Introduction to Information Technology Old Questions and Solution 2078 - Bsc.Csit
Differentiate analog computer with digital computer. What is CPU and how its works? What does an instruction
cycle in CPU consists of?
The difference between analog and digital computer are
| S.No. | ANALOG COMPUTER | DIGITAL COMPUTER |
|---|---|---|
| 01. | Analog computers works with continuous values or these types of systems process continuous data. | Digital computers works with discrete values or these types of systems process discrete data. |
| 02. | Speed of analog computers is less than the digital computers. | Speed of digital computers is more than the analog computers. |
| 03. | Analog computer has very low or limited memory and it can store less amount of data. | Digital computer has very big memory it can store large amount of data. |
| 04. | Analog computer has no state. | Digital computer has On and Off these 2 steps. |
| 05. | Analog computers are less reliable than digital computers. | Digital computers are more reliable than analog computers. |
| 06. | Its performance is comparatively low. | Its performance is very high. |
| 07. | Its speed of processing is not so high. | Its speed of processing is very high. |
| 08. | Analog computers depends upon physical variations. | Digital computers does not depend upon physical variations. |
| 09. | It provides results with less accuracy as compared to digital computers. | It provides results with higher accuracy as compared to analog computers. |
| 10. | Analog computers are difficult to use. | Digital computers are not so difficult to use. |
| 11. | Analog computers have complex architecture. | Digital computers do not have so complex architecture like analog computers. |
| 12. | Readability of analog computer is low. | Readability of digital computer is high. |
| 13. | Analog computers show the result in terms of voltage signals. | Digital computers show the result in computer display screen. |
| 14. | Analog computers employs analog encoding. | Digital computers employs digital encoding. |
| 15. | Power consumption is high. | Power consumption is low. |
| 16. | They are usually special purpose devices. | It can be general purpose devices. |
| 17. | Examples includes analog clock and thermometer etc. | Examples includes Digital laptop, digital camera, digital watches etc. |
CPU is known as central processing unit. A CPU is an electronics circuit used in a computer that fetches the input instructions or commands from the memory unit, performs arithmetic and logic operations and stores this processed data back to memory.
Component of CPU:
Control Unit
The Control Unit is an internal part of a CPU that co-ordinates the instructions and data flow between CPU and other components of the computer. It is the CU that directs the operations of a central processing unit by sending timing and control signals.
Arithmetic Logic Unit
The ALU is an internal electronic circuitry of a CPU that performs all the arithmetic and logical operations in a computer. The ALU receives three types of inputs.
- Control signal from CU ( Control Unit )
- Data(operands) to be operated
- Status information from operations done previously.
When all the instructions have been operated, the output that consists of data is stored in memory and a status information is stored in internal registers of a CPU.
Working of CPU:
All the CPUs regardless of their origin or type performs a basic instruction cycle that consists of three steps named Fetch, decode and Execute.
1.Fetch
A program consists of a number of instructions. Various programs are stored in memory. During this step, the CPU reads instruction that is to be operated from a particular address in the memory. The program counter of CPU keeps the record of address of the instructions.
2. Decode
A circuitry called instruction decoder decodes all the instructions fetched from the memory. The instructions are decoded to various signals that control other areas of CPU.
3. Execute
In the last step, the CPU executes the instruction. For example, it stores a value in the particular register and the instruction pointer then points to other instruction that is stored in next address location.
source: it4nextgen
What is computer Network? Discuss different types of data transmission media in computer network with their
advantages and disadvantages.
A computer network is a group of computers linked to each other that enables the computer to communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four types:
- LAN(Local Area Network)
- PAN(Personal Area Network)
- MAN(Metropolitan Area Network)
- WAN(Wide Area Network)
In data communication terminology, a transmission medium is a physical path between the transmitter and the receiver i.e. it is the channel through which data is sent from one place to another. Transmission Media is broadly classified into the following types:
1. Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being transmitted are directed and
confined in a narrow pathway by using physical links.
