SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
TUTORIAL 1: INTRODUCTION TO INFORMATION TECHNOLOGY
                               1.1 Development Of Information Technology

STRUCTURED QUESTIONS

Answer all the questions.

1.      Define the following terms:
        a) Information Technology
        b) Stand-alone computer
        c) Mainframe
        d) Client-server network
        e) Distributed computing
        f) Cloud computing

2.      Give two (2) types of stand-alone computer.

3.      Give three (3) advantages of mainframe.

4.      List four (4) services that server can provide for users.

5.      Explain what are client and server in the client server network.

6.      Briefly explain three (3) components of cloud computing.

7.      Give two (2) critical factors that determining the efficiency of cloud computing.

8.      State four (4) top organizations that provide cloud computing.

9.      List two (2) examples of cloud application




                                                           1
TUTORIAL 2: INTRODUCTION TO INFORMATION TECHNOLOGY
                              1.2 The Application Of Information Technology

STRUCTURED QUESTIONS

Answer all the questions.

1.      Discuss the applications of Information Technology in education.

2.      Discuss the applications of Information Technology in health care.

3.      Discuss the applications of Information Technology in finance.

4.      Discuss the applications of Information Technology in manufacturing.

5.      Discuss the applications of Information Technology in travel.

6.      Discuss the applications of Information Technology in government.

7.      Discuss the applications of Information Technology in science

8.      Discuss the applications of Information Technology in publishing




                                                         2
TUTORIAL3 : NETWORK TOPOLOGY
                                           2.1.1 Network Topology

STRUCTURED QUESTIONS

Answer all the questions

1.       Define what network topology is.

2.       There are two types of layout in the network topology. State and give description on both network layout.

3.       List three (3) types of commonly used network topology.

4.       Draw a diagram on each of the network topologies. Give a brief explanation to all the topologies.

5.       List three (3) advantages of each network.

6.       List three (3) disadvantages of each network.

7.       Identify the topology, based on the given statement:

     Statement                                                Topology
     This network required at each end of the bus cable
     to prevent the signal from bouncing back and forth
     on the bus cable.
     Data transmitted on a ring network travels from
     device to device around the entire ring in one
     direction.
     Hub and switch are commonly used device to
     provide a central connection point to all other
     devices in star network.
     On a ring network, a cable forms a close loop with
     all computers and devices arrange along the ring.
     All the computers and other devices on the
     network connect to a central device, thus
     forming a star.
     Consists of a single central cable (backbone), to
     which all computers and other devices connect.




                                                          3
8.       Identify the topology, based on the given diagram:

         Diagram                                              Topology




     9. Suppose you have a small office office with five computers and two printers and you want to set
     up a Local Area Network (LAN) using a star and ring topology. Justify two (2) reasons for your choice
     of the topology.




                                                     4
TUTORIAL 4: INTERNET TECHNOLOGY
                                              2.1 Network Basics
                                        2.1.2 Classification Of Network

STRUCTURED QUESTIONS

Answer all the questions
.
1.     Define :
       a) Local Area Network (LAN).
       b) Metropolitan Area Network
       c) Wide Area Network.

2.     Differentiate all classification of network. Give three (3) differences.

3.     Give one (1) type of network for LAN, MAN and WAN.

4.     Sketch the diagram for each classification.




                                                           5
TUTORIAL 5: INTERNET TECHNOLOGY
                                        2.2.1 Overview Of The Internet
                                          2.2.1.1 Evolution Of Internet
                                        2.2.1.2 The Internet Connection

STRUCTURED QUESTIONS

Answer all the questions

1.      Define the Internet.

2.      What are the goals of ARPANET?

3.      How did the Internet evolve?

4.      Who is W3C?

5.      What is Internet2?

6.      Give two types of Internet connection.

7.      Define dial-up connection.

8.      Define broadband connection.

9.      Define Internet Service Provider (ISP).

10.     Give three (3) responsibility of an ISP.

11.     List five (5) examples of the ISP.

12.     List the relationship between various/types Internet connection and transmission media, communication
        devices, ISP and data transfer rate.

