Wednesday, October 19, 2016

Chapter ?

Chapter ? :- My opinion and conclusion

This subject was amazing and i have to thank our lecture ( Miss Wan Irma) for teaching us this subject, we were gland that she will teach as anther subject next semester or teach us until we graduated, ones more i will like to thank our lecture.

My opinion about this subject, this subject teaches me a lot about computer and its programs in it.
The first two week i was absent due to my passport issues, i miss a lot of class and i have to catch the lessons. I manage to catch up the lessons and i did good in my midterm. This subject explained a lot about the function of computer, Nowadays people use computer but they don't know how the computer actually work and the way to take care of the computer.

After i finished this Blog i felt FREEDOM finally
                                     
Now i can focus on studying for the final exam which coming next week. I pray to god ( ALLAH) that i get good marks and success in my life not give your parent a burden.
Don't put burden on your parents because they want you to become a successful man.

Miss and to my friend if i did something wrong and behave in a unmature way i am very very sorry 



  Since our computer application class is over, i would take this chance to thanks to Miss Wan Irma for teaching us. Maybe i disappointed my lecture by not paying attention in class. I had a wonderful experience in this subject and had a lot of ideas and information that i don't know myself.

and this is my last blog. i am tried of doing this blog but i had a wonderful time doing this blog.

Chapter 14

Chapter 14:- Enterprise Computing

Enterprise computing is a buzzword that refers to business-oriented information technology that is critical to a company's operations. It involves the use of computers in networks such as LANs and WANs (Wide Area Network), or a series of interconnected networks that encompasses a variety od different operating systems, protocols and network architectures.

Types of enterprises:-
1) Retail
2) Manufacturing
3) Service
4) Wholesale
5) Government
6) Educational
7) Transportation

The common categories in an enterprise are:-
1) Executive management.
2) Middle management.
3) Operational management.
4) Non-management employess.

-Enterprise information is the information gathered in the ongoing operations of an enterprise-sized organization. For example,  Business intelligence, Business process management, and Business process automation. Resources will be managed by managers by Planning, Organising, Leading, and Controlling.
-The information system is a set of hardware, software, data, people and procedures that work together to produce information.
Functional units within an enterprise:-

  • Accounting and Finance
1)-Accounting software manages the everyday transaction.
2)-Billing software helps the company reconcile purchases with customer payments.
3)-The financial software helps managers budget, forecast, and analyze.
  • Human Resources
1)-Human resources information system (HRIS) manages one or more human resources functions.
2)-Employee relationship management systems manage communication between employees and the  business.
  • Engineering or Product Development
1)-Computer-aided design (CAD) uses a computer and special software to aid in engineering,                  drafting,  and design.
2)-Computer-aided engineering (CAE) uses computers to test product designs
  • Manufacturing
1)-Computer-aided manufacturing (CAM) is the use of computers to control production equipment.
2)-Computer-integrated manufacturing (CIM) uses the computer to integrated the many different              operations of the manufacturing process.
3)-Material Requirements Planning (MRP) uses software to help monitor and control processes               related to production.
4)-Manufacturing Resource Planning II (MRP II) is an extension of MRP and also includes software       helps in scheduling
5)-Quality control system helps an organization maintain or improve the quality of its products or           services.
  • Marketing
1)-Marketing information system serves as a central repository for the tasks of a marketing                     department.
  • Sales
1)-Sales force automation (SFA) software equips traveling salespeople with the electronic tools they need to be more productive.
  • Distribution
1)-Distribution system provide forecasting for inventory control, manage and track shipping of products and provide information and analysis on inventory in a warehouse.
  • Customer service
1)-Customer interaction management (CIM) software manages the day-to-day interactions with customers.
  • Information Technology
1)-Makes technology decisions for the enterprise in the case like whether to build or buy new information system and when a computer or information system has outlived its useful life.
2)-Web Site Management Programs- collect data designed to help organizations make informed decisions regarding their Web presence.
3)-Office Information System (OIS)- oriented to word processing, electronic mail, and other similar office functions.
4)-Transaction Processing System (TPS)- for business transactions involving the collection, modification, and retrieval of all transaction data.
5)-Management Information System (MIS)- focuses on management of information systems to provide efficiency and effectiveness of strategic decision making.
6)-Decision Support System (DSS)- a set of related computer programs and data required to assists with analysis and decision making within an organization.
7)-Expert System- a piece of software programmed using artificial intelligence. It uses the database of expert knowledge to offer advice or make the decision. For example, it is the help button found in our operating system.
8)-Integrated Information System (IIS)- an array of multiple information sets linked together in an organized way. This contains three processes:-

-Customer relationship management manages information about customers, interactions with  customers, past purchases, and interests.
-Enterprise resource planning provides centralized, integrated software to help manage and  coordinate ongoing activities.
-Content management systems are information systems that combine database, software, and  procedures.

Enterprise-wide Technologies and Methodologies:-
-Portal is a collection of links, content, and services presented on a web page that is interesting for  a  particular job function.
-Data warehouse is a huge database that stores and manages the data required to analyze  historical and current transactions.
-EDI (Electronic Data Interchange) is set of standards that control the transfer of business data and  information among computers both within and among enterprises.
-Extranet is the portion of a company's network that allows customers or suppliers of a company to  access parts of an enterprise's intranet.
-Web Services allows business to create products and B2B interactions over the internet.
-Document management system (DMS) allows for storage and management of a company's  documents.
-Workflow is a defined the process that identifies the specific set of steps involved in completing a  particular project or business process.
-Virtual Private Network allows customers or vendors to connect to company network server in a  private network connection.

