Friday, April 15, 2011

CHAPTER 9 COMMUNICATIONS AND NETWORKS

Communications is the process of sharing data, programs, and information between two or more computers. Applications include e-mail, instant messaging, Internet telephones, and electronic commerce.

COMMUNICATION SYSTEMS = transmit data from one location to another.

  • sending and receiving devices
  • communication channels ( transmission medium)
  • connection (communication) devices
  • data transmission specifications
COMMUNICATION CHANNELS carry data from one computer to another.

PHYSICAL CONNECTIONS
  • twisted pair (telephones lines and Ethernet cables)
  • coaxial cable
  • fiber-optic cable
WIRELESS CONNECTIONS
  • infrared
  • radio frequency (RF)
  • microwave
  • satellite
CONNECTION DEVICES

1. modem
  • telephone
  • DSL
  • cable
  • wireless
2. connection services
  • dial-up
  • DSL(digital subscriber line)
  • ADSL
  • cable
  • satellite/air
  • cellular services (3G cellular networks)
NETWORK TYPE
  • Local area networks ( LANs )
  • Home networks
  • Wireless LANs (WLANs)
  • Personal area networks (PANs)
  • Metropolitan area networks (MANs)
  • Wide area networks (WANs)
NETWORK ARCHITECTURE describes how a computer network is configured and what strategies are employed.

TOPOLOGIES
  • bus
  • ring
  • star
  • tree
  • hybrid
  • mesh
STRATEGIES
  • terminal
  • client/server
  • peer-to-peer
ORGANIZATIONAL INTERNET
  • intranets
  • extranets









APPRECIATION

Wuhuhu,
Finally, our blog assessment 
comes to the end.

We would like to thanks for
our lecturer-- Pn. Sharin Hazlin Huspi 
for your guidance and efforts
to our blog.

We still remembered that at the beginning 
we are blur and 
do not really know
 how to make our own blog.

However, after we explored it together
and get discussion with you,
we found that it is very easy to
create an interesting blog.

We just need to do some
researches, 
get informations, 
and reads a lots 
so that we have the contents 
to post on the wall
and share the knowledge
with the other readers.

Madam, thank you
for giving us an opportunity to 
discover the formation of this blog.

We are not only learn that 
the knowledge of
INFORMATION TECHNOLOGY,
but also the 
PROCESS TO MAKE 
A CREATIVE AND EDUCATIONAL BLOG

Again, THANKS A LOT.

We really appreciate 
your cooperation and efforts throughout this blog.



CHAPTER 15 Your Future and Information Technology

In this chapter, we looked into technology and organizations as well as technology and people. Besides that, we also learnt how to become a winner and exposed to the different careers in IT.

1. Technology can introduce new ways for businesses to compete with each other.

2. Some of the principal changes are as follows:

  • New product: Technology creates product that operates faster, are priced cheaper, are often of better quality, or are wholly new.
  • New enterprises: Information technology can build entirely new businesses. Two examples are Internet service providers and Web site development companies.
  • New customer and supplier relationship: Businesses that make their information systems easily available may make their customers less likely to take their businesses elsewhere.
3. People react to changing technology in one of the four ways.
  • Cynicism
  • Naivete
  • Frustration
  • Proactivity
4. Six tips for us to be a winner in this information age.
  • Stay current
  • Maintain our computer competency
  • Develop professional contacts
  • Develop specialties
  • Be alert for organizational change
  • Look for innovative opportunities
5. Different careers have their own responsibilities in IT.
  • Computer support specialist: Provides technical support to customers and other users.
  • Computer technician: Repairs and installs computer components and systems.
  • Computer trainer: Instructs users on the latest software or hardware.
  • Cryptographer: Designs, tests, and researches encryption procedures.
  • Data entry worker: Inputs customer information, lists, and other types of data.
  • Database administrator: Uses database management software to determine the most efficient ways to organize and access data.
  • Desktop publisher: Creates and formats publication-ready material.
  • Information systems manager: Oversees the work of programmers, computer specialists, system analysts, and other computer professionals.
  • Network administrator: Creates and maintains network.
  • Programmer: Creates, tests, and troubleshoots computer programs.
  • Software engineer: Analyzes users' needs and creates application software.
  • System analyst: Plans and designs information systems.
  • Technical writer: Prepares instruction manuals, technical reports, and other scientific or technical documents.
  • Webmaster: Develops and maintains Web sites and Web resources.

