Cis 119

In: Computers and Technology

Submitted By dmorgan35
Words 392
Pages 2
Chapter 1 Review Questions
M/C
1. A program is a set of instructions that a computer follows to perform a task.
2. Hardware refers to all of the physical devices, or components, that a computer is made of.
3. The CPU is the part of a computer that actually runs programs.
4. Today, CPUs are small chips known as microprocessors.
5. Main memory is where the computer stores a program while the program is running, as well as the data that the program is working
6. RAM is usually a volatile type of memory that is used only for temporary storage while a program is running.
7. Secondary storage is a type of memory that can hold data for long periods of time, even when there is no power to the computer.
8. The component that collects the data and sends it to the computer is called an input device.
9. A Video display is an Output device.
10. One byte is only enough memory to store a letter of the alphabet or a small number.
11. A Byte is made up of eight bits.
12. In the binary numbering system all numeric values are written as sequences of 0s and 1s.
13. Bits in a byte are set to 0 (turned off), then the value of the byte is 0.
14. ASCII is a set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters.
15. Unicode is an extensive encoding scheme that is can represent the characters of many of the world’s languages.
16. Negative numbers are encoded using a technique known as two’s complement.
17. Real numbers are encoded in floating-point notation.
18. Tiny dots of color known as pixels.
19. Machine language instructions are always written in binary numbers.
20. The Decode part is to determine which operation it should perform.
21. Computers can only execute programs that are written in machine language.
22. Assembler is used to translate an assembly language program to a machine…...

Similar Documents

Cis 517

...Strayer University IT Project Management Assessment Payton Ridley CIS 517 October 21, 2012 Morrow Campus Dr. 1. Summarizes how the project manager or team exhibited exceptional and ethical project management practices. Often, the project manager (PM) is faced with an issue that is not easily resolved by theory or the knowledge acquired from formal training. These types of problems are usually not of a technical nature and more often tend to be ethical or human resource issues (Stare, 2011). The satisfactory answer is often debatable and may suit one set of circumstances and yet not another. It is these difficult issues where the PM must draw from their practical experiences, moral and ethical obligations, and sometimes the rule of law. For example, international projects take the PM out of the comfort zone of the local laws and customs that they are used to working at home. In many host countries, doing business results in uncertainty and inconsistencies from the way business is conducted at home. Sometimes a practice that is permissible in the foreign country is not at home (Stare, 2011). Will making a payment to a foreign government official to obtain permits, licenses or police protection be seen as a bribe or just facilitating and expediting to get things done? That is why it is useful to have a set of guidelines. Companies should have a set of best practices or code of conduct to assist them, however, many do not. Here is a list of questions to......

Words: 1296 - Pages: 6

Cis 236

...How the World of Business Impacts Global Manufacturing Corporations Lattoria Almon CIS-236-01: Information Systems in Organizations October 7, 2012 How the World of Business Impacts Global Manufacturing Corporations Every morning I am awakened by my Sony alarm clock. I soon go through everything I need to go through to get ready for work. This particular morning I throw on my teal blouse that is made in Vietnam and my black jeggings made in Pakistan. I head to work in my Nissan Maxima. I am working so hard that I do not even notice it’s time for school. I clock out and rush to school. Once I am in class, I sit down ready to learn with my classmates, twenty to thirty percent who hold non-U.S. passports. Globalization is a process of interaction and integration among the people, companies, and governments of different nations, a process driven by international trade and investment and aided by information technology. Changes in technology, especially communications technology have been the driving force for growth in global markets for decades. Grewal, Dhruv., and Levy, Michael. (3e). Marketing. Boston. Technologies such as the telegraph, radio, television, computer, and Internet can do amazing things such as connect many parts all over the world. Technology and globalization together is how we get many of the resources we need. Marketing Management Organizing marketing across different parts of the world is not exactly a piece of cake. The process of global......

