Friday, December 20, 2019

Computer Information - 1141 Words

INDIAN INSTITUTE OF MATERIALS MANAGEMENT JUN-2010 Post Graduate Diploma in Materials Management Graduate Diploma in Materials Management PAPER 4 IT and E-COMMERCE Date:15.06.2010 Time:2.00 pm to 5.00 pm Instructions: 1. From Part â€Å"A† answer all the questions (compulsory). Each sub-question carries 1 mark. Total marks = 32. 2. From Part â€Å"B† answer any three questions out of 5 questions. Each subquestion carries 16 marks. Total marks = 48 . 3. Part â€Å"C† is a case study (compulsory) Total marks = 20. Max Marks:100 Duration:3Hrs ______________________________________________________________________________ Part A 1. Expand the following. EDVAC MICR DTP HTTP B2B UVEPROM RAM SIMM 2. State true or false. 1) One nanosecond is one billionth†¦show more content†¦An example of the type of service demands that Exodus encounters occurred when the Webmasters of the RollingStone.com, the website of Rolling Stone magazine, had difficulty trying to solve a slow response time problem just a day before the publication of a multimedia cover story on Britney Spears. This would obviously cause a spike in demand that would exacerbate the response time problem. Since Exodus was hosting and maintaining the site, its engineers helped in solving the problem, which involved incorrect configurations data that caused server to use 10 to 15 seconds to refresh domain name data every few minutes instead of daily. Approximately 400 of its customers( 12% of its customer base of 3300 companies) are application service providers (ASPs) that run application software for other firms using remote servers linked to a WAN so that those firs no longer have to install and maintain the software. Exodus charges for service based on usage, and this fits well with an ASP charging scheme. Its ASP customers range from start-ups to established software firms such as PeopleSoft and Oracle’s Business Online. According to Ellen Hancock, â€Å"it’s very hard to say what you’re not doing, but we’ve spent a lot of time trying to do that. We say we’re not going to know applications. We’re not in that business. We just support the ASP†¦Ã¢â‚¬ ¦. We have no notion of competing with Oracle on E-commerce. We do not intend to ever understand HR (human resources) apps.Show MoreRelatedInformation Privacy : Computer And Information Sciences1041 Words   |  5 PagesInformation Privacy Aaliyah Hibbler Department of Mathematics, Computer and Information Sciences Mississippi Valley State University 14000 Highway 82 West, Itta Bena, MS 38941, United States aaliyah.hibbler@mvsu.edu Abstract This paper describes and informs the reader of material about Information Privacy. It gives a background as to what Information Privacy is, and educates the reader on more about the subject. This paper includes definitions, past and present examples and details about the subjectRead MoreComputer Information System Brief1518 Words   |  7 PagesAbstract In this paper I explain what opportunities Kudler Fine Foods has in terms of information technology, and describe how the company might benefit from implementing enterprise-wide computer information system. Computer information system brief Kudler Fine Foods (KFF) is a local chain of gourmet food stores with annual sales of more than 10M offering specialized products to targeted customers. The company has three locations in the San Diego metropolitan area (La Jolla, Del Mar and Encinitas)Read MoreInformation About Seizure Of Computers2673 Words   |  11 PagesSeizing Computer Evidence Introduction: Patrol officers are often called upon to seize a computer for analysis. It is essential that all patrol officers know how to properly seize a computer. Resources: The following online resources can be used to complete this research assignment: †¢ Focus URL: http://www.fft.uk.com/computer-forensics/forensic_check.asp This Web site provides tips for seizing a computer for forensic examination. †¢ New Jersey Computer Evidence Search and Seizure Manual URL: http://wwwRead MoreInformation Systems : Computer Ethics1525 Words   |  7 PagesBIS- 601 INFORMATION SYSTEMS COMPUTER ETHICS Submitted by Lakshmi Gajjarapu Student id: 665584 Global Id: gajja1l Email:gajja1l@cmich.edu INTRODUCTION: As the use of Computers have increased now-a-days with improvements in the technology which brings both advantages and disadvantages. Advantages comes with technological developments and disadvantages are like frauds happening using technology. These frauds using technology are called â€Å"Cyber-attacks† where intruders or hackersRead MoreComputer Based Information System944 Words   |  4 PagesHome  gt;  Management Information Systems  gt; Computer Based Information Systems and it’s Types Computer Based Information Systems and it’s Types Computer Based Information System: Computer Based Information System (CBIS) is an information system in which the computer plays a major role. Such a system consists of the following elements: * Hardware:  The term hardware refers to machinery. This  category includes the computer itself, which is often referred to as the central processing unit (CPU)Read MoreComputer Ethics and Information Systems3732 Words   |  15 Pagesâ€Å"Computer Ethics and Information Security† a. Introduction The consideration of computer ethics fundamentally emerged with the birth of computers. There was concern right away that computers would be used inappropriately to the detriment of society compromising information security, or that they would replace humans in many jobs, resulting in widespread job loss. Ethics- Guidelines or rules of conduct that govern our lives, work, behavior and communication in both public and private undertaking.Read MoreComputer Information Systems Disadvantages Essay2075 Words   |  9 PagesComputer Information Systems Disadvantages Can you believe it? Our country is broke. College funds are being cut everywhere and there are no jobs. The Computer Information Systems field is a very challenging career goal, because of the technology changes, the degree requirements, and the state budget cuts. With all of the rapid changes in technology, the Computer Information Systems field can be very demanding. Brier Dudley, a Seattle Times technology reporter, discusses the rapid changes of technologyRead MoreInformation Security And Computer Usage Essay1704 Words   |  7 PagesDomenick Perrino, Director of Information and Computer Technology SUBJECT: Information security and computer usage policies This memo presents the plans for the revision of information security and computer usage polices for Technocracy. The memo will outline discovered security issues and new policies including additional steps, goals and obstacles when implementing them. Previous security issues discovered Security compromises were discovered in information and computer security after the hack ofRead MoreComputer Sciences And Information Technology Essay2551 Words   |  11 PagesName: Course: Professor: Date Due: COMPUTER SCIENCES AND INFORMATION TECHNOLOGY MIS Project The Role of Information Systems in Business There are very many types of information systems. Classification of information systems follows the organizational levels in which they are used or installed for use. For instance, there are management information systems; some of which will be covered in this project report. Management information systems (MIS), helps businesses meet their business objectives.Read MoreUsing Information Technology For A Computer1750 Words   |  7 Pages11/15/15 Using Information Technology Professor Kenneth Lee Input, Output, and Connectivity Input, output, and connectivity are some of the most important considerations to make when choosing a computer. Without input and output our computers would not be able to function as they properly should, therefore making decisions on these sections are an important part in choosing a computer. In my last paper I broke down the main operating factors to consider when shopping for a computer: CPU, auxiliary

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.