You are on page 1of 4

Term 2 2015

Explain how realFtime processing for a multiFuser system can


be achieved if the system only has one CPU?
Single CPU systems use scheduling and can achieve multi-tasking
because the time of the
processor is time-shared by several processes so allowing each process to
advance in parallel.
So a process runs for some time and another waiting gets a turn.
Reassigning a CPU from one task to another one is called a context switch.
But Context switching has a cost, a programmer must be aware of down in
prtformance.
In a synergy between hardware and operating system, the CPU is
allocated to
different processes several times per second and this act is called 'timeslicing'
so not to be confused with Multi-threading. 'time-slicing' is older
technology compared to Multi-threading.
Briefly explain what a boot loader is and describe the
booting process.
Boot loader is the first programme which executes after turning on of
computer. And it loads other system software such as OS.
When a computer is turned off, its softwareincluding operating systems, application code, and
dataremains stored on non-volatile memory. When the computer is powered on, it typically
does not have an operating system or its loader in random-access memory (RAM). The computer
first executes a relatively small program stored in read-only memory (ROM) along with a small
amount of needed data, to access the nonvolatile device or devices from which the operating
system programs and data can be loaded into RAM.
The small program that starts this sequence is known as a bootstrap loader, bootstrap or boot
loader. This small program's only job is to load other data and programs which are then executed
from RAM. Often, multiple-stage boot loaders are used, during which several programs of
increasing complexity load one after the other in a process of chain loading.

What type of device translates between digital computer signals and analog
telephone signals? Explain the mechanism for transmitting and receiving
signals.
Modem

Modem worrks mainly in two modes ATOA (Analog to Analog) and ATOD (Analog to
digital). And data mode and signal mode. It converts incoming analog signal to digital which
can be understand by computer and in reverse it converts computers digital signal to analog
which can transmitted using telephone network.
As we know that the computers cant understand our language. Computers understand the
language of 0s and 1s i.e. digital form. The modem will modulate the signal into a sine wave.
So, this modulated digital signal can easily run over the telephone lines. Then the signal will
reach the IP hub. After this the demodulation of the signal will take place into digital form. Then
you will be connected to the internet. All these processes are performed by modem at extremely
high speeds. The speed of the modem depends upon the number of the available access lines
and the technology of the modem.
Todays the modems are of very high speeds. But some people are still using the slow speed
modems
having
speed
nearly
56kbps.
The features of modem are discussed below:
1. The speed of the modem is measured in bps means bits per second. Data transfer speed can
be increased by using the technique of data compression.
2. If we are using a modem having auto answering facility. Then our modem will be able to attend
calls even in our absence.
3. Modems work basically in two modes. One is voice mode and other is data mode. In voice
mode modem acts like a simple telephone. But in data mode modem acts as a Simple modem.
These types of modems have a switch which is helpful in changing the mode i.e. from voice
mode to data mode and from data mode to voice mode. For voice communication, loudspeaker
and a microphone is implemented in the modem.
4. Some modems have the ability to compress data. These modems compress data before
sending to improve the data transfer rates. But there must be a similar technology modem to
decompress the data at the receiver end.

Mike receives an email claiming to be from his bank requiring him to confirm
his online banking credentials by clicking on an embedded link. Several days
after Mike clicked on the link and entered his details, his bank account is
emptied. What type of attack is this? Explain why a firewall would be
ineffective against this type of attack. (2 Marks)

Phishing
Newer models of the iPhone use a fingerprint scanner. What type of
authentication is this? Give another example of such authentication.

Biometrics identificartion

Example Galaxy note 7 iris scanner.


Any face recognition system.
Greg and Mary and several other workers are connected to a small office LAN
with a rated speed of 1Gbps. Greg transfers a 100MB database file to Marys
PC and is surprised when the process takes several seconds. Give two (2)
possible reasons why the transfer took so long.
1) Network traffic is high
2) Database files are slow to transfer than media file because in database file each bit is
Important. So It have transfer accurately.
Felix and Ben are in the same team but work in different cities. Give
examples of two (2) collaboration tools/technologies that would help them
work more effectively together and explain WHY the tools would
be useful.
1) TeamViewer
2) Hangouts or any other video calling system
Describe two (2) problems related to using files that a DBMS
solves.

No redundant data Redundancy removed by data normalization

Data Consistency and Integrity data normalization takes care of it too

Secure Each user has a different set of access

Privacy Limited access

Easy access to data

Easy recovery

Flexible

BPR

Bookverse was a small chain of book stores that specialised in sciFfi books
and comics. After organisation change, Bookverse became a purely onFline
store that makes its money by providing an extensive online catalogue of rare
sciFfi products that are sold by thousands of small vendors all around the
world. Customers can buy a product from Bookverse but it is dispatched
directly from the thirdFparty vendor (Bookverse doesn't keep any stock of its
own). Is this change BPR or a paradigm shift? Justify your answer.

In the context of privacy, explain what a safe harbour is?


Safe Harbor is the name of an agreement between the United States Department of
Commerce and the European Union that regulated the way that U.S. companies
could export and handle the personal data of European citizens.
Explain why ITSM is used in organisations and give one
example of how it is implemented.
IT service management (ITSM) refers to the entirety of activities directed by policies,
organized and structured in processesand supporting procedures that are performed by an
organization to plan, design, deliver, operate and control information technology (IT) services
offered to customers.

You might also like