Citation: Computing Essentials 2011

CHAPTER 14 Programming and Languages

In this chapter, we defined the terms of program and programming. Besides that, we also discussed the generations of programming languages.


1. Program is a list of instructions for the computer to follow to accomplish the task of processing data into information.

2. Programming, also known as software development, is a six-step procedure for creating that list of instructions.

3. The six steps are as follow:

  • Program specification: The program's objectives, outputs, inputs, and processing requirements are determined.
  • Program design: A solution is created using programming techniques such as top-down program design, pseudocode, flowcharts, and logic structures.
  • Program code: The program is written or coded using a programming language.
  • Program test: The program is tested or debugged by looking for syntax and logic errors.
  • Program documentation: Documentation is an ongoing process throughout the programming process. This phase focuses on formalizing the written description and processes used in the program.
  • Program maintenance: Completed programs are periodically reviewed to evaluate their accuracy, efficiency, standardization, and ease to use. Changes are made to the program's code as needed.
Software development
4. Programming languages are called lower level when they are closer to the language the computer itself uses.

5. Programming languages are called higher level when they are closer to the language humans use.

6.There are five generations of programming languages: 
  • Machine languages: The First Generation
  • Assembly languages: The Second Generation
  • Procedural languages: The Third Generation
  • Task-oriented languages: The Fourth Generation
  • Problem and constraint languages: The Fifth Generation

Citation: Computing Essentials 2011



CHAPTER 13 Systems Analysis and Design

In this chapter, we defined the terms of system and systems analysis and design. Besides that, we also described the systems life cycleprototyping and rapid application development.


1. System is a collection of activities and elements organized to accomplish a goal.

2. Systems analysis and design is a six-phase problem-solving procedure for examining and improving an information system.

3. The six phases make up the systems life cycle.

4. The phases are as follows:
  • Preliminary investigation: The information problems or needs are identified.
  • Systems analysis: The present system is studied in depth. New requirements are specified.
  • Systems design: A new or alternative information system is designed.
  • Systems development: New hardware and software are acquired, developed, and tested.
  • Systems implementation: The new information system is installed and adapted to the new system, and people are trained to use it.
  • Systems maintenance: In this ongoing phase, the system is periodically evaluated and updated as needed.

System life cycle


5. Prototyping means to build a model or prototype that can be modified before the actual system is installed. 

6. Rapid applications development (RAD) involves the use of powerful development software, small specialized teams, and highly trained personnel.