Features:
- High Speed
- Secure
- Used for comparatively shorter distances
There are 3 major types of Guided Media:
(i) Twisted Pair Cable –
It consists of 2 separately insulated conductor wires wound about each other. Generally, several such pairs are
bundled together in a protective sheath.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2 parallel conductors
each having a separate insulated protection cover. The coaxial cable transmits information in two modes:
Baseband mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is split into separate ranges).
Cable TVs and analog television networks widely use Coaxial cables.
(iii) Optical Fiber Cable –
It uses the concept of reflection of light through a core made up of glass or plastic. The core is surrounded by
a less dense glass or plastic covering called the cladding. It is used for the transmission of large volumes of
data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer) supports two modes, namely unidirectional and bidirectional mode.
The advantage and disadvantage of guided media are
Advantages
- The cost of guided media is very low (inexpensive) and easily available.
- This is very Flexible and Lightweight.
- Very easy to set up and install.
Disadvantages
- Bandwidth is very low in guided media.
- Susceptible to interference and noise- (Noise is an electrical disturbance that can degrade communication)
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical medium is required for the
transmission of electromagnetic signals.
Features:
- The signal is broadcasted through air
- Less Secure
- Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The sending and receiving antennas need not be
aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for transmission.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each
other. The distance covered by the signal is directly proportional to the height of the antenna. Frequency
Range:1GHz – 300GHz. These are majorly used for mobile phone communication and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through obstacles. This
prevents interference between systems. Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless
mouse, keyboard, printer, etc.
The advantage and disadvantage of unguided media are
Advantages:
- Use for long distance communication.
- High speed data transmission.
- Many receiver stations can receive signals from same sender station.
Disadvantages:
- Very costly.
- Radio waves travel through Lowest portion of atmosphere
What is database management system? Why database management systems are used. Discuss the database system
architecture.
Database system is the software package for managing the databases. There are several database systems on the basis of how they manage the database.
There are mainly two types of database forms
- Single-file Database
- Relational Database
1. Data Integrity
Data integrity means data is consistent and accurate in the database. It is essential as there are multiple databases in DBMS. All these databases contain data which is visible to multiple users. Therefore, it is essential to ensure that data is consistent and correct in all databases for all users.
2. Data Security
Data security is a vital concept in a database. Only users authorized must be allowed to access the database and their identity must be authenticated using username and password. Unauthorized users shouldn’t be allowed to access the database under any circumstances as it violets the integrity constraints.
A DBMS provides a better platform for data privacy thus helping companies to offer an improved data security.
3. Better data integration
Due to the database management system, we have access to well managed and synchronized form of data making it easy to handle. It also gives an integrated view of how a particular organization is working and keeps track of how one segment of the company affects another segment.
4. Minimized Data Inconsistency
Data inconsistency occurs between files when various versions of the same data appear in different places. Data consistency is ensured in the database; there is no data redundancy. Besides, any database changes are immediately reflected by all users, and there is no data inconsistency.
5. Faster Data Access
The database management system helps the users to produce quick answers to queries making data accessing accurate and faster
5. Simplicity
DBMS allows us to understand data better with a clear and simple logical view. With dbms, many operations like deletion, insertion or creation of file or data, are easy to implement.
6. Recovery and Backup
DBMS automatically takes care of recovery and backup. The users are not required to take periodical backup as this is taken care of by DBMS. Besides, it also restores a database after a system failure or crash to prevent its previous condition.
This DBMS architecture has three levels:
1. External level
2. Conceptual level
3. Internal level
1. External level
It is also called view level. The reason this level is called “view” is because several users can view their desired data from this level which is internally fetched from database with the help of conceptual and internal level mapping.
The user doesn’t need to know the database schema details such as data structure, table definition etc. user is only concerned about data which is what returned back to the view level after it has been fetched from database (present at the internal level).
External level is the “top level” of the Three Level DBMS Architecture.
2. Conceptual level
It is also called logical level. The whole design of the database such as relationship among data, schema of data etc. are described in this level.
Database constraints and security are also implemented in this level of architecture. This level is maintained by DBA (database administrator).