Words: 1432 - Pages: 6

Cis 210

...Assignment 1: Inventory Management Systems CIS 210 Prof. Souza April 16, 2014 In this paper I’m going to describe how I can come up with a plan to run automated inventory system on a low budget, for a retail clothing store. In detail I will describe the necessary equipment that it takes to run such a project. Also, I will be explaining the overall cost and the maintenance that is required to run the system properly. First off, we need to purchase an inventory management system. According to Inflow, (2014) over 300,000 small businesses use Inflow inventory. Joelle Krummenacher a uniform retailer states “I recommend it to any small business that needs software to manage all their inventory and orders with a limited budget.” For this software you have a choice to download it for free or pay $299 for the regular edition, which I recommend because you can read and write your data. To execute this plan fully, you would also need to purchase a barcode scanner, barcode printer, and labels. According to Barcodesinc.com, (2014) a barcode scanner cost $74, labels $18.00 and a high speed label printer with built in Ethernet and wireless cost $195, making this project total cost come to $586 dollars. Although this sounds good but, maintenance is required to keep this system running smooth. Wireman, (2014) states this catalog is not used for planning, since the on-hand or order information would be dated. But the catalog allows......

Words: 927 - Pages: 4

Cis 207

...CIS 207 Information Systems Fundamentals CIS 207 Week 1 Individual - Effect of Systems on Business Price: $6.99 [pic] |Individual |Resource: University of Phoenix Material: Week One Worksheet | |Effect of Systems on Business |Identify five different IT systems that have affected business in the past few years. For each system, briefly note | | |the following: | | | | | |A name for the system | | |The area of business it affects | | |What changes the system brought to the business world | | |What business processes changed because of the system | | |Likely future effect of the system ...

Words: 998 - Pages: 4

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment......

Words: 48147 - Pages: 193

Cis 5511

...CIS 511 Assignment # 1 Integrated Case Study: Bandon Group, Inc. Prof : STEPHEN HUBER Student : Karmon Jeneka Date : July 17, 2014 The Purpose and Scope Of Study: To determine the major initiative that evaluate organization and business management accomplish over time to move the company from the current situation to the development of an integrated information management strategy that will enable the organization to achieve it business objectives. This require investigation within the business and its needs, a good word about the use of SAP along with supported foundation and a comprehensible working model of SAP, configured and with master data. According to Sumner the overall scope or benefit of the study was to assure that IT plans support business plans, to provide a basis for linking IT spending to the business direction, offer context for functional managers and MIS professionals can make determinations, conveys the overall direction of data use and management throughout the business, present closer integration of like systems and networks while decentralizing at the same time technology and operational activities. The offer of guidance in choosing vendors for workstation-based solutions along with network and web-based solutions to problems as well as offering framework for using IT to gain a strategic improvement. Document high-level business direction: The high-level business direction as defined by executive management interviews discovered......

Words: 1622 - Pages: 7

Cis 210

...Assignment 1: Inventory Management Systems Vanessa Mozie Professor Kurt Brandquist CIS 210 System Analyst and Development October 28, 2014 The following is a plan that I have laid out for an inventory management system for your clothing business. In this blueprint I will include the type of hardware as well as software that you will need to help streamline your business. I will also include general prices form the above mentioned. Included in this cost will be maintenance costs. I will try to keep the total cost as low as possible. Your needs are as follows, a desktop computer, a scan gun, inventory control software, a barcode printer, pole display, signature pad, magnetic strip reader, barcode software, if you want multiple registers you will need to purchase them as well as set up a Local Area Network. In regards to the Local Area Network (LAN) I would recommend that you use a wireless router which will run about $400. It is worth it considering that installation is fast and easy and you will not have to pay for wiring. Now the prices for all of these components varies depending on who makes them, where you purchase them, and if they are purchased on an individual basis or in bundles. Let me start by discussing how we actually decide what the business needs are. As a retailer your needs would be different from a manufacturer or a restaurant. These needs determine the software that we will be using, hardware is......

Words: 1236 - Pages: 5

Cis 111

...Bring Your Own Device (BYOD) Bikash Rasaily Deborah Blockett CIS 333 10/24/2014 Many working people appreciate Apple with its iPhone as well as blackberry for inventing the concept of BYOD also known as Bring your own device (Egan, 2013). Under BYOD concept, employees bring their own mobile devices and PCs to perform their job tasks at workplace. Many organizations that have embedded this concept in their workplace have benefit from it but we should also keep in mind about IT security of the company. Some of the key benefit of using BYOD include increased productivity and innovation, employee satisfaction and Cost saving (BYOD: Bring your own device, 2014). Employees are more comfortable with their device and are experts in using it, which makes them more productivity and innovative (BYOD: Bring your own device, 2014). They can work whenever and wherever they want and don’t have to be in their desk to do their office work. BYOD programs also help in saving money but shifting the cost to the user, with employees paying for their device and data services (BYOD: Bring your own device, 2014). Employees would be satisfied if they use the device they have chosen and invested in rather then what was selected by IT (BYOD: Bring your own device, 2014). The key way of this concept is about allowing the staff to take and use their own device is seen as employer being open-minded and flexible. The new generation prefers to work in the flexible environment where his or her......

