Tutorial pdt sem 1

670 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
670
On SlideShare
0
From Embeds
0
Number of Embeds
16
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Tutorial pdt sem 1

  1. 1. TUTORIAL 1: INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Development Of Information TechnologySTRUCTURED QUESTIONSAnswer all the questions.1. Define the following terms: a) Information Technology b) Stand-alone computer c) Mainframe d) Client-server network e) Distributed computing f) Cloud computing2. Give two (2) types of stand-alone computer.3. Give three (3) advantages of mainframe.4. List four (4) services that server can provide for users.5. Explain what are client and server in the client server network.6. Briefly explain three (3) components of cloud computing.7. Give two (2) critical factors that determining the efficiency of cloud computing.8. State four (4) top organizations that provide cloud computing.9. List two (2) examples of cloud application 1
  2. 2. TUTORIAL 2: INTRODUCTION TO INFORMATION TECHNOLOGY 1.2 The Application Of Information TechnologySTRUCTURED QUESTIONSAnswer all the questions.1. Discuss the applications of Information Technology in education.2. Discuss the applications of Information Technology in health care.3. Discuss the applications of Information Technology in finance.4. Discuss the applications of Information Technology in manufacturing.5. Discuss the applications of Information Technology in travel.6. Discuss the applications of Information Technology in government.7. Discuss the applications of Information Technology in science8. Discuss the applications of Information Technology in publishing 2
  3. 3. TUTORIAL3 : NETWORK TOPOLOGY 2.1.1 Network TopologySTRUCTURED QUESTIONSAnswer all the questions1. Define what network topology is.2. There are two types of layout in the network topology. State and give description on both network layout.3. List three (3) types of commonly used network topology.4. Draw a diagram on each of the network topologies. Give a brief explanation to all the topologies.5. List three (3) advantages of each network.6. List three (3) disadvantages of each network.7. Identify the topology, based on the given statement: Statement Topology This network required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. Data transmitted on a ring network travels from device to device around the entire ring in one direction. Hub and switch are commonly used device to provide a central connection point to all other devices in star network. On a ring network, a cable forms a close loop with all computers and devices arrange along the ring. All the computers and other devices on the network connect to a central device, thus forming a star. Consists of a single central cable (backbone), to which all computers and other devices connect. 3
  4. 4. 8. Identify the topology, based on the given diagram: Diagram Topology 9. Suppose you have a small office office with five computers and two printers and you want to set up a Local Area Network (LAN) using a star and ring topology. Justify two (2) reasons for your choice of the topology. 4
  5. 5. TUTORIAL 4: INTERNET TECHNOLOGY 2.1 Network Basics 2.1.2 Classification Of NetworkSTRUCTURED QUESTIONSAnswer all the questions.1. Define : a) Local Area Network (LAN). b) Metropolitan Area Network c) Wide Area Network.2. Differentiate all classification of network. Give three (3) differences.3. Give one (1) type of network for LAN, MAN and WAN.4. Sketch the diagram for each classification. 5
  6. 6. TUTORIAL 5: INTERNET TECHNOLOGY 2.2.1 Overview Of The Internet 2.2.1.1 Evolution Of Internet 2.2.1.2 The Internet ConnectionSTRUCTURED QUESTIONSAnswer all the questions1. Define the Internet.2. What are the goals of ARPANET?3. How did the Internet evolve?4. Who is W3C?5. What is Internet2?6. Give two types of Internet connection.7. Define dial-up connection.8. Define broadband connection.9. Define Internet Service Provider (ISP).10. Give three (3) responsibility of an ISP.11. List five (5) examples of the ISP.12. List the relationship between various/types Internet connection and transmission media, communication devices, ISP and data transfer rate.13. There ARE many companies that provide Internet connections in Malaysia. Users may choose from various types of Internet connection based on their requirements. a) Give the name of a network that had become the origin of today’s Internet. b) List three (3) examples of high speed Internet connection. c) State two (2) companies in Malaysia which are responsible to provide Internet access to clients. 6
  7. 7. TUTORIAL 6: INTERNET TECHNOLOGY 2.2.2.1 Web Browser 2.2.2.2 Web AddressSTRUCTURED QUESTIONSAnswer all the questions1. What is IP Address?2. Describe the purpose of IP address.3. Give an example of IP address.4. What is domain name?5. Give an example of domain name.6. Give the relationship between IP Address and Domain name.7. Complete the table below: Top Level Domain Description Top Level Domain Description .gov .mil .edu .biz .org .com .net8. What is Domain Name System?9. What is Web browser?10. Give one purpose of Web browser?11. List three (3) examples of Web browser.12. Describe Web page and Web site.13. A Web page has unique address called URL (Uniform Resource Locator) or Web address. What is Web address?14. List four components of URL.15. What is the function of http:// and https://?16. Complete the table below : Part Stand For http https 7
  8. 8. 17. Identify each part of the URL below; a) http://www.kmns.matrik.edu.my/prog_kualiti/takwim.html b) http://www.kmns.matrik.edu.my/sinfo/pensyarah.html c) http://www.kmns.matrik.edu.my/math/index.html d) http://portal.kmns.matrik.edu.my/login/index.php 8