Citation: Computing Essentials 2011

CHAPTER 12 - DATABASES

                   SUMMARY CHAPTER 12
DATA
  • Data consists of facts or observations about people, places, things, and events
  • Not long ago, data was limited to numbers, letters, and symbols. 
  • Now data includes : 
  1. Audio - captured, interpreted and saved using microphones and voice recognition systems. 
  2. Music - download from the Internet and captured from others sources, rearranged, and used to create customized CDs. 
  3. Photographs - captured by digital cameras, edited by image-editing software, and shared with others over the Internet. 
  4. Video - captured by digital video cameras and TV tuner cards, saved, and used in presentations. 
  • There are two ways or perspectives to view data : 
  1. Physical view - focuses on actual format and location of data, very specialized computer professionals are concerned with this view. 
  2. Logical view - focuses on meaning and content of data, end users and most computer professionals are concerned with this view. 
  • This chapter presents the logical view of data and how data is stored in databases. 
DATA ORGANIZATION
  • is organized by the following groups :
  1. Character - the most basic logical elements, consisting of individual numbers, letters, and special characters. 
  2. Field - the next level consisting of a set of related characters. Example a person's last name. A data field represents an attribute (description or characteristic) of some entity (person, place, thing, or object). 
  3. Record - a collection of related fields. Example, a payroll record consisting of fields of data relating to one employee. 
  4. Table - a collection of related records. Example, a payroll table consisting of all the employee records. 
  5. Database - an integrated collection of related tables. Example, a personnel database contains all related employee table, including the payroll and the benefits tables. 
Key Field
  • also known as the primary key
  • is the field in a record that uniquely identifies each record. 
  • Tables can be related to other tables by key fields.
  • Key fields in different files can be used to integrated the data in a database. 
  • Common key fields are employee ID numbers and driver's license numbers. 
  • Example, in the Personnel Database, both the Payroll and the Benefits tables include the fields Employee ID. 
Batch versus Real-Time Processing
  • Traditionally, data is processed in one of two ways. 
  • These are batch processing, or what we might call "later", and real-time processing, or what we might call "now". 
  • Two methods have been used to handle common record-keeping activities such as payroll and sales orders.
  1. Batch processing - data is collected over time and then processed later all at one time (batched). Example, monthly credit card bills are typically created by processing credit card purchases throughout the past month.
  2. Real-time processing (online processing) - data is processed at the same time the transaction occurs, direct access storage devices make real-time processing possible. Example, a request for cash using an ATM machine initiates a verification of funds, approval or disapproval, disbursement of cash, and an update of the account balance. 
DATABASES
  • is a collection of integrated data logically related files and records. 
  • Example, records for the same customer may appear in different files in the sales department, billing department, and credit department, this is called data redundancy. 
  • Example, a product ordered might be sent to the new address, nut the bill might be sent to the old address, this situation result from the lack of data integrity. 
Need For Databases
  • Advantages of databases are : 
  1. sharing data 
  2. improved security
  3. reduced data redundancy
  4. higher data integrity 
Database Management
  • A database management systems (DBMS) is the software for creating, modifying, and gaining access to the database. 
  • A DBMS consists of five subsystems : 
  1. DBMS Engine - provides a bridge between logical and physical data view. 
  2. Data definition subsystem - defines the logical structure of a database using a data dictionary or schema. 
  3. Data manipulation subsystem - provides tools for data maintenance and data analysis, tools include query-by-example and structure query language (SQL). 
  4. Application generation subsystem - provides tools for creating data entry forms with specialized programming languages. 
  5. Data administration subsystem - manages the database, database administrators (DBAs) are computer professionals who help define processing rights. 
DBMS STRUCTURE
  • DBMS programs are designed to work with specific data structure or database models. 
  • These models define rules and standards for all the data in the database.
  • Five principals database models are :
1) Hierarchical Database 
  • uses nodes to link and structure fields and records; entries may have one parent node with several child nodes in a one-to-many relationship. 
2) Network Database
  • is like hierarchical except a child node may have more than one parent in a many-to-many relationship; additional connections are called pointers between parent nodes and child nodes. 
  • Thus, a node may be reached through more than one path.
  • It may be traced down through different branches. 
3) Relational Database 
  • data is stored in tables (relations); related tables must have a common data item (key field). 
  • A table and its data is called a relation. 
  • Common data  item enabling information stored in one table to be linked with information stored in another. 
4) Multidimensional Database
  • extend two-dimensional relational tables to three or more dimensions, sometimes called a data cube.
  • Multidimensional Database offer more flexible structures than relational databases, providing a more intuitive means of modeling data. 
  • Two of the most significant advantages are conceptualization and processing speed. 
5) Object-Oriented Database
  • stores data, instructions, and unstructured data. 
  • Data is organized using classes, objects, attributes, and methods.
  • Classes are general definitions
  • Objects are specific instances of a class that can contain both data and instructions to manipulate the data. 
  • Attributes are the data fields an objects possesses. 
  • Methods are instructions for retrieving or manipulating attribute values. 
TYPES OF DATABASES
  • There are four types of databases : 
1) Individual 
  • Individual database or microcomputer database is used by one person.
  • It is a collection of integrated files primarily used by just one person. 
  • Typically, the data and the DBMS are under the direct control of the user. 
2) Company
  • Company databases are usually stored on a central server and accessed by multiple people.
  • These databases are typically used for company operations. 
3) Distributed
  • Distributed database is spread out geographically ; not all data is physical located in one place ; it is accessible by communications links. 
  • Typically, database servers on a client/server network provide the link between the data. 
4) Commercial
  • Commercial databases are generally enormous and cover particular subjects ; also known as information utilities and data banks. 
  • Some important commercial databases are CSi , Dialog Information Services , Dow Jones Interactive Publishing , and LexisNexis. 
  • Most of the commercial databases are designed for organizational as well as individual use. 