Words: 1110 - Pages: 5

Ci Problem

...safety concerns. Situational Analysis Strength: Columbia Industries, Inc. is the largest manufacturer of code-approved products to Construction industry. CI utilizes a large network of specialized distributors, supply houses, and mass merchandisers to sell its products. Weakness: CI relies a lot on a few lift trucks that are old and often broken down. Work efficiency and business growth is being affected by its current fleet of truck lifts that under perform. Stakeholders have different criteria’s to be met which may greatly affect decision making. Opportunity: The market demand for Columbia Industries’ products is increasing. CI has the opportunity to capitalize on several great offerings from companies offering lift trucks. Threat: The demand and sales for Columbia Industries’ products may decrease if economic and market condition changes such as economic downturn and new entry of potential competitors. The lift trucks from their respective companies all have cons that required great consideration, as the truck may never satisfy all necessary requirements, as well as costs are considerably high. Problem Definition How can Columbia Industries make the right decision in regards to acquiring better lift trucks? The malfunction and unstable reliability of CI’s lift trucks is causing delay of product delivery which has cost CI some important customers. In addition, the unpleasant performance of lift trucks are rising safety concerns and poses potential risks among......

Words: 304 - Pages: 2

Cis 500

...CIS 500 Weeks 6, 7, 8,9,11 Discussion Questions Week 6 * Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have been experienced by the financial services industry as a result of mobile banking. Phishig – Is when malware is downloaded on to a device and it attempts to obtain personal information. It lies in wait and gathers information from apps such as a mobile banking app to gain your login and password. If you bank does not have proper security in place this can lead to your account getting hacked and loss of money. Smishing- This is where fraudulent communication occurs in the form of a text message in order to obtain personal information. Vishing – This is similar to smishing instead of getting information through text it is obtained through phone calls or voicemails. Cloning- The transfer of information from one device to another device including the electronic serial number When a smartphone is lost or stolen this can lead to a compromise to a person’s personal information since it may be on the phone. I bank with Bank of America and use the mobile app to manage my account transfer funds, pay bills, deposit checks and so on. The app does not store the password but it does store the user login. You are unable to just log in to it from a new device or location without......

Words: 2846 - Pages: 12

Cis 210

...“Inventory Management Systems” Strayer University Joshua Watson Prof. Irene Hoskins CIS 210 (Systems Analysis and Development) April 15, 2015 After discussing your frustration with managing your clothing stores’ inventory using a manual software, I researched and developed a low-cost plan that will implement an automated inventory system to track better inventory. Though our discussion was brief, your business issues seem straight forward. There are a few variable that will require further clarification in order to ensure you have the best tools at your disposal. Information such as # of employees, estimation of inventory, transaction history, and most important, budget are all details required to tailor your automated systems. I am assuming you are currently using an “Excel” type tracking tool to manage your inventory. If you continue to use this type of manual software, there are certain pitfall associated with these types of tools. Excel can’t provide you with real-time inventory tracking. Part of the reason you are frustrated with your tracking system is due to the constant manual changes. Another issue is the lack of error monitoring. Since you manually enter your inventory information, you are the last line of defense when it comes to error monitoring. As your business expands, you will look to add employees. When this occurs, if your business still operates using Excel, you will have limited user access control, and......