3. Internal level
This level is also known as physical level. This level describes how the data is actually stored in the storage devices. This level is also responsible for allocating space to the data. This is the lowest level of the architecture.
What is cache memory? How it is different from register?
Cache memory is a small-sized type of volatile computer memory that provides high-speed data access to a processor and stores frequently used computer programs, applications and data.
A temporary storage of memory, cache makes data retrieving easier and more efficient. It is the fastest memory in a computer, and is typically integrated onto the motherboard and directly embedded in the processor or main random access memory (RAM).
Difference between Cache Memory and Register :
| S.No. | CACHE MEMORY | REGISTER |
|---|---|---|
| 1. | Cache is a smaller and fastest memory component in the computer. | Registers is a small amount of fast storage element into the processor. |
| 2. | Cache memory is exactly a memory unit. | It is located on the CPU. |
| 3. | It is used during reading and writing processes from the disk. | It is used to store and retrieve information from them. |
| 4. | It is a high-speed storage area for temporary storage. | It is used to store data temporarily for processing and transfer. |
| 5. | It copied the recently used data into. | It holds operands or instruction that CPU is currently processing. |
| 6. | It reduces the average memory access time. | It reduces the time required to find the item stored in memory. |
| 7. | CPU accesses memory at the faster rate than register. | CPU can operate on register contents at the rate of more than one operation in one clock cycle. |
| 8. | Dynamic Page Cache, Database Query Cache are example of cache. | Loop counters is example of register. |
Discuss about the source data entry device with example.
Following are some of the important input devices which are used in a computer −
- Keyboard
- Mouse
- Joy Stick
- Light pen
- Track Ball
- Scanner
- Graphic Tablet
- Microphone
- Magnetic Ink Card Reader(MICR)
- Optical Character Reader(OCR)
- Bar Code Reader
- Optical Mark Reader(OMR)
Here, we will discuss Keyboard and Mouse:
1. Keyboard
Keyboard is the most common and very popular input device which helps to input data to the computer. The layout of the keyboard is like that of traditional typewriter, although there are some additional keys provided for performing additional functions.
Keyboards are of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are also available for Windows and Internet.
The keys on the keyboard are as follows −
| S.No | Keys & Description |
|---|---|
| 1 |
Typing Keys These keys include the letter keys (A-Z) and digit keys (09) which generally give the same layout as that of typewriters. |
| 2 |
Numeric Keypad It is used to enter the numeric data or cursor movement. Generally, it consists of a set of 17 keys that are laid out in the same configuration used by most adding machines and calculators. |
| 3 |
Function Keys The twelve function keys are present on the keyboard which are arranged in a row at the top of the keyboard. Each function key has a unique meaning and is used for some specific purpose. |
| 4 |
Control keys These keys provide cursor and screen control. It includes four directional arrow keys. Control keys also include Home, End, Insert, Delete, Page Up, Page Down, Control(Ctrl), Alternate(Alt), Escape(Esc). |
| 5 |
Special Purpose Keys Keyboard also contains some special purpose keys such as Enter, Shift, Caps Lock, Num Lock, Space bar, Tab, and Print Screen. |
2. Mouse
Mouse is the most popular pointing device. It is a very famous cursor-control device having a small palm size box with a round ball at its base, which senses the movement of the mouse and sends corresponding signals to the CPU when the mouse buttons are pressed.
Generally, it has two buttons called the left and the right button and a wheel is present between the buttons. A mouse can be used to control the position of the cursor on the screen, but it cannot be used to enter text into the computer.
How binary addition is done? Show binary addition of (11001) with (11011).
The addition and subtraction of the binary number system are similar to that of the decimal number system. The only difference is that the decimal number system consists the digit from 0-9 and their base is 10 whereas the binary number system consists only two digits (0 and 1) which make their operation easier.
The binary number system uses only two digits 0 and 1 due to which their addition is simple. There are four basic operations for binary addition:
0+0=0
0+1=1
1+0=1
1+1=10
Now, look at the example of the binary addition:101 + 101
Procedure for Binary Addition of Numbers:
101
(+) 101
- Step 1: First consider the 1’s column, and add the one’s column,( 1+1 ) and it gives the result 10 as per the condition of binary addition.
