MedVision ad

IPT Questions and Answers (1 Viewer)

BPunjabi

Banned
Joined
Mar 29, 2015
Messages
76
Gender
Undisclosed
HSC
2004
  • I think we should start a topic where we all ask and answer questions whilst referring to useful information:

    Ill start first: ( If no one answers the questions within one day I will put up the answers encase anyone needs it for studying)

    So these are the major three Topics:
    [size=18pt]Project Management:[/size]​

    • [li]I think project management is self explanatory so I guess all you need to know is 7 processing systems and the 5 steps to making a project[/li]

    [size=18pt]Information Systems and Databases:[/size]​

    • [li]Three Acts were produced, one for copyright and the other two for the access to information. What are these acts called and when were they introduced?[/li]
      [li]Centralised databases provides a complete view of data as well as letting a user access the system from a number of locations. What can a distributed database offer?[/li]
      [li]How do you calculate storage, for example: There are 175 records which all together add up to 64 bytes. Work out the conversion in KB's [/li]
      [li]What are two types of Encryption?[/li]
      [li]A search engine uses spiders and what to find webpages? After this is achieved an indexer does what with the resources found?[/li]
      [li]What are some advantages of a Data Warehouse?[/li]
    [size=18pt]Can Someone Please supply me a link or tell me about the roles of Administrators such as database Admins, System Admin and all the others. I know that one of those roles involve assigning users to printers or something[/size]

    [size=18pt]Communication Systems:[/size]​

    • [li]What are the three levels of protocols for transferring messages?[/li]
      [li]What is a protocol? (You must know this, If you dont search it up!!!)[/li]
      [li]In one sentence define Handshaking (node handshaking..)[/li]
      [li]When sending emails is SSL, SMTP or HTTP used?[/li]
      [li]Whats bandwidth in terms of frequencies?[/li]
      [li]Here is a link for Parity Checking: https://www.youtube.com/watch?v=osS9EaKNSI4[/li]
 

Lwaxana

Betazed Ambassador
Joined
Oct 16, 2002
Messages
430
Location
in a galaxy far far away
Gender
Female
HSC
N/A
The role of the Network Administrator
On the network, the control of hardware and software is under the supervision of a network administrator. This job covers the supervision of each of the following tasks:
Installing and upgrading network software
configuring hardware that involves setting up servers and peripherals so they link to and recognize the network
connecting clients to networks
creating and managing user accounts –adding/removing users
managing access to resources, called file access rights. These rights may be given to users as groups or to individuals users to and can provide access to specific hardware and files.
monitoring and optimizing performance. This will involve assigning users to printers and other peripherals so that there is a distribution of resources where and when they are required.
managing data. This includes ensuring that there is data protection, such as regular backups and security to prevent unauthorized use. This will include a logon and logoff procedure.
 

y0semite

New Member
Joined
May 9, 2015
Messages
2
Gender
Male
HSC
2018
Information Systems and Databases

1.

a. Commonwealth Copyright Act - 1968
b. Commonwealth Freedom of Information Act - 1982
c. New South Wales Freedom of Information Act - 1989

2.

Distributed databases are many databases that are located on different sites, however act as one single database when accessed. Distributed databases remove the bottlenecking problems from many people accessing data at the same time in a centralised database. Transmission costs are also lowered. Two-phased commits are used to make check if a database is ready to transmit and receive data.

3.

IF 175 Records = 64 bytes:

File size in Kb = 64B / 1024 Kb

= 0.064 Kb

4.

The two types of encryption are;

Symmetric encryption - where the same key is used to encode and decode data.

Asymmetric encryption - where a public and private key is used to encode and decode data respectively.

5.

Search engines use spiders and search robots to find pages that contain keywords or titles entered by the user. The spider/robot then stores webpage URLs that contain these keywords in an index file: the user queries this index file for URLs that contain keywords. The search engine then displays a list of URLs that contain the keywords specified by the user.

6.


Data warehouses large databases that hold raw data about an organisation, collected electronically from a variety of sources. They can be used along with data mining techniques to find relationships that may be unknown to an organisation or entity due to breakdowns in communication or uncertainty. For example: Accounting might say profits may be down, however products are selling extremely well according to sales. Data mining techniques will realise that for profits to increase prices of good must also be increased.

The roles of a network administrator

Network administrators are employed to manage networks within an organisation. Therefore many tasks must be carried out including:

- Adding and removing users from a network.

- Log on and log off procedures are created to allow levels of access to a network through usernames and passwords. Log off procedures ensure data will not be compromised due to leaving sessions available for unauthorised visitors to access.

- Assigning printers to clients on a network based off their physical location, lowering times taken for employees to walk to printers that are further away than necessary.

- Client installation and protocol assignment allow clients to access the existing network that might be based of specialised protocols. It is the role of the network administrator to install NICs if clients require them to access the network.

- Installing software and sharing with users, network administrators must install software on new clients and follow network/site licensing agreements. Users that require specialised software will have access to this software, however will others that do not require it will not have access to it. Network administrators determine who needs and doesn't need specialised software.

- Network based applications, mainly the updating of file servers to hold user data that is stored locally and the downloading of web pages from web servers to browsers.

- Giving users file access rights, stop the unauthorised reading, executing and modification of critical system files and other users files that do not pertain to the participants work.


Adios,

y0semite!
 
Last edited:

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

Top