Words: 754 - Pages: 4

Wsib Bill 119 Mandatory Coverage in Construction

...WSIB Bill 119 Mandatory Coverage in Construction How will the issue/change impact payroll? If a corporation pays its executive officers regular employment income throughout the year, the firm must report the actual earnings of those executive officers for each reporting period up to the annual maximum amount. If the corporation has workers it must also report the workers’ earnings. The WSIB sets a maximum amount per year that can be reported as insurable earnings each year. The annual maximum for 2016 is $88,000. This means, for 2016, any earnings above $88,000 are not considered insurable and you do not have to report or pay premiums on this excess amount. The cost of coverage depends on earnings and the business activities. WSIB report and pay schedule may be monthly, quarterly, or annually, depending on company total insurable earnings. WSIB report and pay schedule may be monthly, quarterly, or annually, depending on your total insurable earnings. Annual insurable earnings lower than $300,000 - you may select your preferred frequency Annual insurable earnings of $300,000 or more - you will report and pay monthly WSIB Report & Pay Schedules. Annual Reporting Period: January 1 to December 31 Premium Remittance form sent: March Completed form & Payment are due by: April 30 Each time your actual insurable earnings become higher than the estimated amount, you must contact the WSIB, within 10 calendar days, to update your estimate. Failure to do so can......

Words: 285 - Pages: 2

Bsb 119 Assignment

...BSB 119 Assignment Lazybones Case Study Global Business 5.0 Business Environment. The business environments of China and India impact how Lazybones will conduct potential operations, and must therefore be investigated. 5.1 Free Trade Agreements. After 21 rounds of negotiations beginning in 2005, on 17 June 2015 the China-Australia free trade agreement was signed; worth almost $160 Billion (Dfat,2015).The Agreement secures better market access for Australia to the world’s second largest economy, improves our competitive position in a rapidly growing market, and promotes increased two-way investment and reduces import costs (Trade,2015).More than 85 per cent of Australian goods exports will be tariff free, rising to 95 per cent on full implementation.(Trade,2015).China is our biggest export and import market(Dfat,2015). This FTA will only strengthen our country’s relationship, giving us most favoured nation status by helping Australian companies to conduct operation with China.This will greatly benefit Lazybones potential manufacturing sourcing as it will ease the implementation and business relations within China because of our strong relationship. The FTA will ease the barrier to entry for Lazybones in China as the company can capitalise on the political and economic ties Australia has, which ultimately builds business relations and growth. (Image-Retrieved from Austrade 2014) A......

Words: 962 - Pages: 4

Cis 60

...Jialiang Cui ID: 00952328 CIS 60 Chapter 10 RQ1: A cookie, also known as a tracking cookie, browser cookie, or HTTP cookie, is a text file that is stored on your computer by a website. The cookie can be used to track such information as shopping cart contents on websites, preferences, or authentication. A website uses cookie software and code for a variety of different reasons. Depending upon what the website is attempting to use the cookie for will influence how the website uses the cookie. For example cookies can be used to: * Track an individual’s time on a website. * Store data about a user during his or her navigation of a website, even over a number of visits. When a cookie is used like this, it can be used as a shopping cart application on the website. Cookies are stored on the user's hard drive. The directory is different for each platform. RQ2: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Well through the 20th century, stenography was a necessary skill for secretaries, reporters, and other people who needed to quickly and accurately record written information. In all cases, the goal of stenography is to make it easy to write something down quickly and with great accuracy. Using stenography, someone can record information much more quickly than he or she could be writing. Like many......

Words: 665 - Pages: 3

Cis 568

...Riordan Manufacturing CRM Jason Lee CIS/568 Information Systems Concept February 27, 2012 Kemal Tekinel Strategic Planning Strategic planning needs extensive data collection if it is to be successful. An organization needs to know what is happening in its business, political, economic and social environment. It needs to know about its strengths, weaknesses, opportunities and threats. It needs to understand what culture it has and whether that culture fits the environment in which it is operating. It also needs to have a clear idea of the values under which it wants its people to operate, who its stakeholders are and how the organization is going to interact with those stakeholders. All this before it starts to go through the formal planning process. Introduction The President of Lee Technology Group developed this strategic plan to provide Lee Technology Group with a five-year roadmap for support, services and organization development. The President and Vice President will review progress quarterly and will review and update the plan annually as needed. Executive Summary Lee Technology Group mission is to design, develop and implement unique IT solutions for your business. Background and History Lee Technology Group began in 2011 as a start-up offering Project Management and Telecom solutions and services to Government and commercial clients. Lee Technology Group services include IT Project Management from planning to......

Words: 1776 - Pages: 8