- Step 2: Now, leave the 0 in the one’s column and carry the value 1 to the 10’s column.
1
101
(+) 101
————–
0
- Step 3: Now add 10’s place, 1+( 0 + 0 ) = 1. So, nothing carries to the 100’s place and leave the value 1 in the 10’s place
1
101
(+) 101
————-
10
- Step 4: Now add the 100’s place ( 1 + 1 ) = 10. Leave the value 0 in the 100’s place and carries 1 to the 1000’s place.
1
101
(+) 101
————-
1010
So, the resultant of the addition operation is 1010.
When you cross-check the binary value with the decimal value, the resultant value should be the same.
The binary value 101 is equal to the decimal value 5
So, 5 + 5 = 10
The decimal number 10 is equal to the binary number 1010.
Problem: 11001 + 11011
Solution:
1 1 1
1 1 0 0 1
+ 1 1 0 1 1
——————
1 1 0 1 0 0
(11001)2 + (11011)2 = (110100)2
What is software? How it differs from hardware? Why software is needed?
Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It is the opposite of hardware, which describes the physical aspects of a computer. Software is a generic term used to refer to applications, scripts and programs that run on a device. It can be thought of as the variable part of a computer, while hardware is the invariable part.
Difference between Software and Hardware are:
| Hardware | Software |
|
Hardware is further divided into four main categories:
|
Software is further divided into two main categories:
|
| Developed using electronic and other materials | Developed writing using instructions using a programming language |
| When damaged, it can be replaced with a new component | When damaged it can be installed once more using a backup copy |
| Hardware is physical in nature and hence one can touch and see hardware | The software cannot be physically touched but still can be used and seen |
| Hardware cannot be infected by Viruses | The software can be infected by Viruses |
| Hardware will physically wear out over time | Software does not wear out but it can be affected by bugs and glitches |
| An example of Hardware is hard drives, monitors, CPU, scanners, printers etc. | An example of software is Windows 10, Adobe Photoshop, Google Chrome etc. |
We need software because:
1. Reduces complexity
Big softwares are always complex and difficult to develop. Software engineering has a great solution to decrease the complexity of any project. Software engineering divides big problems into several small problems. And then start solving each small problem one by one. All these small problems are solved independently to each other.
2. To minimize software cost
Software requires a lot of hardwork and software engineers are highly paid professionals. A lots of man force is requires to develop software with millions of codes. But in software engineering, programmers plan everything and reduce all those things that are not required. In turn, cost for software productions becomes less as compared to any software that does not use software engineering approach.
3. To decrease time
Anything that is not made according to the plan always wastes time. And if you are making big software then you may need to run many code to get the ultimate running code. This is a very time consuming process and if it is not well managed then this can take a lot of time. So if you are making your software according to software engineering approach then it will reduce a lot of time.
4. Handling big projects
Big projects are not made in few days and they require lots of patience, planning and management. And to invest six and seven months of any company, it requires lots of planning, direction, testing and maintenance. No one can say that he has given four months of company to the project and the program is still in its first stage. Because company has given many resources to the projects and it should be completed. So to handle big projects without any problem, company has to go for software engineering approach.
5. Reliable software
Software should be reliable, means if you have delivered the software then it should work for at least it’s given time span or subscription. And if any bugs come in the software then company is responsible for solving all these bugs. Because in software engineering, testing and maintenance is provided so there is no worry of its reliability.
6. Effeteness
Effectiveness comes if anything has made according to the standards. Software standards are the big focus of companies to make it more effective. So Software becomes more effective in performance with the help of software engineering.
Describe the functionalities of operating system.
An operating system is a program on which application programs are executed and acts as a communication bridge (interface) between the user and the computer hardware.
Important functions of an operating System:
1. Security –
The operating system uses password protection to protect user data and
similar other techniques. it also prevents unauthorized access to programs and user data.