-Virtualization is the practice of sharing or pooling computing resources.
1) Server virtualisation - physical server can be divided into many virtual servers.
2) Storage virtualisation - single logical storage device can be created from many physical storage devices

-Cloud computing is an internet service that provides computing needs to computer users.
1) Grid computing combines many servers and/or personal computers on a network to act as one             large computer.

Types of E-commerce:
1) E-retail- occurs when retailers use the Web to sell their products or services.
2) Finance- financial tools such as online banking and online trading services are provided.
3) Travel- travel related services like airline reservations, destinations are provided.
4) Entertainment and Media- entertainment and media such as video, audio or games are provided.
5) Health- health related services or information are provided.

-Enterprise hardware allows large organizations to manage and store information and data using devices geared for:-
  • Heavy use
  • Maximum availability
  • Maximum efficiency
-RAID duplicates data and implements duplication in different ways.
-Network attached storage (NAS) is a server that provides storage to users and information systems  attached to the network.
-Storage area network (SAN) is a high-speed network  that provides storage to other servers to  which it is attached.
-Enterprise storage system is a strategy that focuses on the availability, protection, organization, and  backup of storage in a company.
-Blade server packs a complete computer server on a single card (called a blade) rather than a system  unit. The individual blades insert in a blade server chassis.
-Thin client is a small terminal like computer that mostly relies on a server for data storage and  processing is usually done on a server.
-High-availability system continues running and performing tasks for at least 99 percent of the time
-Scalability is a measure of how well computer hardware, software, or an information system can  grow to meet increasing performance demands.
-Interoperability is the ability of an information system to share information with other information systems within an enterprise.
-Disaster recovery plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster. contains four major components:-
  • Emergency plan
  • Backup plan
  • Recovery plan
  • Test plan

Tuesday, October 18, 2016

Chapter 13

Chapter 13:- Computer programs and programming languages

Nowadays everyone knows how to use the computer even kids and adult people but they don't know how a computer works and how it be programmed. Basically, the computer had been a program by the programmer using a programming language.


Low-level Language:-
-Machine language is the first generation of programming languages, this language is only recognized by the computer.
-Assembly language is the second generation of programming languages. use of symbolic instructions.
-Source program contains the code to be converted to machine language.
-Procedural language instructions that tell the computer what and how to do.

  • Third generation language is a compiler translates an entire program before executing it and an interpreter converts and executes one code statement at a time.
  • C programming language used to write many of today's programs
  • COBOL (common business oriented language) designed for business application with easy to read English like a statement.
Object-oriented programming (OOP) language allows programmers the ability to reuse and modify existing objects. other advantages include:-
  • Object can be reused
  • Programmers create applications faster
  • Work well in a RAD environment
  • Most program development tools are IDEs
-Java is an object-oriented programming language developed by sun microsystem. just in time (JIT) compiler converts byte code into machine dependent code.
-Microsoft is the NET framework allows almost any type of program to run on the internet or an internal business network. Features include CLR (common language runtime) and classes.
-C++ is an extension of the c programming language.
-C# is based on C++ and was developed by Microsoft.
-F# combines the benefits of an object-oriented language with those of a functional language.
-Visual Studio is Microsoft’s suite of program development tools:
-Visual Basic is based on the BASIC programming language
-Visual C++ is based on C++
-Visual C# combines the programming elements of C++ with an easier, rapid-development e-      environment]
-A visual programming language is a language that uses a visual or graphical interface for creating all source code.
-Borland’s Delphi is a powerful program development tool that is ideal for building large-scale enterprise and Web applications in a RAD environment.
-PowerBuilder is a powerful program development RAD tool.
-Best suited for Web-based,NET, and large-scale enterprise object-oriented applications. 

Other Programming language and development tools:-
-Fourth generation language is a nonprocedural language that enables users and programmers to access data in a database the popular one is 4GL is SQL.
-Classic programming language include:-
  • Ada
  • ALGOL
  • APL
  • BASIC
  • Forth
  • FORTRAN
  • Hyper Talk
  • LISP
  • Logo
  • Modula-2
  • Pascal
  • PILOT
  • PL/1
  • Prolog
  • RPG
  • Smalltalk
-Application generator is a program that creates source code or machine code from a specification of the required functionality.
-Macro is a series of statements that instructs an application how to complete a task that can be created in two ways record the macro with macro recorder and write the macro.

Web page development:-
-HTML is a special formatting language that programmers use to format documents for display on the web.
-XHTML is a markup language that allows websites to be displayed more easily on mobile devices.
-XML allows web developers to create customized tags and use predefined tags to display content appropriately on various devices. Applications of XML are RSS 2.0 and ATOM.
-WML s a subset of XML and is used to design pages for microbrowsers.
-CGI (common gate interface) used to send and receive information between the computer and a web server such as scripts, applets, servlets and activeX controls.
-Dynamic HTML  (DHTML) allows Web developers to include more graphical interest and interactivity.
-Cascading style sheets (CSS) contain the formats for how a particular object should be displayed.
-Ruby on Rails (RoR) provides technologies for developing object-oriented, database-driven Web sites.
-Web 2.0 allows Web sites to provide a means for users to:
  • Share personal information
  • Allow users to modify Web site content
  • Have application software built into the site
-Web page authoring software can create modern web pages that include images, video, audio, animation and other effects such as:-
  • Dreamweaver
  • Expression web
  • Flash
  • Sharepoint designer
-Multimedia authoring software allows programmers to combine text, graphics, animation, audio, and video in an interactive presentation.
For example;-
-Tool book
-Director
 
