CIB-answer 3
CIB-answer 3
CIB-answer 3
Suppose
are asked to determine a budget for computers for your department next year,
2) Define the following five categories of software: retail, custom, web application,
3) Define at least three of the different types of websites, giving examples wherever
4) List at least five different practices to adopt in order to protect your computer from
6) What is TCP/IP and how does it work? Define packet switching in the Internet.
9) Select one of the topics in the group assignments, and discuss the key points of the
topic and describe the way it may bring a change to business as well as your life.
10) What do you know about Internet of Things? Give an example about this.
11) List and briefly describe the drivers of supply chain performance, and explain how
A CPU can contain one or more processing units. Each unit is called a core. A core contains an ALU,
control unit and registers. CPUs with multiple cores have more power to run multiple programs at the
same time.
The data bus is a set of parallel wires or connectors that transports data between the processor and
main memory. Therefore, increasing the size of the data bus improves the system performance of the
computer.
Cache memory
Cache is a small amount of memory which is a part of the CPU - closer to the CPU than RAM. It is used to
temporarily hold instructions and data that the CPU is likely to reuse. The more cache there is, the more
data can be stored closer to the CPU.
Clock speed
The clock speed - also known as clock rate - indicates how fast the CPU can run. This is measured in
megahertz (MHz) or gigahertz (gHz) and corresponds with how many instruction cycles the CPU can deal
with in a second. A faster CPU uses more energy and creates more heat.
Budgeting process
1. Communicate details of budget policy and guidelines to those people responsible for preparing
the budget.
2. Determine the factor that restricts output.
3. Preparation of the sales budget.
4. Initial preparation of budgets.
5. Negotiation of budgets with higher management.
6. Coordination and review of budgets.
7. Final acceptance of budgets.
8. Ongoing review of the budgets.
2.
retail software: mass produced, copyrighted software that meets the needs of a wide variety of users;
can be preinstalled or purchased.
open source software: software provided for use, modification, and redistribution; two main
advantages- users who modify share improvements & customers can personalize to meet their needs
3.
Blog Websites
These types of websites can just offer reading material. But, they can also sell products like a book
written by the blog’s author or ad space.
The difference between a blog and a regular website is that a blog is a website to create if you only want
to publish blog articles.
Social media
We all know Facebook and Twitter, but social media sites can take many other forms. These sites are
usually created to let people share thoughts, images or ideas, or simply connect with other people in
relation to a certain topic.
Educational
Educational websites are also quite self-explanatory. These websites are designed to display information
on certain topics, either using interactive games or engaging designs to keep the user hooked.
4.
5.
Feel preoccupied with the Internet (meaning thinking about previous online activity or
anticipating the next online session)
Feel the need to use the Internet with increasing amounts of time in order to achieve
satisfaction
Feel restless, moody, depressed or irritable when attempting to cut down or stop Internet use
Stay online longer than originally intended
Use technology as a way of escaping problems or relieving feelings of helplessness, guilt, anxiety
or depression
6.
The Transmission Control Protocol (TCP) is a communications standard that enables application
programs and computing devices to exchange messages over a network. It is designed to send packets
across the internet and ensure the successful delivery of data and messages over networks.
The Internet Protocol (IP) is the method for sending data from one device to another across the
internet. Every device has an IP address that uniquely identifies it and enables it to communicate with
and exchange data with other devices connected to the internet.
The TCP/IP model was developed to enable the accurate and correct transmission of data between
devices. It breaks messages into packets to avoid having to resend the entire message in case it
encounters a problem during transmission. Packets are reassembled once they reach their destination.
packet switching is a method of grouping data that is transmitted over a digital network into packets.
Packets are made of a header and a payload. Data in the header is used by networking hardware to
direct the packet to its destination, where the payload is extracted and used by application software.
Packet switching is the primary basis for data communications in computer networks worldwide.
7.
The file based data management systems contained multiple files that were stored in many different
locations in a system or even across multiple systems.
This is prevented in a database as there is a single database and any change in it is reflected
immediately. Because of this, there is no chance of encountering duplicate data.
Sharing of Data
In a database, the users of the database can share the data among themselves. There are various levels
of authorization to access the data, and consequently the data can only be shared based on the correct
authorization protocols being followed.
Many remote users can also access the database simultaneously and share the data between
themselves.
Data Integrity
Data integrity means that the data is accurate and consistent in the database. Data Integrity is very
important as there are multiple databases in a DBMS. All of these databases contain data that is visible
to multiple users. So it is necessary to ensure that the data is correct and consistent in all the databases
and for all the users.
Data Security
Data Security is vital concept in a database. Only authorized users should be allowed to access the
database and their identity should be authenticated using a username and password. Unauthorized
users should not be allowed to access the database under any circumstances as it violates the integrity
constraints.
8.
10.
IoT Definitions: The term Internet of Things generally refers to scenarios where network connectivity
and computing capability extends to objects, sensors and everyday items not normally considered
computers, allowing these devices to generate, exchange and consume data with minimal human
intervention. There is, however, no single, universal definition.
Industrial Internet
Industrial Internet is the new buzz in the industrial sector, also termed as Industrial Internet of Things
(IIoT). It is empowering industrial engineering with sensors, software and big data analytics to create
brilliant machines.
11.
PRODUCTION – This driver can be made very responsive by building factories that have a lot of excess
capacity and use flexible manufacturing techniques to produce a wide range of items.
INVENTORY – Responsiveness can be had by stocking high levels of inventory for a wide range of
products.
LOCATION – A location decision that emphasizes responsiveness would be one where a company
establishes many locations that are close to its customer base.
TRANSPORTATION – Responsiveness can be achieved by a transportation mode that is fast and flexible
such as trucks and airplanes.
INFORMATION – The power of this driver grows stronger every year as the technology for collecting and
sharing information becomes more wide spread, easier to use, and less expensive.
IT is a wide-ranging term that describes the technological transfer, storage and accessibility of
information. The emphasis of IT is to manage technology and help users make the most of its
functionality.
The internet has created a venue that allows anyone to compete. In this environment, companies really
have to wow a customer in order to make them stay, because in reality, the customer has all the power
and they know it. Companies need to listen to their customer's needs and deliver, or else they might
lose customer loyalty.
Global Transactions
It’s becoming much easier to purchase products from websites based in other countries, which in turn is
creating a problem for local merchants
Online marketing has become its own niche over the past decade, but now more and more marketing
strategies are evolving to fit e-commerce trends. Those who have the capabilities are using big data to
create personalized shopping experiences for their online visitors.
Mobile Purchasing
Smartphones and tablets are providing more internet access to anyone anywhere. Companies that fail
to have “mobile-friendly” sites are losing out on a heap of business.
Social Networking
E-commerce sites that have a strong social presence will outlast those who don’t. Through social media,
retailers are able to connect with shoppers where they spend the most time online.