2. Control over system performance –
Monitors overall system health to help improve
performance. records the response time between service requests and system response to having a complete view of
the system health. This can help improve performance by providing important information needed to troubleshoot
problems.
3.Job accounting –
Operating system Keeps track of time and resources used by various
tasks and users, this information can be used to track resource usage for a particular user or group of
users.
4.Error detecting aids –
The operating system constantly monitors the system to
detect errors and avoid the malfunctioning of a computer system.
5.Coordination between other software and users –
Operating systems also coordinate
and assign interpreters, compilers, assemblers, and other software to the various users of the computer
systems.
6.Memory Management –
The operating system manages the Primary Memory or Main Memory.
Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address.
Main memory is fast storage and it can be accessed directly by the CPU. For a program to be executed, it should
be first loaded in the main memory. An Operating System performs the following activities for memory
management:
It keeps track of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multiprogramming, the OS decides the order in which processes are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
7.Processor Management –
In a multi-programming environment, the OS decides the order
in which processes have access to the processor, and how much processing time each process has. This function of
OS is called process scheduling. An Operating System performs the following activities for processor
management.
Keeps track of the status of processes. The program which performs this task is known as a traffic controller. Allocates the CPU that is a processor to a process. De-allocates processor when a process is no more required.
8.Device Management –
An OS manages device communication via their respective
drivers. It performs the following activities for device management. Keeps track of all devices connected to the
system. designates a program responsible for every device known as the Input/Output controller. Decides which
process gets access to a certain device and for how long. Allocates devices in an effective and efficient way.
Deallocates devices when they are no longer required.
9.File Management –
A file system is organized into directories for efficient or easy
navigation and usage. These directories may contain other directories and other files. An Operating System
carries out the following file management activities. It keeps track of where information is stored, user access
settings and status of every file, and more… These facilities are collectively known as the file system.
What is internet? Describe about the internet architecture.
The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.
The architecture of the Internet is ever-changing due to continuous changes in the technologies as well as the nature of the service provided. The heterogeneity and vastness of the Internet make it difficult to describe every aspect of its architecture.
The overall architecture can be described in three levels −
- Backbone ISP (Internet Service Provider)
- Regional ISPs
- Clients
The following diagram shows the three levels −
Backbone ISP (Internet Service Provider) − Backbone ISPs are large international backbone networks. They are equipped with thousands of routers and store enormous amounts of information in data centers, connected through high bandwidth fiber optic links. Everyone needs to connect with a backbone ISP to access the entire Internet.
There are different ways through which a client can connect to the ISP. A commonly used way is DSL (Digital Subscriber Line) which reuses the telephone connection of the user for transmission of digital data. The user uses a dial-up connection instead of the telephone call. Connectivity is also done by sending signals over cable TV system that reuses unused cable TV channels for data transmission. For high-speed Internet access, the connectivity can be done through FTTH (Fiber to the Home), that uses optical fibers for transmitting data. Nowadays, most Internet access is done through the wireless connection to mobile phones from fixed subscribers, who transmit data within their coverage area.
Define multimedia. Discuss the applications of multimedia.
Multimedia is an interactive media and provides multiple ways to represent information to the user in a powerful manner. It provides an interaction between users and digital information. It is a medium of communication.Some of the sectors where multimedias is used extensively are education, training, reference material, business presentations, advertising and documentaries.
Some of the areas where multimedia are used are listed below:
1. Multimedia in Education field
Multimedia is used to instruct as a master (guide) because nowadays, multimedia CD are used instead of textbooks. Knowledge can be easily obtained by using multimedia CD in computer because multimedia CD includes text, pictures, sound and film which helps the students to understand easily and clearly than the textbooks and is cheaper than going to schools.
2. Multimedia in Business
Multimedia is used in business for training employees, presenting sales, educating customers etc. It helps for the promotion of business and new products.
3. Multimedia in Entertainment
Multimedia is mostly used in games. Text, audio, images and animations are mostly used in computer games. The use of multimedia in games made possible to make innovative and interactive games. It is also used in movies for entertainment.