Program Development consists of a series of steps programmers use to build computer programs
where it is same as the system development life cycle which contains five steps and also programs development life cycle:-

Step 1-Analyze requirements:-
1) Reviews the requirements
2) identifies input, processing, and output A.K.A IPO chart.
Step 2-Design solution:-
1) Design a solution algorithm
2) Structured design where the programmer begins with the general design before moving towards detailed design.
3) Hierarchy chart shows program modules graphically.
4) Object oriented design is where programmer packages the data and program into a single object A.K.A encapsulation
5) Sequence control structure shows one or more actions following each other in order.
6) Selection control structure tells the program which action to take based on certain conditions.
7) Repetition control structure enables a program to perform one or more actions repeatedly as long as o certain condition is met.
8) A Flowchart graphically shows the logic in a solution algorithm. This software is easy to modify and update the flowcharts.
9) The pseudo code uses a condensed form of English to convey program logic.
10) Unified modeling language (UML) standard notation for object modeling and developmen.
Step 3-Validate Design:-
Check for logic error using test data.
steps:-
1) Development various sets of test data.
2) Determine the expected results.
3) Step through the algorithm.
4) Compare the results.
5) Repeat steps for each set of test data.
Step 4-Implement design:-
Using a program development tool that assists the programmer by:-
- Generating or providing some or all code.
-Writing the code that translates the design into a computer program.
- Creating the user interface.
Extreme programming a strategy where programmers immediately begin coding and testing as soon as requirements are defined.
Step 5-Test solution:-
The goal of program testing is to ensure the program runs correctly and is error free.
-Some errors are syntax errors and logic errors
-Debugging is the program involves removing the bugs.
-A beta is a program that has most or all of its features and functionality implemented.
Step 6-Document solution:-
In this step the programmer performs two activities which is :-
-Review the program code.
-Review all the documentation.

Monday, October 17, 2016

Chapter 12

Chapter 12:- Exploring Information System Development
-System Development is a set of activities used to build an information system. A system is a component that interact to achieve a common goal. Information system (IS) is a collection of hardware, software, data, people, and procedures that work together to produce quality information. system development activities are grouped into phases, collectively called the system development life cycle (SDLC) 

System Development:-
They are five processes in system development which are Planning, Analysis, Design, implementation, operation support, and security.
1) Planning
  • Review project request
  • Allocate resources
  • From project development team
  • Select a correct team
2) Analysis
  • Analyse idea and concepts from planning phase and determine the best.
  • study current system of the idea
  • Determine user requirement
3) Design
  • Acquire hardware and software
  • Develop details of system
  • Create prototype
4) Implementation
  • Install/ build the system
  • Train users
  • Improve prototype if needed
5) Operation, support, and security
  • Perform maintenance activities based on schedule
  • Monitor system performance
  • Maintain and update system security every week if needed.
-General guidelines for system development are:-
  • Group activities or task into phases
  • Involve users
  • Define standards
-Project management is the process of planning, scheduling, and then controlling the activities during system development which mostly aim at Project scope, required activities, time estimates for each activity, cost estimates for each activity, order of activities, and activities that can take place at the same time.
1) Gantt chart is a popular tool used to plan and schedule the time relationships among project activities.
2) PERT (program evaluation review technique) chart is a project management tool used to schedule, organize and coordinate tasks within the project.
-Feasibility is a measure of how suitable the development of the system will be to the organization. In a term of:-
  •  Operational feasibility
  • Schedule feasibility
  • Technical feasibility
  • Economic feasibility 
-Documentation is the collection and summarization of data and information.
Techniques used by the members of the project team to gather data and information during system development:-
1) Review documentation.
2) Observe.
3) Survey.
4) Interview.
5) JAD (joint application design) session.
6) Research.

-System development project is required when:-
1) A user may request a new or modified system.
2) Organisation wants to improve hardware, software or other technology.
3) Situations beyond an organization's control might require a change.
4) Management might mandate a change.
5) A user may request a new or modified information system using a request for system services or a project request.

Activities that involve during  the phases of system development life cycle: -
-Planning Phase is for a project begins when the steering committee receives a project request. Four major activities are performed is:-
1) Review and approve the project request.
2) Prioritize the project request.
3) Allocate resources.
4) From a project development team.

-Analysis phase consists of two major activities that are performed:-
1) preliminary investigation is to determine and defines the exact nature of the problem or improvement as well as interview the user who submitted the request.
2) perform the detailed analysis is to study of current system works where it determines the user's wants, needs, and requirements and recommend a solution.
Tools that used for Analysis phase are:-
  • Process modeling - is an analysis and design technique that describes processes that transform inputs into an output. under process modeling we get three processes which are:-
         i) Entity relationship diagrams (ERD) is a tool that graphically shows the connections among                  entities (objects in a system that have data) in a system.
        ii) Data flow diagram (DFD) is a tool that graphically shows the flow of data in the system.
       iii) Project dictionary contains all the documentation and deliverables of a project. Style of                        writing is structured English.
  • The decision table is a table that lists a variety of conditions and the actions that correspond to each condition. Decision tree also shows conditions and actions, but it shows them graphically.
  • The data dictionary stores the data item's name, description, and other details about each data item.
  • Object modeling combines the data with the processes that act on the data into a single unit, called an object.
  • UML (unified modeling language) has been adopted as a standard notation for object modeling and development where two diagrams include which is use case diagram and class diagram.
         - Use case diagram is a graphically shows how actors interact with the information system. The            diagram is considered easy to understand.
         - The class diagram is a graphically shows classes and subclasses in a system. In the class
          diagram. we have the inheritance to inherit methods and attributes of higher levels. The                       steering committee will discuss the system proposal and decides which alternative (Packaged               software, Custom software and outsourcing) to pursue.
 
