Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

D08 Microcomputer And Networked Systems Question Paper

D08 Microcomputer And Networked Systems 

Course:

Institution: Imis question papers

Exam Year:2001



QUESTION 1
Describe the following pairs of terms, stating any difference or similarities between them.
a) Repeaters and Bridges
b) MODEM and Integrated Services Digital Network (ISDN)
c) Packet and Circuit switching
d) Serial and Parallel transmission

QUESTION 2
Health and safety at work is an extremely important aspect of office and workstation design.
a) What is the meaning of the term ergonomics?
b) Name three different types of injury that users of badly designed computer equipment may be susceptible to.
c) Before a new computer system is implemented, there are a number of preparatory activities that must take place. Name FOUR of these activities.
d) When a client orders a computer system from a supplier, a contract should be agreed between the client and the supplier. Name and briefly describe FOUR elements that should be included in that contract.

QUESTION 3
Databases are an extremely powerful and flexible method of storing data to provide management with information relating to their business.
a) Name TWO software database packages.
b) Name FOUR attributes that might be found in a database table that would relate to the entity PRODUCT.
c) Explain the following terms as applied to a database:
i. Form
ii. Macro
iii. Table
d) What does the abbreviation SQL stand for?
e) Draw the FOUR standard symbols that are used in a Data Flow Diagram.
f) In the context of a database, what is the purpose of the technique of normalization?

QUESTION 4
As an expert in computer networking, you have been asked to provide an explanation of certain networking terminology.
a) The 7 layers of the ISO OSI model are Application, Presentation, Session, Transport, Network, Data Link and Physical. Describe each of these layers.
b) Give THREE reasons why layering is desirable within network architecture.
c) Which THREE of the seven layers of the OSI model are implemented when a Network Interface Card (Network Adapter) is installed into a computer?




QUESTION 5
Before purchasing hardware or software there are many items that need to be considered in order that a suitable choice may be made.
a) Briefly describe THREE things that ought to be considered before buying:
i. Software packages
ii. Hardware
b) Name a task that each of the following software packages would be suitable for:
i. CAD
ii. Spreadsheet
iii. Word Processor
iv. Browser
c) What does the term UPS stand for and what is its purpose?

QUESTION 6
You work for a small company as IT manager. Your company has just changed from a manual method of working to a compound system. You have been requested to provide a jargon-free description of the following terms to help the staff understand the new system.
a) RAM
b) Laser printer
c) Function keys (as found on the keyboard)
d) Scanner
e) Tape streamer

QUESTION 7
Many companies are benefiting from computerization of aspects of their business. Whilst there are benefits, security issues need to be considered too.
a) Describe TWO commonly used authentication techniques that are used to ensure that only authorized personnel are able to gain access to a computer system/
b) Describe the operation of RSA or Public-key encryption.
c) The manager of a computer network has to assign differing levels of access to network users depending on the needs of each user. Name and briefly describe FIVE different access privilege levels that are available to be assigned to users.
d) Give FOUR reasons why a company may decide to computerize its data-to-day operations.
e) Describe briefly TWO applications of multimedia that a business may benefit from using.

QUESTION 8
Before any company installs a computer system of any kind, a feasibility study should take place.
a) What are the TWO fundamental questions that a feasibility study must answer?
b) During the feasibility study, each section of the business’s work that is considered for computerization will come under scrutiny. What areas should the system investigation cover for each of the sections due to the computerization?
c) Describe the Medium Access Control (MAC) technique that is used in a Token Ring network.
d) Errors in transmission may be detected by using a parity check. Using odd parity, what would the parity digit be for the data 0111011?
e) Show how a parity check may miss errors that have taken place.
f) Name THREE different communication media that may be used to carry data across a network.






More Question Papers


Popular Exams



Return to Question Papers