Translate


My handsome mug

Search Yoleh's Blog

Tuesday, August 19, 2008

Essentials of Infocomm Technology: Spotted Sections For IT1106 2008 Semester 2 Exam

Chapter 1:

  • Data, Knowledge, Processing and Information Diagram and Relationship
  • Components of a PC: Input,Output,System unit, Communications Device and Storage Device
  • Advantages & Disadvantages of Using A PC
  • Essential Elements of Information Processing System
  • Difference Between Single & Multi-user System
Chapter 2:
  • 12 Different Types of Websites
  • Services Found On The Internet
  • Search Engine & Its Purpose
  • E-commerce: Definition and Types
Chapter 3:
  • Difference Between System Software & Application Software
  • Ways Software Are Distributed
  • Types of Application In A PDA/Business Software
  • Web-based Software: Definition & Its Advantages Over Installed Software
  • Types of Applications Used For Communication
Chapter 4:
  • Components Of The Motherboard
  • Primary Memory / Random Access Memory
  • CMOS: Is It Volatile/Non-Volatile? Why?
  • What Is A Port? Eg: SCSI, MIDI,USB, FireWire, Infrared & Bluetooth
  • Components Of A Cpu: Processor, Co-processor, ALU, System Clock
  • Phases Of The Machine Cycle: Fetch -> Decode -> Execute -> Store

Chapter 5:
  • Different Types Of Multimedia Input Devices
  • Display Quality of A CRT Monitor: Resolution, Pixel/Dot Pitch, Refresh Rate
  • Measurement of Data Storage: Eg 1024kb = 1mb, 1024mb = 1gb, 1024gb = 1tb
  • Characteristics of Storage Media (Pyramid Figure)
Chapter 6:
  • Utilities: Definition & Examples
  • Types of Operating Systems: Single-user, Multi-user, Single-tasking, Multi-tasking
  • Difference Between A Cold & A Warm Boot
  • Difference Between Multi-tasking & Multi-processing
  • Understanding What Memory Management Is And Its Activities
  • Types of Utilities: Firewall, Disk Scanner, Disk Defragmenter, Backup & Restore
  • What Is A Language Translator? What Are The 2 Types of A Language Translator
Chapter 7:
  • Communications Protocol
  • Definition Of A Local Area Network
  • Difference Between Peer-to-Peer & Client/Server LANs
  • Types of Network Topologies & Diagrams: Bus, Ring & Star
  • Types of Wireless Transmission Media: Broadcast, Cellular, Microwave, Space Station, Infrared
Chapter 8:
  • What Is Prototyping?
  • When Should A Prototype Be Used? Why?
  • 4 Types of Tests Under Implementation Phase: USIA==> Unit, System, Integration, Acceptance
  • Difference Between Low-Level & High-Level Programming Languages? Examples To Be Given As Well.
  • 3 Types of Control Structures: Sequence, Repetition/Iteration & Selection
  • Types Of Programming Errors: Syntax, Logic & Runtime
Chapter 9:
  • Data Hierarchy: Bit, Byte, Field, Record, Datafile, Database
  • Types of Data Validation: Alphabetic/Numeric/Alphanumeric, Consistency, Mandatory, Range Check, Check Digit
  • Advantages & Disadvantages Of Using A Database Management System (DBMS)
  • Features of A Database Management System: Data Dictionary/Repository, Data Retrieval & Maintenance, Data Security, Backup & Recovery
  • Types of Data Model: Networked Data Model, Hierarchical Data Model, Object-oriented Data Model, Relational Data Model & Multidimensional Data Model
  • Advantage Of Using A Multidimensional Data Model Over A Relational Data Model
Chapter 10:
  • Types of Computer Threats: Virus, Worm, Trojan Horse
  • Prevention Against Computer Threats: Antivirus, Firewall, Scanning of E-mail Attachments & Downloaded Files, Setting Of Macro Security Level In Programs
  • What Is Content Filtering?
  • How To Prevent Unauthorized Access To Information? 2 Factor Authentication: Possessed Object & PIN
  • How To Protect Against Hackers? Intrusion Detection System, Access Control & Audit Trail
  • Cookies & Their Relation To User Privacy
  • Information Privacy: Adware, Spyware, Spam & Phishing
Chapter 11:
  • 4 Categories Of Users: Executive Management, Middle Management, Operational Management & Non-Management Employees
  • Common Integrated Information Systems: HRIS, TPS, MIS, CRM, DSS & Expert System
  • Virtual Private Network
  • 4 Types Of Backup: Full, Incremental, Selective & Differential
  • Enterprise Hardware: RAID & Blade Server

Chapter 12:
  • Trends In Hardware: Accessories, Storage, Next Generation Computers & Others
All information is provided by NYP SIT Lecturer, Mr Chua Kok Leng.








Archive