-Design Phase consists of two major activities which are acquired hardware and software and develop all of the details of the new or modified information system. The step is :-
  • Identify technical specifications
  • Solicit vendor proposals
  • Test and evaluate vendor proposals
  • Make a decision 
The next step is to develop detailed design specification where sometimes called a physical design:-
  • Database design
  • Input and output design
  • Program design
After that, a prototype will be created with the help of :
1) Computer aided software Engineering (CASE) tools are designed to support one or more activities of system development which contain: -
  • Project repository
  • Graphics
  • Prototyping 
  • Quality assurance
  • Code generator
  • Housekeeping
-Implementation Phase is to construct the new or modified system and then deliver it. The implementation involves :-
  • Develop Programs
  • Install and test the new system
  • Train users
  • Convert to the new system
The program development life cycle follows these steps:
  1. Analyze the requirements
  2. Design the solution
  3. validate the design
  4. Implement the design
  5. Test the solution
Various test performed:-
  1. The unit test verifies that each individual program or object works by itself.
  2. System test verifies that all programs in an application work together properly.
  3. Integration test verifies that an application works with other applications.
  4. Acceptance test checks the new system to ensure that it works with actual data.
-Training involves showing users exactly how they will use the new hardware and software in the system, were it have three training which is:-
- One-on-one sessions
- Classroom-style lectures
- Web-based training

Operating, support and security phase is to provide ongoing assistance for an information system and its users after the is implemented.
There are three processes in this system:-
1) Perform maintenance activities - to maintain the lifetime of the system.
2) Monitor system performance - to see id any improvement is needed.
3) Assess system security - manage the security and keep it updated.
Computer security plan should have;-
1) Identify all information assets of an organization.
2) Identify all security risks that may cause an information asset loss
3) For each risk, identify the safeguards that exist to detect, prevent and recover from a loss.

Sunday, October 16, 2016

Chapter 11

Chapter 11:- Manage computing securely, Safely and Ethically

-A computer security risk is any event or action that could cause a loss or damage to computer hardware, software, data, or even important information.
-A cyber crime is an online or internet-based illegal act such as Hackers, crackers, script kiddies, corporate spies and more.
Explanation  for the cyber crime :-

-Hackers are person who uses computer to gain unauthorized access to data and personal information.

-Crackers also known as a black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security or gain access to software without paying royalties. The general view is that, while hackers build things, crackers break things.

-Script Kiddies are person who uses existing computer scripts or codes to hack into computers, lacking the expertise to write their own.

-An online security service is a web site that evaluates your computer to check for internet and e-mail vulnerabilities.

Type of internet and network attacks:-

  • Computer virus- Affects a computer negatively by altering the way the computer works.
  • Worm- Copies itself repeatedly using up resource and completely shut down the computer and network.
  • Trojan Horse- A malicious program that hides within or looks like a legitimate program.
  • Rootkit- A set of software tools that enable an unauthorized user to gain control of a computer system without being detected.
-An infected computer has one or more of the following symptoms; -
  1. Operating system runs much slower than usual.
  2. Available memory is less than expected.
  3. Files become corrupted.
  4. system properties change.
  5. Music or unusual sound plays randomly.
  6. Operating system shuts down unexpectedly.
  7. Programs or files do not work properly.
  8. Operating system does not start up.
-A botnet is a group of compromised computers connected to a network. A compromised computer is know as a zombie.
-A denial of service attacks (Dos attack) disrupts computer access to internet services.
-A back door is a program or set of instructions in a program that allow users to bypass security controls.
-Spoofing is a technique intruders use to make their network or internet transmission appear legitimate. 
-A firewall is hardware and/or software that protects a network's resources from intrusion.

-Intrusion detect
ion software:-
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior patterns or system breaches.
-Honeypot;-
  • Vulnerable computer that is set up to entice an intruder to break into it. 
Unauthorized Access and Use:-

-Unauthorized access is the use of a computer or network without permission 
-Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.
-Organizations take several measure to help prevent unauthorized access and use
  • Acceptable use policy
  • Disable file and printer sharing
  • Firewalls
  • Intrusion detection software
-Access controls define who can access a computer, when they can access it and what actions they can take

  • Two-phase processes called identification and authentication
  • User name
  • Password
  • Passphrase
  • CAPTCHA
-A bio-metric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
-Digital forensics is the discovery , collection, and analysis of evidence found on computer and network. many areas use digital forensics such as 
  • Law enforcement
  • Criminal prosecutors
  • Military intelligence
  • Insurance agencies
  • Information security departments
Hardware Theft and Vandalism: -

-Hardware theft is the act of stealing computer equipment
-Hardware vandalism is the act of defacing or destroying computer equipment.
To help reduce the of change of theft, companies and schools use a variety of security measures
  • Physical access controls
  • Alarm system
  • Cables to lock equipment
  • Real time location system
  • Password, possessed objects, and bio-metrics
-Software theft occurs when someone; -
  • Steals software media.
  • Intentionally erases programs.
  • illegally copies a program.
  • illegally registers and/or activates a program.
Software Theft: -
-A single-user license agreement typically contains the following conditions 
permitted to
  • install the software on one computer
  • Make one copy of the software
  • Remove the software from your computer before giving it away or selling it
Not permitted to
  • install the software on a network
  • Give copies to friends or colleagues while continuing to use the software 
  • Export the software 
  • Rent or lease the software
Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law where some software requires product activation to function fully.
-Information theft occurs when someone steals personal or confidential information .
-Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
-A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender.
popular security techniques include:-
  • Digital certificates
  • Transport layer security (TLS)
  • Secure HTTP
  • VPN
-A system failure is the prolonged malfunction of a computer. A variety of factors can lead to system failure including:-
  • Aging hardware
  • Natural disasters
  • Electrical power problems such as noise, under-voltages and over-voltages
  • Errors in computer programs.
Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS).
-A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged. or destroyed. To back up a file means to make a copy of it. Offsite backups are stored in a location separate form the computer site such as cloud storage.