13.     There ARE many companies that provide Internet connections in Malaysia. Users may choose from various
        types of Internet connection based on their requirements.
        a) Give the name of a network that had become the origin of today’s Internet.
        b) List three (3) examples of high speed Internet connection.
        c) State two (2) companies in Malaysia which are responsible to provide Internet access to clients.




                                                     6
TUTORIAL 6: INTERNET TECHNOLOGY
                                             2.2.2.1 Web Browser
                                             2.2.2.2 Web Address

STRUCTURED QUESTIONS

Answer all the questions

1.      What is IP Address?

2.      Describe the purpose of IP address.

3.      Give an example of IP address.

4.      What is domain name?

5.      Give an example of domain name.

6.      Give the relationship between IP Address and Domain name.

7.      Complete the table below:

         Top Level Domain                 Description       Top Level Domain   Description
         .gov                                               .mil
         .edu                                               .biz
         .org                                               .com
         .net

8.      What is Domain Name System?

9.      What is Web browser?

10.     Give one purpose of Web browser?

11.     List three (3) examples of Web browser.

12.     Describe Web page and Web site.

13.     A Web page has unique address called URL (Uniform Resource Locator) or Web address. What is Web
        address?

14.     List four components of URL.

15.     What is the function of http:// and https://?

16.     Complete the table below :
                       Part                                  Stand For
                       http
                       https

                                                        7
17.   Identify each part of the URL below;
      a) http://www.kmns.matrik.edu.my/prog_kualiti/takwim.html
      b) http://www.kmns.matrik.edu.my/sinfo/pensyarah.html
      c) http://www.kmns.matrik.edu.my/math/index.html
      d) http://portal.kmns.matrik.edu.my/login/index.php




                                                8
TUTORIAL 7: INTERNET TECHNOLOGY
                                               2.2.2.1 The Internet
                                          2.2.2.3 Web Page Navigation
                                          2.2.2.4 Information Searching

STRUCTURED QUESTIONS

Answer all the questions.

1.      Differentiate between Hypertext and Hypermedia links.

2.      What is the purpose of tabbed browsing?

3.      What does the phrase surfing the web means?

4.      List two (2) type of search tool of information searching.

5.      Give the definition search engine.

6.      What is important of search engine.

7.      State 3 examples of search engine.

8.      Give the definition subject directory.

9.      State 3 examples of search directory.

10.     List a method that user can use to search for each type of search tool.

11.     What is the difference between Search engine and Subject directory.

12.     Irfan need to search information about e- services. As a friend, suggest him;
        a) Two (2) methods that he can use to search information above.
        b) Describe each of them




                                                          9
TUTORIAL 8: INTERNET TECHNOLOGY
                                             2.3 Internet Services

STRUCTURED QUESTIONS

Answer all the questions

1.      Give definition of each internet services.

2.      State an example of each internet services.

3.      Briefly describe 2 (two) real time activities offering by internet services.

4.      Briefly describe 2 (two) not real time activities offering by internet services.

5.      Differentiate each of internet services below:
        a) E-mail
        b) Mailing list
        c) Instant messaging
        d) Chat
        e) Voice over Internet Protocol (VoIP)
        f) Newsgroup
        g) Message board
        h) File Transfer Protocol (FTP)

6.      Determine the suitable internet services for each statement below:
        a) Yusuf like to inform and invite his classmate to celebrate his wedding anniversary. What types of
            internet services that he might choose. …………………………….
        b) The services provided by YouTube application that gave benefit to the internet users…………
        c) The services used by internet users similar with letter posting……………………
        d) Users safe airtime credit charges when called someone……………………
        e) It is odds and improper manner when someone talks about different topic when using these
            services………………
        f) Sulaiman need to submit his assignment to the lecturer within 3 days. Suggest two (2) internet services
            that he can use……………………
        g) Othman download his work resources from his pc at home while he still working at office .Suggest two
            (2) internet services that he can use………………………..




                                                           10
TUTORIAL 9: INTERNET TECHNOLOGY
                                            2.4 Types Of Web Sites
                                                 2.5 Netiquette

STRUCTURED QUESTIONS

Answer all the questions.

1.      List types of web sites.

2.      Explain each type of web sites.

3.      Differentiate each type of web sites below:
        a) Blog and Wikipedia
        b) Marketing/businesses and Online social network
        c) Portal and Blog

4.      What is netiquette?

5.      Netiquette, or net etiquette, refers to etiquette on the Internet. How to get the good netiquette.

6.      List the area where good netiquette highly stressed.

7.      List the rules of netiquette on social interaction and communication electronically.

8.      List three (3) values is in the rules of netiquette.

9.      Identify the rules of netiquette refers to the statement below:
       Statement                                                              The rules of netiquette that must
                                                                              be followed
       Do not send uncompressed attachment.
        Avoid misinterpreted and use emotions to express emotion.
       To send the e-mail we must use proper grammar,spelling and
       punctuation. Do not use capital letter and use abbreviations and
       acronym for phrases. We must be polite which avoid offensive
       language.
       Hani read e-mail belonging to Irfan at her lap top.
       Don't use others' images, content, etc without permission and
       don't forward email, or use website content without permission.




                                                               11
TUTORIAL 10 : COMPUTER ETHICS AND SECURITY
                                            3.1 Computer Ethics
                                         3.1.1 Intellectual Property

STRUCTURED QUESTIONS

Answer all the questions.

1.       Define Intellectual Property.

2.       Give three (3) types of Intellectual Property.

3.       Define copyright.

4.       Define trademark.

5.       Define patent.

6.       Give one (1) difference of copyright, trademark, and patent

      Copyright                                Trademark                                 Patent




7.       Explain the importance of Intellectual Property.

8.       Copyright is a legal term that describe the right given to the creator for their literary and artistic work.
         a) Give 3 examples of artistic work.
         b) Give 3 examples of literary work.

9.        Give the correct terminology ( term) for each definition below :
     Definition                                                      Terminology (Term)
     Refers to creations of the mind used in commerce
     ( Inventions, literary and artistic works, symbols, names
     images and designs)
     A distinctive sign which identifies certain goods or
     services.
     A group of ethical behavior rules developed by
     organizations or by a professional society
     Control the accessibility of information on the internet




                                                             12
TUTORIAL 11 : COMPUTER ETHICS AND SECURITY
                                      3.2.1 Computer Security Risks

STRUCTURED QUESTIONS

Answer all the questions.

1.      Give the definition of computer security risk?

2.      State all types of attack that can be launch through networks?

3.      State and explain two type of hardware theft and vandalism.

4.      What is information theft.

5.      What type of computer security risk does software piracy fall to?

6.      Give two causes for system failure?

7.      List 3 common symptoms for a computer virus infection?

8.      List type of security measures

9.      Define what is and state process involved:
        a) Data Backup
        b) Cryptography
        c) Antivirus
        d) Anti-spyware
        e) Firewall
        f) Human Aspect : Awareness

10.     State the suitable security measures for each statements below.
        a) Haizam think to restore the files in his laptop by copying the backed up files to their original location.
        b) This process include encryption and decryption process. It also ensuring that no one can read the
            message except the intended receiver.
        c) The importance of this software is to protects a computer against viruses
        d) Hardware/software that protects a network’s resources from intrusion by users on another network.
        e) Ensure that computers are safe from malicious threat by routine check to update from new virus, worm
            or other malicious threat.

11.     State the suitable security measures for each computer security risk below.
            Computer Security Risk             Security Measures
            Computer viruses and other
            malware
            Botnets, Denial of Service
            Attack and Spoofing
            Spyware/Adware
            Unauthorized access and use
            Hardware theft

                                                         13
Software theft
Information theft
System Failure




                    14

Mais conteúdo relacionado

Destaque (8)

Smc columbus - 7.19.11
Smc columbus  - 7.19.11Smc columbus  - 7.19.11
Smc columbus - 7.19.11
 
Social Search Marketing
Social Search MarketingSocial Search Marketing
Social Search Marketing
 
My Story My Life by Clare Bolam
My Story My Life by Clare BolamMy Story My Life by Clare Bolam
My Story My Life by Clare Bolam
 
PENGGUNAAN KOMPUTER DALAM PENGUJIAN
PENGGUNAAN KOMPUTER DALAM PENGUJIANPENGGUNAAN KOMPUTER DALAM PENGUJIAN
PENGGUNAAN KOMPUTER DALAM PENGUJIAN
 
Introduction to Agile & Scrum
Introduction to Agile & ScrumIntroduction to Agile & Scrum
Introduction to Agile & Scrum
 
Quakers Hill High School Archibull Prize Entry Grains
Quakers Hill High School Archibull Prize Entry GrainsQuakers Hill High School Archibull Prize Entry Grains
Quakers Hill High School Archibull Prize Entry Grains
 
Introduction to Agile & Scrum
Introduction to Agile & ScrumIntroduction to Agile & Scrum
Introduction to Agile & Scrum
 
Introduction to Agile & Scrum
Introduction to Agile & ScrumIntroduction to Agile & Scrum
Introduction to Agile & Scrum
 

Semelhante a Tutorial pdt sem 1

Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questionsvaidheeswari
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2Nicole Gomez
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSsolved_assignments
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptBeniamTekeste
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete GuideDaisyWatson5
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.comDavisMurphyC86
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comrobertlesew62
 
36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-networkengineerNoor
 
Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1Adrian Preda
 
ECET 375 Effective Communication/tutorialrank.com
 ECET 375 Effective Communication/tutorialrank.com ECET 375 Effective Communication/tutorialrank.com
ECET 375 Effective Communication/tutorialrank.comjonhson203
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networksPadam Thapa
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And ProtocolMonique Jones
 

Semelhante a Tutorial pdt sem 1 (20)

Important 16 marks questions
Important 16 marks questionsImportant 16 marks questions
Important 16 marks questions
 
Network File System Version 4.2
Network File System Version 4.2Network File System Version 4.2
Network File System Version 4.2
 
For demo.pptx
For demo.pptxFor demo.pptx
For demo.pptx
 
SMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTSSMU BSCIT SUMMER 2014 ASSIGNMENTS
SMU BSCIT SUMMER 2014 ASSIGNMENTS
 
Layer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.pptLayer_arc_and_OSI_MODEL.ppt
Layer_arc_and_OSI_MODEL.ppt
 
Fe4
Fe4Fe4
Fe4
 
Communication Networks: The Complete Guide
Communication Networks: The Complete GuideCommunication Networks: The Complete Guide
Communication Networks: The Complete Guide
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.com
 
Ecet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.comEcet 375 Education Specialist-snaptutorial.com
Ecet 375 Education Specialist-snaptutorial.com
 
Networking
NetworkingNetworking
Networking
 
36522520 comm-network
36522520 comm-network36522520 comm-network
36522520 comm-network
 
Comm network
Comm networkComm network
Comm network
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1Intrebari si raspunsuri CCNA1
Intrebari si raspunsuri CCNA1
 
Shai 2
Shai 2Shai 2
Shai 2
 
Higher Homework
Higher HomeworkHigher Homework
Higher Homework
 
ECET 375 Effective Communication/tutorialrank.com
 ECET 375 Effective Communication/tutorialrank.com ECET 375 Effective Communication/tutorialrank.com
ECET 375 Effective Communication/tutorialrank.com
 
Bt 72 computer networks
Bt 72 computer networksBt 72 computer networks
Bt 72 computer networks
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
 
Digital Literacy Objectives
Digital Literacy ObjectivesDigital Literacy Objectives
Digital Literacy Objectives
 

Mais de hazirma

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquettehazirma
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isphazirma
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internethazirma
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topologyhazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethicshazirma
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet serviceshazirma
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquettehazirma
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of websitehazirma
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2hazirma
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searchinghazirma
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Addresshazirma
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browserhazirma
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizahhazirma
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigationhazirma
 

Mais de hazirma (20)

2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette2.4 and 2.5 types of websites & netiquette
2.4 and 2.5 types of websites & netiquette
 
