Get premium membership and access questions with answers, video lessons as well as revision papers.
Two reasons why boot up programs are stored.
1. In Rom
Rom (read only memory) is a memory clip into which fixed data is written permanently at
the time of its manufacture.
Bootstrap program refers to a computer start up program which is held in the form of a
Rom.
The reasons why it is held in Rom include:
i) New data cannot be written into the memory and so the data on the memory clip is
unchangeable and irremovable. This means that data cannot be corrupted and so the
system maintains its consistency.
ii) Rom is a =non volatile‘ memory which means that its contents do not disappear
when the computer power source is switched off. This ensures that data is securely
held and suffers no risk of getting lost. In this case, Rom chips will consist of items
of software such as the computer operating system and various pieces of translation
software.
2. On Disk
A disk is a storage medium which consists of a flat circular disk covered on both sides
with a magnetic material. Data is held on a number of circular concentric tracks on the
surface of the disk and is read or written by rotating the disk past read/write heads.
Disks can be used to store up boot-up programs due to the following reasons:
1. Disks have large storage capacities and can be written or read more quickly by the
computer. This minimise the computer start-up time i.e. the Winchester disk contains
a number of flat sealed airtight packs.
2. Disk storage medium is less expensive than Rom storage media. For example, the
magnetic disks can store substantial data, say a number of programs or lengthy
programs.
gregorymasila answered the question on November 29, 2017 at 09:30
- Access control is the restriction of unauthorized access to a portion of a computer system or the entire system.Required: (a) Explain the following control techniques and...(Solved)
Access control is the restriction of unauthorised access to a portion of a computer system or the
entire system.
Required:
a) Explain the following control techniques and their significance in the context of data security.
i) Biometric control
ii) Encryption
iii) Logical access
Date posted: November 29, 2017. Answers (1)
- Application controls can be classified into three major categories, processing controls and output controls. Describe the objective of each control and examine the techniques within...(Solved)
Application controls can be classified into three major categories, processing controls and
output controls.
Describe the objective of each control and examine the techniques within each to ensure
maintenance of maximum feasible levels of control.
Date posted: November 29, 2017. Answers (1)
- Explain how the use of Information Technology (IT) can bring about improvements in productivity within a business organisation(Solved)
Explain how the use of Information Technology (IT) can bring about improvements in productivity within a business organisation.
Date posted: November 29, 2017. Answers (1)
- Prototyping is based on the simple idea that people can express more easily what they like or do not like about an actual working system(Solved)
Prototyping is based on the simple idea that people can express more easily what they like or
do not like about an actual working system.
Required:
(a)
(i) Examine four guidelines required for the development of a prototype.
(ii) Select two facilities usually found in fourth generation languages (4GLs) and explain their
application in developing a prototype system.
Date posted: November 29, 2017. Answers (1)
- Organisation information systems are categorised under: (i) Transaction Processing System (TPS)(Solved)
Organisation information systems are categorised under:
i) Transaction Processing System (TPS)
ii) Management Information Systems (MIS)
iii) Decision Support System (DSS)
iv) Executive Information System (EIS)
v) Expert Systems (ES)
Required:
Suggest one application of each of the systems types listed above for each of the following
functional areas of business:
- Sales and marketing
- Finance
Date posted: November 29, 2017. Answers (1)
- What impact might end-user computing have on the organisation of information technology functions?(Solved)
What impact might end-user computing have on the organisation of information technology functions?
Date posted: November 29, 2017. Answers (1)
- Suggest examples of activities end-users might not be responsible for.(Solved)
Suggest examples of activities end-users might not be responsible for.
Date posted: November 29, 2017. Answers (1)
- The following are some of the elements which constitute an E-Commerce application: -Automated Teller Machine (ATM ), Electronic Data Interchange (EDI), Internet. Required:Illustrate the contributions of...(Solved)
The following are some of the elements which constitute an E-Commerce application: -
Automated Teller Machine (ATM )
Electronic Data Interchange (EDI)
Internet.
Required:
Illustrate the contributions of each of the above technologies in E-Commerce application.
Date posted: November 29, 2017. Answers (1)
- Explain the meaning of the following terms: (i) Website. (ii) Cyber-cafe (iii) Network browser(Solved)
Explain the meaning of the following terms:
i. Website.
ii. Cyber-cafe.
iii. Network browser.
Date posted: November 29, 2017. Answers (1)
- During the design stage of a new information system, the following issues are addressed: (i) User interface (ii) Data (iii)Process. Required:Discuss the composition of design document under the...(Solved)
During the design stage of a new information system, the following issues are addressed:
(i) User interface.
(ii) Data.
(iii) Process.
Required:
Discuss the composition of design document under the above three elements.
Date posted: November 29, 2017. Answers (1)
- Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of(Solved)
Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of.
Date posted: November 29, 2017. Answers (1)
- Explain the term 'critical path' as used in project management(Solved)
Explain the term 'critical' path as used in project management.
Date posted: November 29, 2017. Answers (1)
- Describe the role of project management(Solved)
Describe the role of project management.
Date posted: November 29, 2017. Answers (1)
- Structured walkthrough addresses some areas of interest in a new program under programming productivity(Solved)
Structured walkthrough addresses some areas of interest in a new program under programming productivity.
Date posted: November 29, 2017. Answers (1)
- Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.(Solved)
Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.
Date posted: November 29, 2017. Answers (1)
- In a sequential narrative. name and describe the main stages in the program development life cycle.(Solved)
In a sequential narrative. name and describe the main stages in the program
development life cycle.
Date posted: November 29, 2017. Answers (1)
- Identify six risks associated with end user computing(Solved)
Identify six risks associated with end user computing.
Date posted: November 27, 2017. Answers (1)
- Explain the role of the following in promoting end user computing (i) Information resource centres. (ii) Object oriented programming.(Solved)
Explain the role of the following in promoting end user computing
(i) Information resource centres.
(ii) Object oriented programming.
Date posted: November 27, 2017. Answers (1)
- Explain the two terms "process engineering and re-engineering".(Solved)
Explain the two terms "process engineering and re-engineering".
Date posted: November 27, 2017. Answers (1)
- Explain the use and application of the following:(i) Telecommuting. (ii) Electric data interchange. (iii) Computer conferencing.(Solved)
Explain the use and application of the following:
(i) Telecommuting.
(ii) Electric data interchange.
(iii) Computer conferencing.
Date posted: November 27, 2017. Answers (1)