Ethics and Society:-
The bets way to prevent security risk is to have ethics and society.
-Computer ethics are the moral guidelines that govern the use of computer and information systems.
-Intellectual property rights are the rights to which creators are entitled for their work. A copyright protects any tangible form of expression.
-IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. The IT code of conduct:- 
  1. Computers may not be used to harm other people.
  2. Employees may not interfere with others computer work.
  3. Employees may not meddle in others computer files.
  4. Computers may not be used to steal.
  5. Computers may not be used to bear false witness.
  6. Employees may not copy or use software illegally.
  7. Employees may not use others computer resource without authorization.
  8. Employees may not use others intellectual property as their own.
  9. Employees shall consider the social impact of programs and system they design.
  10. Employees always should use computers in a way that demonstrates consideration and respect for fellow humans.
Green computing - involves reducing the electricity and environmental waste while using a computer.
-Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them where huge database store data online and it is important to safeguard your information.
Examples on how to safeguard personal information;-
      1) Fill only necessary information on any form.
      2) Avoid shopping club and buyer cards.
      3) Ask before giving personal information to any merchants.
      4) Install a cookie manager to filter cookies.
      5) Turn off file and printer sharing on internet connection.
      6) Install a personal firewall.
      7) Inform merchant not to distribute your personal information.
      8) Clear history file frequently on browser.
      9) Do not reply to spam for any reason.
     10) Surf the web anonymously.

-A cookie is a small text file that a web server stores on your computer such as:-

  • Allow for personalization
  • Store users password
  • Assist with online shopping
  • Track how often users visit a site
  • Target advertisements
-Spam is an unsolicited e-mail message or newsgroup posting.
-E-mail filtering blocks e-mail messages from designated sources.
-Anti-spam programs attempt to remove spam before it reaches to your inbox.
-Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
-Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing.

-Content filtering is the process of restricting access to certain material on the web.
-Web filtering software restricts access to specified websites.
-Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety.
-Employee monitoring involves the use of computers to observe, record and review an employee's use of a computer.

Friday, October 14, 2016

Chapter 10

we skip chapter 9 which is about Network and communications where it is similar to chapter 2. we jump into chapter 10 which is about Managing a database.

Chapter 10:- Managing a database

-The database is a collection of data organized in a manner that allows accessing retrieval and use of that data.
-Data  is a collection of unprocessed items such as text, number, images, video, and audio.
-Information is where it processed data such as documents. images, video, and audio.
-Database software,often called a database management system (DBMS), allows users to create a computerized database, create forms and reports from the data, sort and retrieve data and modify and delete data.
-Data integrity identifies the quality of the data. Garbage in, garbage out (GIGO) points out the accuracy of a computer's output depends on the accuracy of the input .

Valuable information should have the following characteristics:-

  • Accurate- very valuable information need to be accurate and out of error
  • Verifiable- 
  • Timely- information need to be on time
  • Organized-
  • Accessible
  • Useful
  • Cost-effective
The Hierarchy Of Data: -
  • Character
  • Field
  • Records
  • Files
-File maintenance refers to the procedures that keep data current. an example of file maintenance is adding records, modifying records, and deleting records.
-Adding record is add new records to a file when they obtain new data.
-Modifying records is where users modify a record to correct inaccurate data or update old data.
-Deleting records is where the users delete the old record when no longer needed.

Validation: -
Validation compares data with a set of rules or values to find out if the data is correct. Database validation is required when database get corrupted to check for corruption.
Type of validity checks: -
  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
File processing versus Database approach:- 

File processing system:
  • Each department has its own set of files.
  •  Have data redundancy.
  •  Isolate data.

Database approach:
  •  Programs and users share data.
  •  Reduce data redundancy.
  •  Improve data integrity.
  •  Share data.
  •  Allow easier access.
  •  Reduce development time.
  •  More vulnerable.
Database Management Systems: -
  •  Data dictionary- contains data about each file in the database and each field in those lines.
  •  Query language- consist of simple, English-like statements that allow users to specify the data to display, print or store.
  •  Query by example (QBE)- provide a graphical user interface to assist users with retrieving data.
  •  Form- window on the screen that provides areas for entering or modifying data in a database.
  •  Report generator- allows users to design a report on the screen, retrieve data into the report design and then display or print the report.
  •  Security- only authorized users can access data at permitted times such as access privileges and the principle of least privilege.
  •  Backup and restore- to save the data in the database in another storage medium and can be returned to its original form later.
  •  Data model- consists of rules and standards that define how the database organizes data.
         For example:
- Relational database- stores data in tables that consist rows and columns. The relationship is the link within the data.
- Object-oriented database (OODB)- stores data in objects. Examples of applications are a multimedia database, groupware database, computer-aided design database and hypertext database.
- Object-relational database- create relationship between object-oriented data.
- Multidimensional database- can store data in more than two dimensions of data. A.k.a hypercube and it can consolidate data much faster than a relational database.
  •  Data warehouse- a huge database that stores and manages data required to analyze historical and current transactions.

