CHAPTER 4# Questions
Information
systems in action
Q2)List the four components of an information system: Data, Hardware, Networks, Software.
Q4)Explain what the term ‘digital system’ means: Digital computer, a
computer handling information represented by discrete values. Digital electronics,
electronic circuits representing signals by discrete bands of analog levels,
rather than by a continuous range.
Q6)Identify a situation where downloading a file may be legal: It would be legal to download Free and open source software.
It is software that is released under licences that ensure that end users
always have the freedom to run the program, for any purpose, the freedom to
study how the program works, and adapt it to their needs, the freedom to
redistribute copies of the program to others
Q8)Explain how the concepts of copyright and intellectual
property are related: Both are legal rights for a business/corp to apply use and distribution
of its product.
Q10)Explain how peer-to-peer(P2P) file sharing works: The file-transfer load
is distributed between the computers exchanging files, but file searches and
transfers from your computer to others can cause bottlenecks.
Q12)Outline how artists may be disadvantaged by illegal
downloading and streaming: Illegal
downloading of an artist's work, be it an author or a musician, deprives that
artist of the residuals connect to the sale of his/her production.
Q14)Disscuss three ways that social media may become
problematic for sportspeople: Foul language, Entertainment from trolling and morale
issues arise.
Q16)Explain the purpose of a hashtag: A hashtag is
a type of label or metadata
tag used on social network and microblogging services which makes it easier for users to find messages with a
specific theme or content. Users create and use hashtags by placing the hash
character (or pound sign)
#
in front of a word or unspaced phrase, either in the main text of a
message or at the end. Searching for that hashtag will then present each
message that has been tagged with it.
Q18) Disscuss some of the negatives around the introduction
of new technology in the agricultural sector: The current work force in the
agriculture industry may have poor skill and require qualifications to operate
newer technology. Being in an isolated position means it is harder to find the
skilled workers.
Q20)Explain why e-commerce has become so popular: Shopping online makes it easy to
browse a full selection of products easily without having to sort through all
of the items commonly found in a brick and mortar store. eCommerce stores have
made it seamless to find exactly what you are looking for and complete the
transaction quickly and efficiently.
Q22)Explain what ‘Phishing’ means: Phishing is the
attempt to acquire sensitive information such as usernames, passwords, and
credit card details (and sometimes, indirectly, money), often for malicious
reasons, by masquerading as a trustworthy entity in an electronic communication.
Q24)Discuss three precautions people can take to reduce their
chances of both card and identity theft:
• Clear your logins and passwords. This is especially important if
you’ve been working on a public computer. Change logins and passwords monthly.
• Pay for online purchases
with your credit card, which has better guarantees under federal law than your
online payment services or your debit card.
• Be alert for phishing, a
trick in which spam or pop-ups mimic legitimate banks or businesses to obtain
your personal information, which they use to access your accounts. Always
verify that you’re on a familiar Web site with security controls before
entering personal data.
Q26)Outline two issues arising from the use of an Electronic
Health Record(HER):
-There are
chances of health records being sent to a wrong location.
-Network
failure can delay access to any records.
Expressing
opinions
Q28) Discuss why
social media sites are a popular outlet to express opinions about information
systems:
Q30) Describe the advantages of written comments over a rating
system for opinions: Written comments give a more detailed and in-depth review of the ‘persons’
opinion, it also gives a better idea of what the person is think. A rating system could mean anything, or
poorly display the users full opinion.
Methods and
techniques to acquire data and information
Q32) Explain the difference between primary and secondary
data sources: The difference between primary and second research collection is that primary research data collection
involves conducting research oneself, or using the data for
the purpose it was intended for. Secondary research data, on the other hand, was collected by a third
party or for some other purpose.
Q34)Discuss when a survey would be preferable to an interview
when collecting data: Surveys can be more in quantity and provide more perspectives from
people.
Q36)Explain how qualitative data differs from quantitative
data: Qualitative data collection is a method in which the
characteristics, attributes, properties, qualities, etc. of a phenomenon or
thing is described. It is the description of data in a language rather than in
numbers. This method does not measure the characteristics but describes them.
Q38)Explain how a histogram can be used to process qualitative data: A histogram is a graphical representation of the distribution of numerical data. It is an estimate of the probability distribution of a continuous variable (quantitative variable) and was first introduced by Karl Pearson.
Q38)Explain how a histogram can be used to process qualitative data: A histogram is a graphical representation of the distribution of numerical data. It is an estimate of the probability distribution of a continuous variable (quantitative variable) and was first introduced by Karl Pearson.
Data
integrity
Q40)List the three characteristics of quality data:
·
Degree of excellence exhibited by the data in relation to the
portrayal of the actual scenario.
·
The state of completeness, validity, consistency, timeliness and
accuracy that makes data appropriate for a specific use.
·
The totality of features and characteristics of data that bears
on its ability to satisfy a given purpose; the sum of the degrees of excellence
for factors related to data.
Storing
shared files
Q42)List three advantages of cloud computing: Flexibility, Document control and Security.
Mobile devices
and web design
Q44)Explain why websites used in mobile devices need to be
designed to differently to websites used for notebooks or desktops:
Q46)List three ways that data may be entered into a mobile
device:
** Unanswered Questions and untidy layout will be edited
shortly.
No comments:
Post a Comment