Citation : 
  • COMPUTING ESSENTIALS COMPLETE 2010

CHAPTER 11 - INFORMATION SYSTEMS

                SUMMARY CHAPTER 11
ORGANIZATIONAL INFORMATION FLOW
  • is an organization through functional areas and between management levels
Functions
  • Organization have separate departments to perform 5 functions :
  1. Accounting - tracks all financial activities and generates periodic financial statements.
  2. Marketing - advertise, promotes, and sells the product or service. 
  3. Production - makes the product or service using raw materials and people to turn out finished goods.
  4. Human Resource - finds and hires people, handles such matters as sick leave, retirement benefits, evaluation, compensation, and professional development. 
  5. Research - conducts product research and development, monitors and troubleshoots new products. 
Management Levels
  • The three basic management levels are : 
  1. Supervisors - manage and monitor the employees or workers. Thus, these managers have responsibility relating to operational matters. 
  2. Middle management - Middle-level managers deal with control, planning (also called tactical planning),  decision making. and implement the long-term goals of the organization. 
  3. Top management - Top-level managers are concerned with long-range planning (also called strategic planning), and to plan the future growth. 

 Information Flow
  • Information flows within an organization in different directions: 
  1. For top-level managers, the information flow is primarily upward from within the organization and into the organization from the outside. 
  2. For middle-level managers, the information flow is horizontal and vertical within departments. 
  3. For supervisors, the information flow is primarily vertical.  
INFORMATION SYSTEMS
  • There have four kinds of computer-based information systems:
  1. Transaction Processing Systems (TPS) - also known as data processing systems, record day-to-day transactions. Example is in accounting which handles 6 activities : sales order processing, accounts receivable, inventory control systems, and purchasing, accounts payable, payroll, and general ledger. General ledger is used to produce income statements and balance sheet. 
  2. Management Information Systems ( MIS) - produce predetermined periodic, exception and demand reports. Management information systems use database management systems to integrate the databases of different departments. 
  3. Decision Support Systems (DSS) - enable managers to get answers for unanticipated questions. Teams formed to address large problems use group decision support systems (GDSS). DSS consists of the users, systems software, data - internal and externals, and decision models. Three types of decision models are strategic, tactical, and operational
  4. Executive Support Systems (ESS) - assist top-level executives. An executives support system is similar to MIS or DSS but easier to use. ESSs are designed specifically for top-level decision makers. 
  5. Other Information Systems
  • Office automation systems (OAS) - support data workers whoa re involved with distribution and communication of information. Project managers and videoconferencing systems are OAS. 
  • Knowledge work systems (KWS) - support knowledge workers, who create information. Many engineers use computer-aided design/computer-aided manufacturing (CAD/CAM) systems. 
Citation :
  • COMPUTING ESSENTIALS COMPLETE 2010