Features of Web database: -
  •  Shop for products or services- Amazon, Ebay, Alibaba
  •  Buy or sell stocks- NASDAQ, Suretrader.com.
  •  Search for a job- Jobstreet, Moster.com
  •  Make airline reservations- Air Asia, Malaysia Airline, Royal Brunei Airline.
  •  Register for college classes- UCSI Information Integrated System (IIS).
  •  Check semester grades- UCSI IIS, LMS.
Database Administration:-
The database design guidelines
  • Determine the purpose of the database.
  • Design the table or files.
  • Design the record and fields for each table or files.
  • Determine the relationships among the table and files.
Database analysts and administrators are responsible for managing and coordinating all the database activities.
  • Database analyst (DA)- decides on proper field placement, defines data relationships, and identifies users access privileges.
  • Database Administrator (DBA)- Creates and maintains the data dictionary, manages security, monitors performance, and checks backup and recovery procedures.

Tuesday, October 11, 2016

Chapter 8

Chapter 8- Types of storage

-Storage holds data, instructions, and information for future use. A storage medium is the physical material on which a computer keeps data, instructions, and information.


-A storage device is the computer hardware that records and/or retrieves items to and from storage media.
-Reading is the process of transferring items from a storage medium into memory.
-Writing is the process of transferring items from memory to a storage medium.

Storage capacity:- 

-Access time is amount of time it takes a storage device to locate an item on a storage medium and time required to deliver an item from memory to the processor.
-A hard disk contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. Hard disks can store data using longitudinal recording or perpendicular recording.
-The characteristics of a hard disk include: -
  -Capacity
  -Platters
  -Cylinders
  -Access Time
  -Sectors and Tracks
  -Read/write Heads
  -Transfer rate
  -Revolutions per minute

-How a hard disk work: -

the hard disk arms move the read/write head,which reads items and writes item in the drive but location often is referred to by its cylinder. A head crash occcurs when a read/write head touches the surface of a platter and always keep a backup of you hard disk.

-Formatting is the process of dividing the disk into tracks and sectors so that the operating system can store and locate data and information on the disk.

-How disk cache works: -

-RAID (redundant array of independent disks) is a group of two or more integrated hard disks
-An external hard disk is a separate free-standing hard disk that connects to your computer with cable or wirelessly.
-A removable hard disk is a hard disk that you insert and remove from a drive.
-A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage.

Flash memory storage: -
-Flash memory chips are a type of solid-state media and contain no moving parts
-Solid state drives (SSDs) have several advantages over magnetic hard disks
  -Faster access time
  -Faster transfer rates
  -Last longer
  -Generate less heat and consume less power

-A memory card is a removable flash memory device that you insert and remove from aa slot in a computer.
-USB flash drives plug into a USB port on a computer or mobile device.
-Cloud storage is an internet service that provides storage to computer users.
-An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
-Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information where it read and writes data and information on a tape.
-A magnetic stripe card contains a magnetic stripe that stores information.
-A smart card stores data on a thin microprocessor embedded in the card.


Monday, October 3, 2016

Chapter 7

Chapter 7 :- OUTPUT  DEVICES

Output is data that has been processed into a useful form where an output device is any type of hardware component that conveys information to one or more people example display devices, printers, and data projectors.

-A display device visually conveys text, graphics and video information.
-A monitor is packaged as a separate peripheral.
-Liquid Crystal display (LCD) uses a liquid compound to present information on a display device.

  • The quality of an LCD monitor or LCD screen depends primarily on resolution, response time, brightness, dot pitch and contrast ration.
                                                   
  • Resolution is the number of horizontal and vertical pixels in a display device.
  • Plasma monitors are display devices that use gas plasma technology and offer screen sizes up to 150 inches.

  • HDTV is the most advanced form of digital television.

  • A CRT monitor is a desktop monitor that contains a cathode-ray tube.

-Printer is a product that produces text and graphics on a physical medium. printed information is called a hard copy or printout.
-A nonimpact printer forms characters and graphics on a piece of paper without actually striking the paper

  • Ink-jet printers
  • Photo printers
  • Laser printers
  • Thermal printers
  • Mobile printers
  • Label and postage printers
  • Plotters
  • Large-format printers
Speakers, Headphones, and Earbuds:-
An audio output device produces music, speech, or other sounds. Most computer users attach speakers to their computers to generate higher-quality sounds for playing games, listen to music and to view movies

-Headphones are speakers that cover or are placed outside of the ear
-Earbuds also called earphones rest inside the ear canal.

Voice output occurs when you hear a person's voice or when the computer talks to you through the speakers. 
other output devices are available for specific uses and application such as data projectors, interactive, force-feedback game controllers and tactile output.

-Data projector is a device that take the text and images displaying on a computer screen and projects them on a larger screen 
-An interactive whiteboard is a touch sensitive device, resembling a dry-erase board that displays the image on a connected computer screen



Monday, September 26, 2016

Chapter 6

Chapter 6 - Understanding Input:-
-INPUT is any data and instructions entered into the memory of a computer.

What is Input?
Input instructions can be entered into the computer in the form of programs, commands, and user responses.