4. Multimedia in Medicine
The use of multimedia in medicine is increasing rapidly. In medicine, doctors can be trained by looking at a virtual surgery (Simulators). Using multimedia, they can simulate how the human body is affected by diseases spread by viruses and bacteria and then develop techniques to develop it.
5. Multimedia in Research
We use multimedia to discuss or to make prototype about the invention and theory of different people. We can also use multimedia to investigate through the materials available on the internet.
Differentiate security attack from security threat. How virus affects computer?
The threat is a possible security condition/violation to exploit the vulnerability of a system/asset. A threat can arise from any condition for example, accident, fire incident, environmental like natural disaster, human negligence. The following are various types of threats.
- Interruption
- Interception
- Fabrication
- Modification
Attack
The attack is an intended unauthorized action on a system/asset. An attack always has a motivation to misuse system and generally wait for an opportunity to occur.
The following are some of the important differences between Threat and Attack.
| Sr. No. | Key | Threat | Attack |
|---|---|---|---|
| 1 | Intentional | Threats can be intentional like human negligence/failure or unintentional like natural disaster. | The attack is a deliberate action. An attacker have a motive and plan the attack accordingly. |
| 2 | Malicious | The threat may or may not malicious. | The attack is always malicious. |
| 3 | Definition | The threat by definition is a condition/circumstance which can cause damage to the system/asset. | Attack by definition, is an intended action to cause damage to system/asset. |
| 4 | Chance for Damage | Chance to damage or information alteration varies from low to very high. | The chance to damage or information alternation is very high. |
| 5 | Detection | A threat is difficult to detect. | An attack is comparatively easy to detect. |
| 6 | Prevention | A threat can be prevented by controlling the vulnerabilities. | An attack cannot be prevented by merely controlling the vulnerabilities. Other measures like backup, detect and act etc are required to handle a cyber-attack. |
Computer virus is similar to a biological virus. It does not activate on its own in any device however, it needs help of some source to get activated.
For instance, if you download any important software or game from the internet, the virus sticks to the software. It remains inactive till the time the software is not run by you on your device. The time when you double click and run the downloaded software, the virus also gets activated. In other words, virus is wriiten into a program by the attacker and some condition is set for the virus to run. Once the program starts to run on some machine and when the condition set meets or comes True, the virus becomes active.
A computer virus can infect your machine just like common cold (a biological virus) affects your body. It can disrupt the proper functioning of your machine by stopping important services of the machine.
In general, it always depends on the type of virus to get information of its effects.
Write short notes on:
- GIS
- E-commerce
a) GIS:
GIS- Geographic information system is a system that can be used to analyze, store and share certain data’s, that represents real objects like roads, trees, waterways or any other geographical landscape.
It is one of the most efficient methods used in Civil engineering in its different fields. For eg- In Construction management, the GIS system can be used to denote the precise location, where the structure is to be constructed. Here the GIS system can give certain factors and favorable conditions at the particular site. The steps undertaken with the help of GIS are, data collection, data analysis and the estimate prepared, based upon it’s dimensions and cross sectional area.
In a geotechnical aspect, GIS can be used to provide adequate data based upon the nature of the soil and size of the foundation and the maximum load bearing capacity.
GIS also plays a major role in GPS functioning. With the help of GIS, we obtain a precise location of a site based upon both longitudinal and latitudinal aspect that that makes it easier to navigate.
b) E-commerce:
E-commerce is the buying and selling of goods and services over the Internet. It is done through computers, tablets, smartphones, and other smart devices. Almost anything can be purchased through e-commerce today. It can be a substitute for brick-and-mortar stores, though some businesses choose to maintain both. There are three main types of e-commerce: B2B websites such as Shopify, B2C websites such as Amazon, Flipkart, and Consumer-to-Consumer websites such as eBay.
Advantages of e-commerce:
- A larger market.
- Customer insights through tracking and analytics.
- Lower cost.
- More opportunities to sell.
- Personalized messaging.
Disadvantages of e-commerce:
- Lack of personal touch.
- Price and product comparison.
- Lack of tactile experience.
- Need for internet access.
- IT security issues.