File Management Lynn Choi School of Electrical Engineering Files In most applications, files are key elements For most systems except some real-time systems, files are used

More information

bt-loganalyzer Administrators Companion Reporting

bt-loganalyzer Administrators Companion Reporting bt-loganalyzer Administrators Companion for Reporting Burst Technology, Inc. Contents Pre-Defined Report Definitions... 5 Sub Report Definitions and Samples... 9 User Audit Detail - Number of Web Pages

More information

CSC Operating Systems Fall Lecture - I Introduction. Tevfik Ko!ar. Louisiana State University. August 25 th, Contact Information

CSC Operating Systems Fall Lecture - I Introduction. Tevfik Ko!ar. Louisiana State University. August 25 th, Contact Information CSC 4103 - Operating Systems Fall 2009 Lecture - I Introduction Tevfik Ko!ar Louisiana State University August 25 th, 2009 1 Contact Information Instructor: Prof. Tevfik Kosar Office: 292 Coates (also

More information

GCSE (9 1) Mathematics J560/05 Paper 5 (Higher Tier) Practice paper Set 2 Time allowed: 1 hour 30 minutes

GCSE (9 1) Mathematics J560/05 Paper 5 (Higher Tier) Practice paper Set 2 Time allowed: 1 hour 30 minutes H GCSE (9 1) Mathematics J560/05 Paper 5 (Higher Tier) Practice paper Set 2 Time allowed: 1 hour 30 minutes You may use: geometrical instruments tracing paper Do not use: a calculator First name Last name

More information

AMD RAID Installation Guide

AMD RAID Installation Guide AMD RAID Installation Guide 1. AMD BIOS RAID Installation Guide.. 2 1.1 Introduction to RAID.. 2 1.2 RAID Configurations Precautions 3 1.3 Installing Windows 7 / 7 64-bit / Vista TM / Vista TM 64-bit /

More information

SUMMARY OF INFORMATION ON EACH COURSE

SUMMARY OF INFORMATION ON EACH COURSE 1. Name of Course 2. Course Code 3. Status of Course [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level 3 Diploma MQF Level 4 Bachelor MQF Level 6 Masters MQF Level 7 Doctoral MQF Level

More information

Final Examination Semester 3 / Year 2008

Final Examination Semester 3 / Year 2008 Southern College Kolej Selatan 南方学院 Final Examination Semester 3 / Year 2008 COURSE : JAVA PROGRAMMING COURSE CODE : PROG1114 TIME : 2 1/2 HOURS DEPARTMENT : COMPUTER SCIENCE CLASS : CS08-A + CS08-B LECTURER

More information

CSE Computer Security (Fall 2006)

CSE Computer Security (Fall 2006) CSE 543 - Computer Security (Fall 2006) Lecture 18 - Network Security November 7, 2006 URL: http://www.cse.psu.edu/~tjaeger/cse543-f06/ 1 Denial of Service Intentional prevention of access to valued resource

More information

8/25/2016. What Is a Computer? The Components of a Computer

8/25/2016. What Is a Computer? The Components of a Computer Discovering Computers & Microsoft Office 2010 Selected Slides from Chapters 1-5 What Is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory

More information

Overview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition

Overview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition William Stallings Computer Organization and Architecture 6th Edition Chapter 4 Cache Memory Overview IN this chapter we will study 4.1 COMPUTER MEMORY SYSTEM OVERVIEW 4.2 CACHE MEMORY PRINCIPLES 4.3 ELEMENTS

More information