  • A program is a series of related instructions that tells a computer what tasks to perform and how to perform them.
  • Programs respond to commands that a user issues.
  • A user response is an instruction a user issues by replying to a question displayed by a program


What are Input Devices?
An input devices is any hardware component that allows users to enter data and instructions into a computer.
The Example of input:-

  • Keyboard
  • Mouse
  • Touch screen
  • Pen input (Stylus, digital pen)
  • Game controller
  • Digital camera
Keyboard:-
A keyboard is an input device that contains keys users press to enter data and instructions into a computer.
An ergonomic keyword has a design that reduces the chance of wrist and hand injuries.
Ergonomics incorporates comfort, efficiency, and safety into the design of the workplace
MOUSE:-
A mouse is a pointing device that fits under the palm of your hand comfortably.
TOUCH SCREEN:-
A touch screen is a touch-sensitive display device.
PEN INPUT (Stylus, digital pen):-
With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make selections.
GAME CONTROLLERS:-
Video games and computer games use a Game controller as the input device that directs movements and actions of on-screen objects.example such as Gamepads, joystick and light gun.

DIGITAL CAMERA:-
A digital camera is a mobile device that allows users to take pictures and store them digitally.

VOICE INPUT:- 
Audio input is the process of entering any sound into the computer.
  • Speech
  • Music
  • Sound Effects
-Music production software allows users to record compose, mix and edit music and sounds.
-Video input is the process of capturing full-motion images and storing them on a computer's storage medium.
-A Web cam is a type of digital video camera that enables a user to capture video and still images, send email and broadcast live.
-A video conference is a meeting between two or more geographically separated people.

SCANNERS AND READING DEVICES:-
  • Flatbed
  • Pen or handheld
  • sheet-fed
  • Drum
Optical character recognition (OCR) involves reading characters from ordinary documents
-A tTurnaround document is a document you return to the company that creates and sends it.
-A bar code reader, also called a bar code scanner user laser beams to read bar codes.













Saturday, September 24, 2016

Chapter 5

Actually we learned chapter 6 and 7 first and then chapter 5 but i am going to upload chapter 5 first and the  chapter 6 and 7......:)

CHAPTER 5- Types of utility programs and operating systems
- System software consists of the programs that control or maintain the operations of the computer and its devices
-An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources.
example of operating systems:-

  • Start and shut down a computer
  • Manage programs
  • configure devices
  • coordinate tasks
  • control a network
-The process of starting and restarting is called booting where is divide into two which is cold boot and warm boot.
-A boot drive is the drive from which your computer starts where you can boot from a boot disk.
-A recovery disk contain a few system files that will start the computer.
-A user interface controls how you enter data and instruction and how information is displayed on the screen.
-Memory management optimizes the use of RAM and Virtual memory is a portion of a storage medium functioning as additional RAM.
-A driver is a small program that tells the operating system how to communicate with a specific device.
-Plug and play automatically configures new device as you install the devices.
-Automatic update automatically provides updates to the program.
-A stand alone operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device such as

  • Windows 7- faster and more efficient
  • Mac OS X- for easy to use
  • UNIX- for multitasking 
  • Linux- for a open source popular and multitasking
- An embedded operating system resides on a ROM chip on a mobile device or consumer electronic devices.
-A utility program is a type of system software that allows a user to perform maintenance-type tasks.
-A file manager is a utility that performs functions related to file management where it displaying a list of files and organizing files in folders and more.
-A search utility is a program that attempts to locate a file on your computer based on criteria you specify.
-An image viewer allows user to display, copy, and print the contents of a graphics file.
-An uninstaller removes a program, as well as any associated entries in the system files.
-A disk defragmenter reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.
-A backup utility allows users to copy files to another storage medium.
-A restore utility reverses the process and returns backed up files to their original form.
-A media player allows you to view images and animation, listen to audio, and watch video files on your computer.
-Disc burning software writes text, graphics, audio and video files on a record able or re-writable optical disc. 
-A personal computer maintenance utility identifies and fixes operating system problems and repairs disk problem.


Tuesday, September 20, 2016

Chapter 4

 CHAPTER 4 : System unit components
The System Unit:
System unit is a case that contains electronic components of the computer used to process data.
The inside of the system unit on a desktop for personal computer includes:

  • Drive Bay(s)
  • Power Supply
  • Sound Card
  • Video Card
  • Processor
  • Memory
Motherboard is the main circuit board of the sustem unit.

Processor where it is also called as the Central processing unit (CPU), interprets and carries out the basic instructions that operate a computer and contain a control unit and an arithmetic logic unit (ALU).
There are three type of core processor:-
  • MULTI-CORE PROCESSOR
  • DUAL-CORE PROCESSOR
  • QUAD-CORE PROCESSOR
Four basic operation cycle:-
  • FETCH
  • DECODE
  • EXECUTE
  • STORE
Control unit is the component od the processoe that directs and coordinates most of the operations in the computer.
Arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations. 

The processor contains registers, that temporarily hold data and instructions. The System clock controls the timing of all computer operations where system clock is measured in Gigahertz (GHz).

Data representation
Analog singals are continuous and vary in strength and quality.
Digital singals are in one of two states;on or off

Binary system uses two unique digits (0 and 1)
-Bits and Bytes
A computer circuit represents the 0 and 1 electronically by the presence or absence of an electrical charge. Eight bits grouped together as a unit are called a byte. A byte represents a single character in the computer.

MEMORY:
Memory consists of electronic components that store instructions and data that from the computer system unit.
Two type of memory that used commonly:-
-Nonvolatile memory - does not lose or delete the content when power is off such as ROM, FLASH MEMORY and more.
-volatile memory - loses its content when power is turn off.

Process of program instruction transfer in and out of RAM
Type of RAM chips:
  • Dynamic RAM (DRAM)- SDRAM,DDR SDRAM, RDRAM
  • Static RAM (SRAM)
  • Magnetoresistive RAM (MRAM)
-RAM chips usually reside on a memory module and are inserted into memory slots
-Memory cache speeds the processes of the computer because it stores frequently used instructions and data.
-Read only memory (ROM) refers to memory chips storing permanent data and instructions.
-A PROM is programmable read only memory chip is a blank ROM chip that can be written to permanently and EEPROM is that can be erased.
-Flash memory can be erased electronically and rewritten.

