Explain internal processes that grant authority for machine

Assignment Help Basic Computer Science
Reference no: EM131218607

Question 1:

A bank customer has two numbers related with his or her ATM card.

a) Name such two numbers.

b) Explain the internal processes that grant authority for the machine to proceed with transactions by using this card.

c) Explain the phases that an email message goes via from the moment the sender presses the SEND button until the time that the recipient reads the message AT A LATER DATE.

d) Name a specific configuration for a LAN and draw a labeled diagram.

e) Name two system programs and illustrate the purpose of each.

f) Illustrate four benefits of using a numeric code for a product instead of using its real name.

g) Describe what is meant by systems life cycle.

h) Name four tasks which a professional business programmer undertakes in his normal course of duty.

i) Spreadsheet programs give a large number of standard functions.

Define function. Name such a function and explain a particular illustration of its use.

Question 2:

You wish to make a database holding details of all your family and friends so that you could use it to extract details like name, address, telephone number, birthday and relationship to you.

·         a) Describe how you would first make the structure for this database.

·         b) Define accurately the terms RECORD and FIELD, giving a single instance of each taken from this application.

·         c) In table format, list six items of data that would be required for this application, giving, for each, an illustration AND its data-type.

·         d) You wish to send a greetings card to chosen people listed in the file. Describe how you could print a list of all people, with their birth dates, who have birthdays in February.

·         e) Describe why date of birth, instead of age, is normally held in a database.

 Question 3:

Choose a currently available commercial word-processing package. Describe, IN GENERAL TERMS, how each of the given features is accomplished. Avoid answers like “press F4”.

·         a) The user chooses the spelling checker. Explain all the options which are then open to the user. Describe and give two illustrations where the spelling checker cannot be able to detect an error.

·         b) Explain carefully how a block of text can be moved from one part of a document and placed in the other position of the same document.

·         c) Define the terms SUBSCRIPT and SUPERSCRIPT. Give a specific illustration of the use for each.

 Question 4:

a) Differentiate clearly between the terms VALIDATION and VERIFICATION.

b) Describe why automatic validation is performed when data is FIRST entered into a computer.

c) Below is CORRECT data held in a college file for a specific student. 

Name John Brown 
Student number 12343 
Date of birth 23/12/1983 
Fees due 123.45

Write down similar data for the other student however with an error in each item, which the COMPUTER would be able to detect as being INCORRECT. Make sure the errors are of different types. In each case, describe why the program would be able to detect the error.

Question 5:

a) Differentiate between RAM and ROM.

b) Draw a diagram showing the fundamental configuration of a computer with input, output and storage facilities.

c) Define the term OMR and describe precisely why it is used in the marking of examination papers.

Verified Expert

1. The sender compose and send the message to his desired recipient by selecting his email address. OSI layers are responsible for sending and receiving messages from one network to another. 2. SMTP protocol is used to transfer email between sending and receiving server and POP3 and IMAP4 are used to transfer email from server to client. 3. When sender hits “send” button, the operating system combine instruction set of application layer and message is send using SMTP to receiving end. 4. The message sits on serve

Reference no: EM131218607

Questions Cloud

Interpret the direct demand function derived : 1. Consider the general demand function: Qd = 8,000-16P + 0.75M + 30PR; where Qd is quantity demanded, P is price, M is income, and PR is the price of a related good.
Certainty that saving equals : At a level of real disposable income of $0, suppose consumption is $2,000. Given this information, we know with certainty that saving equals
What are different kind of latinas cofer says are recognized : What are the different kinds of Latinas Cofer says are recognized in mainstream Anglo-American culture? By making explicit her observations of how others classify people like her, what point does she make about classification in general?
How is the scarce resource : Colorado State University allocates 10,000 tickets for each home game to students at no cost. Students are required to stand in line and prove they are a full time student to receive a free ticket. How is the scarce resource in this example alloca..
Explain internal processes that grant authority for machine : Explain the internal processes that grant authority for the machine to proceed with transactions by using this card. Describe how you would first make the structure for this database. Describe what is meant by systems life cycle Describe how you woul..
What are the pareto effcient allocations : Suppose we have to allocate $100 between two individuals. What are the Pareto effcient allocations? (Assume both enjoy money).
What is the maximum displacement of the fifth mode : Find the relationship between a and b in the following equation that satisfy the Heat equation - What is the maximum displacement of the string at t = L/5 for the fifth mode? Explain how you determined that.
Mixed in to commercial supplies : In 2006, the European Union (EU) threatened to ban imports of long-grain rice because traces of genetically modified rice were found mixed in to commercial supplies.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define the classes shown in the following class hierarchy

Define the classes shown in the following class hierarchy

  Cobit controls to use for an organization

List and describe the two most important questions one should ask when deciding which COBIT controls to use for an organization? With whom should one verify the controls with?

  Write a complete program that will open a file

write a complete program that will open a file called numbers.txt that contains only integers separated by some white space characters. Your program should add up all of the numbers and print out the sum and the average of all the integers in the ..

  Describe the impact of software development

Explain the technologies that have contributed to the exponential growth of the Internet and the World Wide Web (WWW). Describe the impact of software development, and computing technologies on business productivity

  Infrastructure as a service (iaas) from a cloud service

An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..

  Segments appear as one to higher protocols

What device separates a single network into two segments but lets the two segments appear as one to higher protocols?

  Show that every n node binary search tree is not equally lik

Show that every n-node binary search tree is not equally likely (assuming items are inserted in random order), and that balanced trees are more probable than straight-line trees.

  Do you think that the fbi would honor your request

Would you consider this an ethical approach to getting the information you want? Do you think that the FBI would honor your request?

  Create a method to iterate through the list

Create a method to iterate through the list and have the three characters jump each of the heights contained in the list.

  Develop system models based on the unified modeling

you have been asked to develop uml diagrams to graphically depict and describe the architecture of two 2 unrelated

  Write select statement determines paymentdate column invoice

Write a Select statement that determines whether the PaymentDate column of The Invoices table has any invalid values.

  Identify content and functional requirements

Identify Content and Functional Requirements

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd