If you order your custom term paper from our custom writing service you will receive a perfectly written assignment on Bruce DAWE. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality Bruce DAWE paper right on time.
Our staff of freelance writers includes over 120 experts proficient in Bruce DAWE, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your Bruce DAWE paper at affordable prices!
I.T sac 1 part B Bruce sawe
Analyse the Information System
Introduction
A) Room 15 falls under the category of an information system because it has the capability of processing information from raw data because it contains hardware and software which does all the processing.
Help with essay on Bruce DAWEB) The main role of room 15 (yeshivah) to educate the pupils of the school about information technology and how to operate computers such as spread sheets, word processing and to take the overall knowledge and implement it (hopefully) in their future jobs. Other classes also have the opportunity for other reasons connected to their study to use the room for example religious classes and also humanity subjects.
Hardware Hardware also plays a major role in room 15 and in an information system anything physical that you can touch is basically is part of the hardware components which make up a computer.
Intel Pentium 4
CPU of 1.8GHz CISC made by Intel
46 MG RAM
Server's total hard-drive 100gig (tape drive back up)
½ inch Floppy Disk Drive Sony
17" Monitor Phillips 107E
DVD/CD players 5 speed max By LG
Ethernet NIC
8. Giga bite (GB) HDD
Sound card (18 bit)
Video card
Graphics card
( the above three are all integrated onto the mother board)
Routers
modems
Cat5 shield twin pair cable (51 MBs OF RAM)
Keyboards
Mouses (optical)
&
Speakers
Scanner
Printer
FDD
Universal serial controller
ultra power supply
Patch panel
Hub
Proxy server
switch
Software
Microsoft office XP
" " (OS) windows Xp
Firewall (gateway)
Antivirus (Norton antivirus corporate edition)
NOS Windows NT4
Internet explorer (6.0)
Windows media player
Powerpoint
Access
Visual basic
msn
We need these software in room 15 so we can do our work protect and control our computers, network our computers together, delete viruses and also very Important is to have internet access to we can research materials need for assignments.
Network Architecture and topology
Room 15 has the topology or should I say set up as a star (shape) network which is connected to other parts of the network through busses.
The network architecture of room 15 is basically made up of these "building blocks" the users (clients) and the server, router, modem , bus , radio link , connectors, broad band , streaming video and audio, ADSL , TCP/IP, ftp ,pot ,smpt,dhcp, cat5 ,radio, routing protocol and communication. The main server area saves the files of each user, each independent client of a computer is considered a 'fat client' whereby they each run on their own operating system and has its own applications and they have control over what they do in their account.
Network media
The network media used in Yeshivah are Cat5 cables (category 5). Cat5 cables are basically form of twisted-pair cables which are separate wires twisted around each other. This is mainly used in LAN (local area networks). it also uses RJ-45 connectors. Room 15 connects to other servers such as the administration by radio transceivers which are picked up by antennas which pick up the radio signals bought down.
Access
To access Room 15 there a number of steps we have to do.
Climb to the second floor
Open the door (teacher and key)
Then we walk in and sit down
We switch on the computers
We access are computers by logging on
Then we go to the server and access the work requirements of the teacher.
Keep in mind that access is a very important role of an information system because all are data easily and as quickly as possible and everything has to work effectively and as efficiently as possible. With out any access we wont be able to operate nothing. Ergonomics is also a very important role because we want to access things very easily for example we don't want to keep on adjusting are chairs or monitor because of hight or a backrest so in order to keep the ergonomics suitable for our need (requirements) we try to use all our limited resources as efficient and effective as possible.
Disk and file management
The operating system needs to keep track of the detail of each file, its name, its size, its type physical location on the storage medium, and preform file management functions including deleting, copying, moving and naming . We can see that room 15's disk and file management operates in the same way it tracks the details of each file and from which user it has come from it records its name and size and also its type so we know where is stored and where to store is for other uses.
Security
In the computer room (room 15) we don't really want people entering our own accounts so to prevent that we each have our own "log in " name and password so only we and the teachers if need be have access. The reason for this is being the fact that we might have some sensitive data or information that we don't want anybody to know about and also mainly for our privacy. If there would be no security on our computers people would be able to change the settings delete or install things they shouldn't and access personal account that could be very "dangerous" if plays around with it. We also have bands on certain site because they could be unsuitable or pose a threat in harming our network by transmitting viruses to prevent access to such sites we use a special software called Netgear to monitor and prevent access to sites. In case we do get a virus we have Norton antivirus to go back and fix the virus. We also have a "firewall" on the gateway or proxy server which filters any information that may contain a virus coming through an internet connection into the network. If it does have a virus it wont allow it to go onto the network because it comes from a "suspect" source it is not allowed through.
Data types and formats
Anything that you see, view , hear and read on the computers of room 15 or shall I say any other computers is most likely to be a DATA TYPE. Data types are sounds, text , images (pictures) and video, each one following has a range of formats that we use all the time. Below are listed just some of the data types and formats.
Sound= wav,mp , mp
Text= .doc
Pictures(images)= bitmap, jpeg
Video=Mpeg
We use all these data types and formats when we write a document in word or we listen to music or even when we are on the internet and we look at some images or movies. Each format is unique in its own way some are better quality some maybe less we try to use the best quality normally that would take less memory so we can process it faster. When we may build a website we use html ( hypertext markup language) As you can see we use these data types and formats all the time hence that data types are also different to formats.
Please note that this sample paper on Bruce DAWE is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on Bruce DAWE, we are here to assist you. Your cheap custom college paper on Bruce DAWE will be written from scratch, so you do not have to worry about its originality.
Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!
0 comments:
Post a Comment