Capili Jefferson
Capili Jefferson
BIT AUTO 3A
Assignment 1 Module 1
1. What do you think the effect of information systems in your everyday living?
2. In what way can information systems in your course/major?
3. Differentiate the operation of industries today and their situation before information systems was established.
4. Define the type of roles, function, and career available in the field of information systems.
Information systems are a part of our daily lives. Consider all the things you can do online, such as applying for
jobs, paying bills, registering for classes, or booking travel. These instances demonstrate how essential IS are to
our day-to-day activities. We might live a simpler existence as a result of IS.
You value IS because it is used by all corporate departments, which is the second reason. It will be simpler for you
to find employment if you are majoring in IS or IT faculty. If you have a bachelor's degree in information systems
or a related field, you can apply for jobs such as project manager, system analyst, network manager, database
administrator, web designer, and chief information officer.
2. In vehicle, information systems may increase mental burden and distraction, but they may also promote
safety, situational awareness, and driver comfort. Because driving conditions in road tunnels are so perilous, this
issue is especially crucial.
3. Information systems have an impact on both personal and professional lives. Information technologies can be
utilized in the workplace to reduce time-consuming chores and allow employees more autonomy, or they can be
carelessly used to eliminate employment and subject the remaining labor to widespread electronic surveillance.
4. There are job opportunities in business, government, non-profits, and education in the growing field of
information systems. You have a wide range of job options with an information systems major. Options for
careers range from highly technical ones like network administration or programming to more interpersonal ones
like training or help desk support.
Network Management
The technical maintenance of a company's network infrastructure is the responsibility of the network
administrators. This line of employment entails duties including creating and maintaining servers, developing
cabling, validating users, offering security, and assuring the network's continued day-to-day operations.
Numerous different types of networks exist, and experts in network systems and data communications examine,
develop, test, and assess systems like LANs, WANs, the Internet, intranets, and other data communications
networks. These analysts plan, analyze, and model networks; they may also conduct related product research
and recommend appropriate hardware and software. The interaction of computer and communications
technology is the primary focus of telecommunications professionals.
IT system analysts
Systems analysts find areas where corporate processes can be improved and create solutions involving
computers and systems. These individuals assist their clients in defining their technological demands and
designing the best system for them. They assist a company in getting the most out of its investment in resources
like staff and business operations. This could involve creating and planning brand-new computer systems or
coming up with ways to use the resources of current systems for new tasks. The US is planning to hire systems
analysts. From 2000 to 2010, one of the top three growing jobs, according to the Department of Labor, was.
Consultants
Many businesses, like Accenture, Deloitte-Touche, IBM, and Unisys, offer guidance to their clients who are trying
to use information technology more efficiently. Information systems majors are employed by these businesses to
advise their clients. For their clients, consultants take on the roles of system analysts, programmers, database
administrators, and troubleshooters. On both short-term and long-term projects, consultants frequently
implement continuous quality improvement techniques or reengineer processes.
Programmers of computers
Computer programmers create, compose, test, and maintain the intricate instructions referred to as programs
that computers must adhere to in order to carry out their tasks. The function of a programmer has been altered
by numerous technical advancements in programming, including sophisticated new languages and programming
tools, advanced computing technology, and new programming languages.
Capili Jefferson V.
BIT AUTO 3A
Assignment 2 Module 2
1. What issues can arise when the CPU runs at a very fast rate?
2. What are the different types of memory being used by a computer? explain their roles.
3. What are the basic input output devices are needed to run a computer?
1. If a CPU is constantly running at a fast speed, this can result in higher power consumption and temperatures. A
CPU can overheat under high temperatures, which can result in the destruction of the CPU or the hardware it is
connected to. While it is possible for computer users to purposefully "overclock" their machines make them run
faster than the processor's recommended voltage/frequency, doing so runs the risk of overheating the CPU,
which frequently causes computers to crash or, in the worst situations, can completely destroy it. Since
overclocking must be done consciously, there is minimal chance of your computer suffering any damage unless
you overclock it manually. Fortunately, the majority of computing systems are built to run for hours at a time at
maximum load without overheating.
In general, memory can be divided into primary and secondary memory; moreover, there are numerous types of
memory when discussing just primary memory. Some types of primary memory include the following
Cache memory. This temporary storage area, known as a cache, is more readily available to the processor than
the computer's main memory source. It is also called CPU memory because it is typically integrated directly into
the CPU chip or placed on a separate chip with a bus interconnect with the CPU.
RAM. The term is based on the fact that any storage location can be accessed directly by the processor.
Dynamic RAM. DRAM is a type of semiconductor memory that is typically used by the data or program code
needed by a computer processor to function.
Static RAM. SRAM retains data bits in its memory for as long as power is supplied to it. Unlike DRAM, which
stores bits in cells consisting of a capacitor and a transistor, SRAM does not have to be periodically refreshed.
Double Data Rate SDRAM. DDR SRAM is SDRAM that can theoretically improve memory clock speed to at least
200 MHz.
Double Data Rate 4 Synchronous Dynamic RAM. DDR4 RAM is a type of DRAM that has a high-bandwidth
interface and is the successor to its previous DDR2 and DDR3 versions. DDR4 RAM allows for lower voltage
requirements and higher module density. It is coupled with higher data rate transfer speeds and allows for dual
in-line memory modules (DIMMS) up to 64 GB.
Rambus Dynamic RAM. DRDRAM is a memory subsystem that promised to transfer up to 1.6 billion bytes per
second. The subsystem consists of RAM, the RAM controller, the bus that connects RAM to the microprocessor
and devices in the computer that use it.
Read-only memory. ROM is a type of computer storage containing nonvolatile, permanent data that, normally,
can only be read and not written to. ROM contains the programming that enables a computer to start up or
regenerate each time it is turned on.
Programmable ROM. PROM is ROM that can be modified once by a user. It enables a user to tailor a microcode
program using a special machine called a PROM programmer.
Erasable PROM. EPROM is programmable read-only memory PROM that can be erased and re-used. Erasure is
caused by shining an intense ultraviolet light through a window designed into the memory chip.
Electrically erasable PROM. EEPROM is a user-modifiable ROM that can be erased and reprogrammed repeatedly
through the application of higher than normal electrical voltage. Unlike EPROM chips, EEPROMs do not need to
be removed from the computer to be modified. However, an EEPROM chip must be erased and reprogrammed in
its entirety, not selectively.
Virtual memory. A memory management technique where secondary memory can be used as if it were a part of
the main memory. Virtual memory uses hardware and software to enable a computer to compensate for physical
memory shortages by temporarily transferring data from RAM to disk storage.
3. Printers, displays, headphones, scanners, and other input and output devices include keyboards, mouse, and
scanners. Computer memory is another crucial component of a hardware system.
4. Users can configure, analyze, optimize, and maintain a computer with the aid of utility software. Small
programs that are frequently integrated into the operating system (OS) are what this software typically consists
of.
5. Advantages :
The new upgrade may get you rid of the bugs present in the current version.
The upgrade may bring in some new features to make the application better.
The upgrade may make the application better support the latest version of your operating system (in case there
have been some updates in that too).
The upgrade may bring in a revamped user interface to make the application more user friendly.
The upgrade may make the application compact, so that it will take less space on your device.
Disadvantages :
The new upgrade may bring new set of bugs with it.
The upgrade may remove some of the good features (maybe your favourite one's) which the manufacturer
doesn't find good enough anymore.
The upgrade if not tweaked properly by the manufacturer, might make it do crazy things on your updated
operating system.