Professional Documents
Culture Documents
Information process is a processing information in a way that a server can detect it and observe it
Exercise 1.2
What part of the computer coordinates the operations of input, processing, output and storage?
System software is what software that u base the computer on when application software has a
specific purpose and runs on top of system software
Which element of an information system does each of the following represent?
exercise 1.5
1. Describe some of the traditional methods used to represent and store data.
Digitisation partners will continue to exploit the cloud and mobile, Savvy CIOs will seek out digitisation
partners, AWS will continue to dominate and Transition will take time
4. What is a byte?
Because they run on or off 1 or 0 this is easier for the computer to process
128 characters
Exercise 1.6
1. Who are hackers? A hacker is a person that breaches defences and exploits weaknesses in a computer
2. What safeguards can be taken to protect data? People can set up fire walls when people protect
their data it usually has some significance to someone either them, their school or work.
3. Why is it difficult to check the accuracy of data? It is difficult to check accurate data because
4. What is data validation?
5. List four different ways that data validation can be built into software.
6. What is copyright?
7. List the information needed to cite an Internet site.
8. Explain the difference between shareware and public domain software.
9. Why are software copyright laws difficult to enforce?