0% found this document useful (0 votes)
10 views

CAC 1203 Tutorial Pack

The document is a tutorial guide for an Introduction to Information Technology course, containing various questions related to computer fraud prevention, computer crimes, health hazards from prolonged computer use, software types, networked systems, databases, data communication, and computer networking. It includes tasks such as listing controls against fraud, explaining computer crimes, discussing the impact of networked systems on shopping, and defining key terms in computer networking. Additionally, it addresses the advantages and disadvantages of software development options and ergonomic issues for data entry clerks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CAC 1203 Tutorial Pack

The document is a tutorial guide for an Introduction to Information Technology course, containing various questions related to computer fraud prevention, computer crimes, health hazards from prolonged computer use, software types, networked systems, databases, data communication, and computer networking. It includes tasks such as listing controls against fraud, explaining computer crimes, discussing the impact of networked systems on shopping, and defining key terms in computer networking. Additionally, it addresses the advantages and disadvantages of software development options and ergonomic issues for data entry clerks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

National University of Science and

Technology

FACULTY OF COMMERCE

DEPARTMENT OF ACCOUNTING

INTRODUCTION TO INFORMATION TECHNOLOGY CAC 1203

TUTORIAL QUESTIONS
1a) List five (5) controls to prevent computer fraud. [5 marks

b) Explain the following computer crimes. [15 marks]


i) Theft of computer time

ii) Hacking

iii) Sabotage

iv) Digital Piracy

v) Identity Theft

2i) State the health hazards associated with prolonged use of computers.
[4 marks]
ii) Describe five preventative actions which may be taken to avoid computer related health
hazards, explaining clearly how each action will assist in preventing one or more of the
hazards described in (i). [10 marks]

3a) Describe the difference between application software and system software, giving an
example of each. [4 marks]

b) When using any application package on a network, the user is often unaware that an
operating system is working behind the scenes, managing system resources. Give three of these
resources and in each case briefly explain the role of the operating system in its management
[12 marks]
c) Users may encounter problems when software manufacturers upgrade a software package.
With reference to specific examples, describe three such problems [5marks]

4) Networked computer systems (e.g. internet) have revolutionised the way in which we shop.
With the aid of specific examples, discuss this. Include in your discussion
 The types of organisation likely to advertise on such systems
 The capabilities and limitations of such systems for this activity
 The potential security risks for the customers in using such systems
 The organisational impact of such systems
 The social impact of such systems
[25 marks]
5) Given the following table,
STUDENT
Student_Id_No. FirstName Surname Dept Faculty
123 Mary Moyo Accounting Commerce
453 Simba Gutu Banking Commerce
768 Nhlanhla Daka Finance Commerce
098 Tracy Dube Accounting Commerce
381 Charles Brown Bio- Applied
Chemistry Science
001 John Chen Radiology Applied
Science
534 Pauline Mpala Finance Commerce
671 Alice Hove OR Applied
Maths

a) i) Write a query showing information of all students whose faculty is Commerce and show
the result on a table.
[5 marks]
ii) Explain the advantages of having a database rather than a traditional file system.
[8 marks]
6a) with the aid of a diagram, explain the various major components of a computer.

b) Define Data Communication (5 Marks)

c) Outline the fundamental characteristics on which the effectiveness of Data Communication


depends on. (15 Marks)

d) Give the five (5) components of Data Communication giving a brief description of each
component. (5 Marks)

7a) Define a Computer Network. (5 Marks)

b) Give three criteria necessary for an effective and efficient network and explain them.

8) Software can either be built in-house or bought from a Software vendor.


a) Discuss the advantages and disadvantages of taking either route (15 Marks)

b) Explain the terms, database and relational database. (10 Marks)

c) What does a DBMS do? (5 Marks)

9a) Define software and state one example of a software program. [3 Marks]
b) Distinguish between a word processor program and a spreadsheet program.
c) In what instance would one use a spreadsheet. [6 Marks]
d) What are the three hardware requirements for networking computers? [6 Marks]
e) Discuss computer ergonomic issues of concern for data capture clerks who spend most of their
working hours feeding input data on computer terminals. [10 Marks]

10a) Define the following computer networking terms:


i. LAN [4 Marks]
ii. WAN [4 Marks]
iii. MAN [4 Marks]
iv. Topology [4 Marks]
v. TCP/IP [4 Marks]
b) What is an Information Society? Differentiate between an Information Society and
a Knowledge Society. [5 Marks]

You might also like