IS-109
Jobbet videre med blueJ, fokuserte mest på leiebil-eksempelet fra forelesning denne uken, ettersom det var en del arbeid i andre fag. Lest litt i boken, men ikke jobbet med oppgaver denne uka.
IS-100
Har jobbet med oppgaver og review questions for både kapittel 3 og 4 (ikke helt ferdig med kap 4 enda, oppdateres senere i uken, eller legges ved neste uke). Lest i boka, forberedende til forelesninger og litt ekstra.
Review questions chapter 3
1. How do applications support organizational business processes?
They help to automate business processes, and enables processes that would otherwise not even be possible. For instance, accountants have for centuries used thick books for maintaining the accounting records of a business; automating the associated tasks using accounting software applications not only has helped to make the tasks less effortful and reduce error rates, but in addition allows quick analysis of accounting records.
2. What is middleware?
Middleware is designed to shield programmers from having to build applications for different underlying operating systems, particularly in heterogeneous, distributed environments.
3. Describe the different types of computers and their key distinguishing characteristics.
Supercomputer – Used for scientific research, size of a car up to the size of several rooms, million dollar product. Number of simultaneous users vary from 1 to many.
Mainframe – Used for transaction processing, size of a refrigerator, price range from $500k to $10m. 1000+ simultaneous users.
Server – Used for providing web sites or access to databases, applications or files. Size of a DVD-player, price range from $300 to $50k, 10.000+ simultaneous users.
Workstation – Used for engineering, medical or graphic design. From the size of a PC to the size of a cabinet, price range $750 to $100k. Usually one user at a time.
Personal computer, PC – Used for personal productivity, price range from about $200 to $5k, one user at a time. Size: from the size of a small laptop to a big desktop PC.
4. Describe the key functions of system software.
The most prominent type of system software is the operating system (OS), such as Windows, Mac OS or Linux.
OS’ coordinates the interaction between hardware components (CPU, monitor), peripherals (e.g., printers), application software (e.g., office programs), and users. OS are often written in assembly language, a very low-level computer programming language that allows the computer to operate quickly and efficiently. The operating system is designed to insulate you from this low-level language and make computer operations unobtrusive.
Further, the OS provides a common layer for different underlying devices, so that applications only have to be developed for different operating systems, rather than for each different computer model. The OS performs all of the day-to-day operations that we often take for granted when using a computer, such as updating the system clock, printing documents, or saving data to a disk.
5. List the five generations of computing.
Generation 1: 1946-1958, vacuum tubes, mainframe era begins, ENIAC and UNIVAC developed.
Generation 2: 1958-1964, transistors, mainframe era expands, UNIVAC is updated with transistors.
Generation 3: 1964-1990s, integrated circuits, mainframe era ends, PC era begins, IBM 360 with general purpose OS, microprocessor revolution.
Generation 4: 1990s-2000, PC era ends, interpersonal computing era begins, high-speed microprocessors and networks, high-capacity storage, low-cost, high-performance integrated video, auto and data.
Generation 5: 2000-present, Interpersonal computing era ends, Internetworking era begins, Ubiquitous access to internet with a broad variety of devices, prices continue to drop; performance continues to expand, advent of powerful mobile devices, ubiquitous mobile connectivity.
6. What are the distinguishing characteristics of different storage media?
Three examples of different data types that needs to be stored.
Operational – processing transactions or for data analysis.
Backup – short term copies of organizational data, used to recover from system-related disaster. Backup data are frequently overwritten with newer backups.
Archival- long term copies of organizational data, often used for compliance and reporting purposes.
Storing in databases using disk-based storage media such as hard drives. HDDs offer high access speeds and are thus preferred for data that are frequently accessed or where reponse time is of the essence.
Flash-based storage is increasingly used for situations where access speed is of crucial importance.
Hard drives are also used for backup of data in case disaster strikes, which will allow them to seamlessly continue business if the primary system fail. Storing backup data on hard drives enables quick recovery without slowing the company’s operations.
Data that are no longer used for organizational purposes are usually stored on long-term storage devices such as magnetic tape. Access speed is slow, however, magnetic tape has a shelf life of up to 30 years, is very low cost as compared to other storage media, and is removable.
7. How does computer networking work?
- A computer network connects all the, taken alone, low-value components, and makes you realize the value. For instance, the best performing database would be useless if it could not be accessed by those people or applications throughout the organization that depend on the data. Further, one of the seasons why information systems have become so powerful and important is the ability to interconnect, allowing internal and external constituents to communicate and collaborate with each other.
Virtually all types of data can be transmitted on a computer network, although each type of information has vastly different requirements for effective transmission (in essence, data size determines the requirements).
8. What is a database?
A database is an organized collection of data. The data are typically organized to model aspects of reality in a way that supports processes requiring information. For example, modeling the availability of rooms in hotels in a way that supports finding a hotel with vacancies.
9. What is the World Wide Web, and what is its relationship to the Internet?
The internet is a global network that enables individuals to interconnect, and is a worldwide collection of networks that use a common protocol to communicate.
World Wide Web (WWW or W3) is one of the most powerful uses of the internet. WWW is a system of interlinked documents on the internet, or a graphical user interface to the internet that provides users with a simple, consistent interface to access a wide variety of information. A Web browser is a software application that can be used to locate and display web pages, including text, graphics, and multimedia content.
10. What are URLs, and why are they important to the WWW?
A URL (Uniform Resource Locator) is used to identify and locate a particular web page. For example, www.google.com is the URL used to find the main Google Web server.