Ports and connectors:-
A port is the point at which a peripheral attaches to or communicates with a system unit where connector joins a cable to a port.
 A USB port can connect up to 127 different peripherals together with a single connector 

Other types of ports include:-
  • Firewire port
  • Bluetooth port
  • SCSI port
  • eSARA port
  • IrDA port
  • Serial port
  • MIDI port
BUSES:-
A bus allows the various device both inside and attached to the system unit to communicate with each other. There are two type of bus, Data bus and Address bus.

Common types of expansion buses include:-
  • PCI bus
  • PCI Express bus
  • Accelerated Graphics port
  • USB Firewire bus
  • PC card bus
- A bay is an opening inside the system unit in which you can install additional equipment.








Tuesday, September 13, 2016

Chapter 3

CHAPTER 3 [SOFTWARE FOR SYSTEMS]

Application software- consists of programs designed to make users more productive and/or assist with personal tasks.

  • To make business activities more efficient 
  • To assist with graphics and multimedia projects
  • To support home, personal, and educational tasks
  • To facilitate communications
Examples of application software:-
  • Business - word processing, spreadsheet and note taking
  • Graphics and Multimedia - computer Aided design (CAD) and Multimedia Authoring
  • Home/personal/educational - legal, personal finance and Tax preparation 
There are 7 different variety forms of software:-
  • Packaged software- Microsoft office
  • Custom software- security code system
  • Web application- online software
  • Open source software- Java
  • Shareware- Microsoft office trial
  • Freeware- Mozilla Firefox
  • Public-domain software- Hippo-draw
System software serves as the interface between the user, the application software, and the computer's hardware. 
Business software is application software that assists people while performing business activities.
The key Features of a business software are:-

  • Word processing software
  • Spreadsheet software
  • Database software
  • Presentation software
  • Note taking software
  • software suite
  • Personal information manager (PIM)
  • Project management software
  • Accounting software
  • Document management software
  • Enterprises computing software
Graphics and multimedia software:-
  • Computer-aided design (CAD) software
  • Desktop publishing software
  • Paint/Image editing software
  • Professional photo editing software
  • Video and audio editing software
  • Multimedia authoring software
  • Web page authoring software
Software for Home, Personal, and Educational use:-
  • Personal finance software
  • Legal software
  • Tax preparation software
  • Personal DTP software
  • Personal paint/image editing software
  • Personal photo editing software
  • Clip art/image gallery
  • Video and audio editing software
  • Home design/landscaping software
  • Travel and mapping software
  • Reference software
  • Educational software
  • Entertainment software
Web Applications:-
A web application is a website that allows users to access and interact with software from any computer or device that is connected to the internet.

Application software for communications:-

  • Web Browser
  • Email
  • Instant Messaging
  • Chat room
  • Text, picture, video messaging
  • RSS aggregator
  • Blogging
  • Newsgroup/message board
  • FTP
  • VoIP
  • Video Conferencing
Learning tools for application software:-
Online help is the electronic equivalent of q user manual where we can ask a question or access the help topics in a subject or alphabetical order.
Web-based training is a type of CBT that uses internet technology and consists of application software on the web.
Distance learning (DL) is the delivery of education at one location while the learning takes place at other locations.

SUMMARY:-





Saturday, September 10, 2016

Chapter 2

I was still back home I didn't attend the class, but my friend Omar send me what did the lecture teach in the class so he was very  helpful.

Chapter 2  : Fundamentals of the world wide web and internet:-
The internet
The internet is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and more.

The Evolution of the internet:-

The evolution of the internet connection:-


An access provider is a business that provides individuals and organizations access to the internet free or for a fee.

Internet service provider (ISP) Regional ISPs provide internet access to a specific geographical area but National ISPs provide internet access in the cities and towns nationwide.

Online service provider (OSP) has many members-only features and popular OSPs include AOL(America online) and MSN (Microsoft network)

Wireless internet service provider provides wireless internet access to a computer and mobile devices and may require a wireless modem.

An IP address is a number that uniquely identifies each computer or device connected to the internet.

A domain name is the text version of an IP address 

A DNS server translates the domain name into ts associated IP address



The world wide web:-
  • The world wide web, or the web, consists of a worldwide collection of electronic documents (web pages) 
  • A website is a collection of related web pages and associated items
  • A web server is a computer that delivers requested web pages to your computer
  • web 2.0 refers to websites that provide a means for users to interact
  • A web browser, or allows users to access web pages.
There are two types of search tools are search engines and subject directories
  • Search engine-Finds information related to a specific topic .
  • Subject directory-Classifies web pages in an organized set of categories.
Multimedia is a combination of graphics, animation, audio, video and virtual reality.
  • Graphic is about pictures of arts.
  • Animation is motion created by displaying a series od still images in sequence.
  • Audio includes music, speech, and other stuff.
  • video is a record of moving visual images
  • virtual reality is a computer generated simulation of a three dimensional space.
  • plug-in is a program that extends the capability of the a web browser
  • web publishing is the development and maintenance of web pages
  • E-commerce is a business transaction that occurs over an network



Other internet services
  • Email-is the transmisson of messages and files via a computer network
  • Mailing list-is a group of e-mail names and addresses given a single name
  • VoIP (voice over IP)-enables users to speak to other users over the internet
  • Message board-is a web-based type of discussion group
SUMMARY