CHAPTER 10 - PRIVACY AND SECURITY

      SUMMARY CHAPTER 10
PRIVACY
  • Ethics as you may know are standards of moral conduct. 
  • Computer ethics are guidelines for the morally acceptable use of computers in our society.
  • There are 4 primary computer ethics issues :
  1. Privacy - concerns the collection and use of data about individuals. 
  2. Accuracy - relates to the responsibility of those who collect data to ensure that the data is correct.
  3. Property - relates to who owns data and rights to software. 
  4. Access - relates to the responsibility of those who have data to control and who is able to use that data. 
LARGE DATABASES
  • Large organizations are constantly compiling information about us. 
  • A special telephone directory, called a reverse directory list telephone numbers followed by subscriber names. 
  • A vast industry of data gatherers known as information resellers or information brokers collect and sell personal data. 
  • Information resellers create electronic profiles to compiled from databases to provide highly detailed and personalized descriptions of individuals. 
  • This raises many issues, including : 
  1. Spreading information without personal consent - identify theft is the illegal assumption of someones identify for the purposes of economic gain. 
  2. Spreading inaccurate information - mistaken identify occurs when an electronic profile of one person is switched with an other. 
  3. The Freedom of Information Act entitles individuals access to governmental records relating to them. 
Private Networks
  • Many organizations monitor employee e-mail and computer files using special software called snoopware.
  • Snoopware program record virtually everything you do on your computer
The Internet and The Web
  • Many people belief that while using the Web, as long as they are selective about disclosing their name and other personal information, little can be done to invade their privacy, this called the illusion of anonymity. 
  • History files record locations of sites visited by a computer systems. 
  • Cookies store and track information for Web Sites. 
  • Two basics types of cookies are : 
  1. Traditional cookies - provide information to a single site. 
  2. Ad network@ adware cookies - record your activities across different sites. 
  • The term spyware described a wide range of programs designed to secretly record and report an individuals activities on the Internet. 
  •  Three types of spyware is : 
  1. Ad network cookies
  2. Web bugs - provide information back to spammers about activity on your e-mail account. 
  3. Computer monitoring software - record every activity and keystroke made on your computer system, including credit card numbers, bank account numbers and e-mail messages. 
  • Antispyware @ spy removal programs detect Web bugs and monitoring software. 
Major Laws on Privacy
  • There are numerous federal laws governing privacy matters. 
  • The Gramm-Leach-Bliley Act protects personal financial information. 
  • Privacy remains primarily an ethical issue. 
SECURITY
  • We are concerned with having a safe and secure environment to live in. 
Computer Criminals 
  • is an illegal action in which the perpetrator uses special knowledge of computer technology.
  • They are included : 
  1. Employees - the largest category of computer criminals consists of those with the easiest access to computers. 
  2. Outside users - some suppliers or clients may have access to a company's computer systems. Example are bank customers who use an automated teller machine. 
  3. Hackers and Crackers - Hackers create or improve programs and share those programs with fellow hackers, typically are not criminals. While, crackers share programs designed to gain unauthorized access to computer systems, typically are criminals. 
  4. Organized crime - example computers are useful for keeping track of stolen goods or illegal gambling debts. 
  5. Terrorists - knowledgeable terrorist groups and hostile government could potentially crash satellites and wage economic warfare by disrupting navigation and communications systems. 
Computer Crime
  • can take various forms including : 
  1. Malicious programs @ malware - include viruses ( the Computer Fraud and Abuse Act makes spreading a virus a federal offense) , worms ( self-replicate across a network) , Trojan horses ( enter a computer system disguised as something else). Antivirus programs alert users when certain viruses and worms enter their systems. 
  2. Denial of service attack (DoS) - is an attempt to shut down or stop a computer system or network. Servers under attack are unable to respond to legitimate users. 
  3. Internet scams - fraudulent or deceptive acts or operations designed to trick individuals into spending their time and money with little or no return. Common internet scams include identify theft, chain letters, auction fraud, vacation prizes, and advance fee loans. These are frequently coupled with punishing Web sites or e-mails. 
  4. Theft - takes many forms including stealing hardware, software, data, and computer time. Unauthorized copying of program is called software privacy and is protected by the Digital Millennium Copyright Act.   
  5. Data Manipulation - involves changing data or leaving prank messages. The Computer Fraud and Abuse Act helps protect against data manipulation. 
  6. Other hazards - include natural disasters, civil strifeterrorismtechnological failures (surge protectors protect against voltage surges or spikes) , and human error
MEASURES TO PROTECT COMPUTER SECURITY
  • Security is concerned with keeping hardware, software, data, and programs safe from unauthorized personnel and unforeseen events. 
  • Some measures are encryptingrestricting access by using biometric scanning devices, passwords, and data firewalls; anticipating disasters (physical and data security, disaster recovery plans); and backing up data. 
ERGONOMICS
  • Is the study of human factors related to things people use, including computer. 
Physical Health
  • Physical health problems and their solutions include : 
  1. Eyestrain and headache - take frequent breaks, avoid glare on the monitor. 
  2. Back and neck pains - use adjustable chairs, tables, monitor stands, and footrests. 
  3. Repetitive strain injury (RSI, repetitive motion injury, cumulative trama disorder)  includes carpal tunnel syndrome - take frequent breaks, use good posture, adopt healthy lifestyle, use ergonomic keyboards. 
Mental Health
  • Counterproductive mental irritations include : 
  1. Noise from clattering printers and high frequency squeals from computers. 
  2. Stress from electronic monitoring. 
  • Unnatural adaption to computers can cause techno stress.

Citation :
  • COMPUTING ESSENTIALS Complete 2010