Monday 9 May 2016

Chapter 4# Q's

CHAPTER 4# Questions
Information systems in action
Q2)List the four components of an information system: Data, Hardware, Networks, Software.
Q4)Explain what the term ‘digital system’ means:  Digital computer, a computer handling information represented by discrete values. Digital electronics, electronic circuits representing signals by discrete bands of analog levels, rather than by a continuous range.  
Q6)Identify a situation where downloading a file may be legal:  It would be legal to download Free and open source software. It is software that is released under licences that ensure that end users always have the freedom to run the program, for any purpose, the freedom to study how the program works, and adapt it to their needs, the freedom to redistribute copies of the program to others  
Q8)Explain how the concepts of copyright and intellectual property are related: Both are legal rights for a business/corp to apply use and distribution of its product.
Q10)Explain how peer-to-peer(P2P) file sharing works:  The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks. 
Q12)Outline how artists may be disadvantaged by illegal downloading and streaming:  Illegal downloading of an artist's work, be it an author or a musician, deprives that artist of the residuals connect to the sale of his/her production.
Q14)Disscuss three ways that social media may become problematic for sportspeople: Foul language, Entertainment from trolling and morale issues arise.
Q16)Explain the purpose of a hashtag: A hashtag is a type of label or metadata tag used on social network and microblogging services which makes it easier for users to find messages with a specific theme or content. Users create and use hashtags by placing the hash character (or pound sign) # in front of a word or unspaced phrase, either in the main text of a message or at the end. Searching for that hashtag will then present each message that has been tagged with it.
Q18) Disscuss some of the negatives around the introduction of new technology in the agricultural sector: The current work force in the agriculture industry may have poor skill and require qualifications to operate newer technology. Being in an isolated position means it is harder to find the skilled workers.
Q20)Explain why e-commerce has become so popular: Shopping online makes it easy to browse a full selection of products easily without having to sort through all of the items commonly found in a brick and mortar store. eCommerce stores have made it seamless to find exactly what you are looking for and complete the transaction quickly and efficiently.
Q22)Explain what ‘Phishing’ means: Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
Q24)Discuss three precautions people can take to reduce their chances of both card and identity theft:  
• Clear your logins and passwords. This is especially important if you’ve been working on a public computer. Change logins and passwords monthly.
• Pay for online purchases with your credit card, which has better guarantees under federal law than your online payment services or your debit card.
• Be alert for phishing, a trick in which spam or pop-ups mimic legitimate banks or businesses to obtain your personal information, which they use to access your accounts. Always verify that you’re on a familiar Web site with security controls before entering personal data.
Q26)Outline two issues arising from the use of an Electronic Health Record(HER):
-There are chances of health records being sent to a wrong location.
-Network failure can delay access to any records.  
Expressing opinions
Q28)  Discuss why social media sites are a popular outlet to express opinions about information systems:
Q30) Describe the advantages of written comments over a rating system for opinions: Written comments give a more detailed and in-depth review of the ‘persons’ opinion, it also gives a better idea of what the person is think.  A rating system could mean anything, or poorly display the users full opinion.
Methods and techniques to acquire data and information
Q32) Explain the difference between primary and secondary data sources:  The difference between primary and second research collection is that primary research data collection involves conducting research oneself, or using the data for the purpose it was intended for. Secondary research data, on the other hand, was collected by a third party or for some other purpose.
Q34)Discuss when a survey would be preferable to an interview when collecting data: Surveys can be more in quantity and provide more perspectives from people.
Q36)Explain how qualitative data differs from quantitative data: Qualitative data collection is a method in which the characteristics, attributes, properties, qualities, etc. of a phenomenon or thing is described. It is the description of data in a language rather than in numbers. This method does not measure the characteristics but describes them.

Q38)Explain how a histogram can be used to process qualitative data: A histogram is a graphical representation of the 
distribution of numerical data. It is an estimate of the probability distribution of a continuous variable (quantitative variable) and was first introduced by Karl Pearson.
Data integrity
Q40)List the three characteristics of quality data:
·         Degree of excellence exhibited by the data in relation to the portrayal of the actual scenario.
·         The state of completeness, validity, consistency, timeliness and accuracy that makes data appropriate for a specific use.
·         The totality of features and characteristics of data that bears on its ability to satisfy a given purpose; the sum of the degrees of excellence for factors related to data.

Storing shared files
Q42)List three advantages of cloud computing:  Flexibility, Document control and Security.
Mobile devices and web design
Q44)Explain why websites used in mobile devices need to be designed to differently to websites used for notebooks or desktops:  
Q46)List three ways that data may be entered into a mobile device:  

** Unanswered Questions and untidy layout will be edited shortly.

No comments:

Post a Comment