2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp2.2.1.2 internet connection and 2.2.1.3 isp
2.2.1.2 internet connection and 2.2.1.3 isp
 
2.2.1.1 evolution of internet
2.2.1.1 evolution of internet2.2.1.1 evolution of internet
2.2.1.1 evolution of internet
 
2.1.1 network topology
2.1.1 network topology2.1.1 network topology
2.1.1 network topology
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
3.1.1 computer ethics
3.1.1 computer ethics3.1.1 computer ethics
3.1.1 computer ethics
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
2.3 the internet services
2.3 the internet services2.3 the internet services
2.3 the internet services
 
2.5 Netiquette
2.5 Netiquette2.5 Netiquette
2.5 Netiquette
 
2.4 types of website
2.4 types of website2.4 types of website
2.4 types of website
 
C topic 3.3 the internet services 2
C topic 3.3 the internet services 2C topic 3.3 the internet services 2
C topic 3.3 the internet services 2
 
2.2.2.4 Information Searching
2.2.2.4 Information Searching2.2.2.4 Information Searching
2.2.2.4 Information Searching
 
2.2.2.2 Web Address
2.2.2.2 Web Address2.2.2.2 Web Address
2.2.2.2 Web Address
 
2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah2.2.1.4 internet address amrizah
2.2.1.4 internet address amrizah
 
2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation2.2.2.3 Web Page Navigation
2.2.2.3 Web Page Navigation
 