  9. 9. TUTORIAL 7: INTERNET TECHNOLOGY 2.2.2.1 The Internet 2.2.2.3 Web Page Navigation 2.2.2.4 Information SearchingSTRUCTURED QUESTIONSAnswer all the questions.1. Differentiate between Hypertext and Hypermedia links.2. What is the purpose of tabbed browsing?3. What does the phrase surfing the web means?4. List two (2) type of search tool of information searching.5. Give the definition search engine.6. What is important of search engine.7. State 3 examples of search engine.8. Give the definition subject directory.9. State 3 examples of search directory.10. List a method that user can use to search for each type of search tool.11. What is the difference between Search engine and Subject directory.12. Irfan need to search information about e- services. As a friend, suggest him; a) Two (2) methods that he can use to search information above. b) Describe each of them 9
  10. 10. TUTORIAL 8: INTERNET TECHNOLOGY 2.3 Internet ServicesSTRUCTURED QUESTIONSAnswer all the questions1. Give definition of each internet services.2. State an example of each internet services.3. Briefly describe 2 (two) real time activities offering by internet services.4. Briefly describe 2 (two) not real time activities offering by internet services.5. Differentiate each of internet services below: a) E-mail b) Mailing list c) Instant messaging d) Chat e) Voice over Internet Protocol (VoIP) f) Newsgroup g) Message board h) File Transfer Protocol (FTP)6. Determine the suitable internet services for each statement below: a) Yusuf like to inform and invite his classmate to celebrate his wedding anniversary. What types of internet services that he might choose. ……………………………. b) The services provided by YouTube application that gave benefit to the internet users………… c) The services used by internet users similar with letter posting…………………… d) Users safe airtime credit charges when called someone…………………… e) It is odds and improper manner when someone talks about different topic when using these services……………… f) Sulaiman need to submit his assignment to the lecturer within 3 days. Suggest two (2) internet services that he can use…………………… g) Othman download his work resources from his pc at home while he still working at office .Suggest two (2) internet services that he can use……………………….. 10
  11. 11. TUTORIAL 9: INTERNET TECHNOLOGY 2.4 Types Of Web Sites 2.5 NetiquetteSTRUCTURED QUESTIONSAnswer all the questions.1. List types of web sites.2. Explain each type of web sites.3. Differentiate each type of web sites below: a) Blog and Wikipedia b) Marketing/businesses and Online social network c) Portal and Blog4. What is netiquette?5. Netiquette, or net etiquette, refers to etiquette on the Internet. How to get the good netiquette.6. List the area where good netiquette highly stressed.7. List the rules of netiquette on social interaction and communication electronically.8. List three (3) values is in the rules of netiquette.9. Identify the rules of netiquette refers to the statement below: Statement The rules of netiquette that must be followed Do not send uncompressed attachment. Avoid misinterpreted and use emotions to express emotion. To send the e-mail we must use proper grammar,spelling and punctuation. Do not use capital letter and use abbreviations and acronym for phrases. We must be polite which avoid offensive language. Hani read e-mail belonging to Irfan at her lap top. Dont use others images, content, etc without permission and dont forward email, or use website content without permission. 11
  12. 12. TUTORIAL 10 : COMPUTER ETHICS AND SECURITY 3.1 Computer Ethics 3.1.1 Intellectual PropertySTRUCTURED QUESTIONSAnswer all the questions.1. Define Intellectual Property.2. Give three (3) types of Intellectual Property.3. Define copyright.4. Define trademark.5. Define patent.6. Give one (1) difference of copyright, trademark, and patent Copyright Trademark Patent7. Explain the importance of Intellectual Property.8. Copyright is a legal term that describe the right given to the creator for their literary and artistic work. a) Give 3 examples of artistic work. b) Give 3 examples of literary work.9. Give the correct terminology ( term) for each definition below : Definition Terminology (Term) Refers to creations of the mind used in commerce ( Inventions, literary and artistic works, symbols, names images and designs) A distinctive sign which identifies certain goods or services. A group of ethical behavior rules developed by organizations or by a professional society Control the accessibility of information on the internet 12
  13. 13. TUTORIAL 11 : COMPUTER ETHICS AND SECURITY 3.2.1 Computer Security RisksSTRUCTURED QUESTIONSAnswer all the questions.1. Give the definition of computer security risk?2. State all types of attack that can be launch through networks?3. State and explain two type of hardware theft and vandalism.4. What is information theft.5. What type of computer security risk does software piracy fall to?6. Give two causes for system failure?7. List 3 common symptoms for a computer virus infection?8. List type of security measures9. Define what is and state process involved: a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspect : Awareness10. State the suitable security measures for each statements below. a) Haizam think to restore the files in his laptop by copying the backed up files to their original location. b) This process include encryption and decryption process. It also ensuring that no one can read the message except the intended receiver. c) The importance of this software is to protects a computer against viruses d) Hardware/software that protects a network’s resources from intrusion by users on another network. e) Ensure that computers are safe from malicious threat by routine check to update from new virus, worm or other malicious threat.11. State the suitable security measures for each computer security risk below. Computer Security Risk Security Measures Computer viruses and other malware Botnets, Denial of Service Attack and Spoofing Spyware/Adware Unauthorized access and use Hardware theft 13
  14. 14. Software theftInformation theftSystem Failure 14

×