The URL has three distinct parts: the domain, the top-level domain, and the host name.
The domain name is a term that helps people recognize the company or person that the domain name represents. For example, googles’s domain name is google.com.
The suffix, top-level domain, is the .com (commercial organizations). Other popular top-level domains are .edu (educational), .org (non-profit), .gov (US government), .net (networking) ,and country-based ones such as .no (Norway), .de (Germany) etc.
Host name is a particular web server or group of web servers that will respond to the request. In most cases, the “www” host name refers to the default Web site or the home page of the particular domain. Other host names can be used, for example, drive.google.com will take you to the group of Web servers responsible for serving up Google’s cloud-based storage for documents.
11. Define the terms “transmission media”, “protocol” and “bandwidth”.
Transmission media – The physical pathways to send data and information between two or more entities on a network (for instance, a coaxial cable, fiber optic cable, etc.).
Protocol – A procedure that different computers follow when they transmit and receive data.
Bandwidth – The transmission capacity of a computer or communications channel. For instance, the speed of which you can download/upload files on or from your computer from or to the internet.
12. Describe the characteristics of the cloud computing model.
On-Demand Self-Service – Users can access cloud resources in a buffet-style fashion on an as-needed basis without the need for lengthy negotiations with the service provider.
Rapid Elasticity – Servers and other elements of an IS infrastructure take several weeks to be delivered and days or weeks to be configured; in contrast, in a cloud environment, computing resources can be scaled up or down almost instantaneously and often automatically, based on user needs. Hence, there is no need to purchase expensive equipment to prepare for an anticipated surge in demands.
Broad Network Access – The cloud is accessible from almost anywhere from almost any Web-enabled device. This enables real-time management of business processes.
Resource pooling – Rather than renting out space, cloud providers manage multiple distributed resources that are dynamically assigned to multiple customers based on their needs. Customers only rent a resource.
Measured Service – Service is usually provided using a utility computing model, where customers pay only for what they use, and the metering depends on the type of resource. The fixed costs associated with the IS infrastructure are thus transformed into variable costs, which are very easy to track and monitor.
Infrastructure as a Service (IaaS) – Only the basic capabilities of processing, storage and networking are provided. Hence, the customer has the most control over the resource. For example, using Amazon Web Services, customers can choose computing power, memory, operating system, and storage based on individual needs and requirements.
Platform as a Service (PaaS) – The customer can run his or her own applications that are typically designed using tools provided by the service provider. The user has control over the application but has limited or no control over the underlying infrastructure. For example Microsoft’s Windows Azure, which acts as a cloud services operating system that customers can use to deploy custom applications.
Software as a service (SaaS) – The customers uses only applications provided via a cloud infrastructure. Typically, such applications unclude Web-based e-mail services and Web-based productivity suites, but also advanced applications such as CRM (Customer Relationship Management) systems, as provided by salesfore.com. Usually the customer cares only about the application, with no knowledge or control over the underlying infrastructure, and typically has only limited ability to control or configure application-specific settings.
13. What is Moore’s law and how is it relevant to information technology?
Moore’s Law was a prediction that Intel cofounder Dr. Gordon Moore hypothesized in 1965, saying that the number of transistors on a chip would double every two years. The first CPU had 2,200 transistors, the newest models have broken the 2-billion-transistor mark, so Dr. Moore’s prediction has been fairly accurate so far. The number of transistors determines at which speeds a CPU is able to process. For instance, a modern Intel Core i7 Extreme CPU can complete hundreds of millions of operations every second.
This is both a blessing and a curse. On one hand, information systems become increasingly powerful and capable of dealing with the required tasks. On the other hand, the rapid improvement of systems requires regular updates and upgrades, and is a huge cost to organizations.
14. Define grid computing and describe its advantages and disadvantages.
Grid computing is basically combining the power of a large number of smaller, independent, networked computers (often regular desktop PCs) into a cohesive system in order to solve problems that only supercomputers were previously capable of solving. Supercomputers have limitations and a much, much bigger cost. Similar to cloud computing, grid computing makes use of distributed resources; however, in contrast to cloud computing, the resources in a grid are typically applied to a single large problem. To make grid computing work, large computing tasks are broken into small chunks, each of which can then be completed by individual computers.
Some of the positives are: Lower cost as opposed to a supercomputer, no need for storage space (supercomputers occupy big spaces), utilizing otherwise unused resources (idle computers/computers with leftover computing capabilities), no limitation on processing power.
Some negatives: Demands to the underlying network infrastructure or software managing the distribution of tasks, the slowest computer can bottleneck the whole grid. Though some of these disadvantages can be overcome by using a dedicated grid.
15. Give a few examples of advanced cloud applications.
16. Describe why green computing has become so important to modern organizations.
There are several important aspects as to why green computing has become important. Firstly, companies are being increasingly scrutinized for their contribution to societal issues such as global warming. This causes more and more organization trying to portray a “greener” image when it comes to the use of energy and natural resources.
There’s also big money to be saved on saving energy. A computer in your home might not be a big impact on your energy bill, but within an organization with hundreds or even thousands of computers, the difference is enormous. For instance, General Electric saved $6.5 million in electricity annually by simply changing the power saving settings for its computers. Further, discouraging employees from printing out e-mails or documents can help to reduce the waste of paper – an average office worker prints more than a tree’s worth of paper each year.