Tutorial pdt sem 1

  • 1. TUTORIAL 1: INTRODUCTION TO INFORMATION TECHNOLOGY 1.1 Development Of Information Technology STRUCTURED QUESTIONS Answer all the questions. 1. Define the following terms: a) Information Technology b) Stand-alone computer c) Mainframe d) Client-server network e) Distributed computing f) Cloud computing 2. Give two (2) types of stand-alone computer. 3. Give three (3) advantages of mainframe. 4. List four (4) services that server can provide for users. 5. Explain what are client and server in the client server network. 6. Briefly explain three (3) components of cloud computing. 7. Give two (2) critical factors that determining the efficiency of cloud computing. 8. State four (4) top organizations that provide cloud computing. 9. List two (2) examples of cloud application 1
  • 2. TUTORIAL 2: INTRODUCTION TO INFORMATION TECHNOLOGY 1.2 The Application Of Information Technology STRUCTURED QUESTIONS Answer all the questions. 1. Discuss the applications of Information Technology in education. 2. Discuss the applications of Information Technology in health care. 3. Discuss the applications of Information Technology in finance. 4. Discuss the applications of Information Technology in manufacturing. 5. Discuss the applications of Information Technology in travel. 6. Discuss the applications of Information Technology in government. 7. Discuss the applications of Information Technology in science 8. Discuss the applications of Information Technology in publishing 2
  • 3. TUTORIAL3 : NETWORK TOPOLOGY 2.1.1 Network Topology STRUCTURED QUESTIONS Answer all the questions 1. Define what network topology is. 2. There are two types of layout in the network topology. State and give description on both network layout. 3. List three (3) types of commonly used network topology. 4. Draw a diagram on each of the network topologies. Give a brief explanation to all the topologies. 5. List three (3) advantages of each network. 6. List three (3) disadvantages of each network. 7. Identify the topology, based on the given statement: Statement Topology This network required at each end of the bus cable to prevent the signal from bouncing back and forth on the bus cable. Data transmitted on a ring network travels from device to device around the entire ring in one direction. Hub and switch are commonly used device to provide a central connection point to all other devices in star network. On a ring network, a cable forms a close loop with all computers and devices arrange along the ring. All the computers and other devices on the network connect to a central device, thus forming a star. Consists of a single central cable (backbone), to which all computers and other devices connect. 3
  • 4. 8. Identify the topology, based on the given diagram: Diagram Topology 9. Suppose you have a small office office with five computers and two printers and you want to set up a Local Area Network (LAN) using a star and ring topology. Justify two (2) reasons for your choice of the topology. 4
  • 5. TUTORIAL 4: INTERNET TECHNOLOGY 2.1 Network Basics 2.1.2 Classification Of Network STRUCTURED QUESTIONS Answer all the questions . 1. Define : a) Local Area Network (LAN). b) Metropolitan Area Network c) Wide Area Network. 2. Differentiate all classification of network. Give three (3) differences. 3. Give one (1) type of network for LAN, MAN and WAN. 4. Sketch the diagram for each classification. 5
  • 6. TUTORIAL 5: INTERNET TECHNOLOGY 2.2.1 Overview Of The Internet 2.2.1.1 Evolution Of Internet 2.2.1.2 The Internet Connection STRUCTURED QUESTIONS Answer all the questions 1. Define the Internet. 2. What are the goals of ARPANET? 3. How did the Internet evolve? 4. Who is W3C? 5. What is Internet2? 6. Give two types of Internet connection. 7. Define dial-up connection. 8. Define broadband connection. 9. Define Internet Service Provider (ISP). 10. Give three (3) responsibility of an ISP. 11. List five (5) examples of the ISP. 12. List the relationship between various/types Internet connection and transmission media, communication devices, ISP and data transfer rate. 13. There ARE many companies that provide Internet connections in Malaysia. Users may choose from various types of Internet connection based on their requirements. a) Give the name of a network that had become the origin of today’s Internet. b) List three (3) examples of high speed Internet connection. c) State two (2) companies in Malaysia which are responsible to provide Internet access to clients. 6
  • 7. TUTORIAL 6: INTERNET TECHNOLOGY 2.2.2.1 Web Browser 2.2.2.2 Web Address STRUCTURED QUESTIONS Answer all the questions 1. What is IP Address? 2. Describe the purpose of IP address. 3. Give an example of IP address. 4. What is domain name? 5. Give an example of domain name. 6. Give the relationship between IP Address and Domain name. 7. Complete the table below: Top Level Domain Description Top Level Domain Description .gov .mil .edu .biz .org .com .net 8. What is Domain Name System? 9. What is Web browser? 10. Give one purpose of Web browser? 11. List three (3) examples of Web browser. 12. Describe Web page and Web site. 13. A Web page has unique address called URL (Uniform Resource Locator) or Web address. What is Web address? 14. List four components of URL. 15. What is the function of http:// and https://? 16. Complete the table below : Part Stand For http https 7
  • 8. 17. Identify each part of the URL below; a) http://www.kmns.matrik.edu.my/prog_kualiti/takwim.html b) http://www.kmns.matrik.edu.my/sinfo/pensyarah.html c) http://www.kmns.matrik.edu.my/math/index.html d) http://portal.kmns.matrik.edu.my/login/index.php 8
  • 9. TUTORIAL 7: INTERNET TECHNOLOGY 2.2.2.1 The Internet 2.2.2.3 Web Page Navigation 2.2.2.4 Information Searching STRUCTURED QUESTIONS Answer all the questions. 1. Differentiate between Hypertext and Hypermedia links. 2. What is the purpose of tabbed browsing? 3. What does the phrase surfing the web means? 4. List two (2) type of search tool of information searching. 5. Give the definition search engine. 6. What is important of search engine. 7. State 3 examples of search engine. 8. Give the definition subject directory. 9. State 3 examples of search directory. 10. List a method that user can use to search for each type of search tool. 11. What is the difference between Search engine and Subject directory. 12. Irfan need to search information about e- services. As a friend, suggest him; a) Two (2) methods that he can use to search information above. b) Describe each of them 9
  • 10. TUTORIAL 8: INTERNET TECHNOLOGY 2.3 Internet Services STRUCTURED QUESTIONS Answer all the questions 1. Give definition of each internet services. 2. State an example of each internet services. 3. Briefly describe 2 (two) real time activities offering by internet services. 4. Briefly describe 2 (two) not real time activities offering by internet services. 5. Differentiate each of internet services below: a) E-mail b) Mailing list c) Instant messaging d) Chat e) Voice over Internet Protocol (VoIP) f) Newsgroup g) Message board h) File Transfer Protocol (FTP) 6. Determine the suitable internet services for each statement below: a) Yusuf like to inform and invite his classmate to celebrate his wedding anniversary. What types of internet services that he might choose. ……………………………. b) The services provided by YouTube application that gave benefit to the internet users………… c) The services used by internet users similar with letter posting…………………… d) Users safe airtime credit charges when called someone…………………… e) It is odds and improper manner when someone talks about different topic when using these services……………… f) Sulaiman need to submit his assignment to the lecturer within 3 days. Suggest two (2) internet services that he can use…………………… g) Othman download his work resources from his pc at home while he still working at office .Suggest two (2) internet services that he can use……………………….. 10
  • 11. TUTORIAL 9: INTERNET TECHNOLOGY 2.4 Types Of Web Sites 2.5 Netiquette STRUCTURED QUESTIONS Answer all the questions. 1. List types of web sites. 2. Explain each type of web sites. 3. Differentiate each type of web sites below: a) Blog and Wikipedia b) Marketing/businesses and Online social network c) Portal and Blog 4. What is netiquette? 5. Netiquette, or net etiquette, refers to etiquette on the Internet. How to get the good netiquette. 6. List the area where good netiquette highly stressed. 7. List the rules of netiquette on social interaction and communication electronically. 8. List three (3) values is in the rules of netiquette. 9. Identify the rules of netiquette refers to the statement below: Statement The rules of netiquette that must be followed Do not send uncompressed attachment. Avoid misinterpreted and use emotions to express emotion. To send the e-mail we must use proper grammar,spelling and punctuation. Do not use capital letter and use abbreviations and acronym for phrases. We must be polite which avoid offensive language. Hani read e-mail belonging to Irfan at her lap top. Don't use others' images, content, etc without permission and don't forward email, or use website content without permission. 11
  • 12. TUTORIAL 10 : COMPUTER ETHICS AND SECURITY 3.1 Computer Ethics 3.1.1 Intellectual Property STRUCTURED QUESTIONS Answer all the questions. 1. Define Intellectual Property. 2. Give three (3) types of Intellectual Property. 3. Define copyright. 4. Define trademark. 5. Define patent. 6. Give one (1) difference of copyright, trademark, and patent Copyright Trademark Patent 7. Explain the importance of Intellectual Property. 8. Copyright is a legal term that describe the right given to the creator for their literary and artistic work. a) Give 3 examples of artistic work. b) Give 3 examples of literary work. 9. Give the correct terminology ( term) for each definition below : Definition Terminology (Term) Refers to creations of the mind used in commerce ( Inventions, literary and artistic works, symbols, names images and designs) A distinctive sign which identifies certain goods or services. A group of ethical behavior rules developed by organizations or by a professional society Control the accessibility of information on the internet 12
  • 13. TUTORIAL 11 : COMPUTER ETHICS AND SECURITY 3.2.1 Computer Security Risks STRUCTURED QUESTIONS Answer all the questions. 1. Give the definition of computer security risk? 2. State all types of attack that can be launch through networks? 3. State and explain two type of hardware theft and vandalism. 4. What is information theft. 5. What type of computer security risk does software piracy fall to? 6. Give two causes for system failure? 7. List 3 common symptoms for a computer virus infection? 8. List type of security measures 9. Define what is and state process involved: a) Data Backup b) Cryptography c) Antivirus d) Anti-spyware e) Firewall f) Human Aspect : Awareness 10. State the suitable security measures for each statements below. a) Haizam think to restore the files in his laptop by copying the backed up files to their original location. b) This process include encryption and decryption process. It also ensuring that no one can read the message except the intended receiver. c) The importance of this software is to protects a computer against viruses d) Hardware/software that protects a network’s resources from intrusion by users on another network. e) Ensure that computers are safe from malicious threat by routine check to update from new virus, worm or other malicious threat. 11. State the suitable security measures for each computer security risk below. Computer Security Risk Security Measures Computer viruses and other malware Botnets, Denial of Service Attack and Spoofing Spyware/Adware Unauthorized access and use Hardware theft 13