OBJECTIVES;- •Define system software and identify the two types of system software •Describe the functions of an operating system •Summarize the startup process on a personal computer •Summarize the features of several stand-alone operating systems •Briefly describe various server operating systems •Summarize the features of several embedded operating systems •Explain the purpose of several utility programs SYSTEM SOFTWARE -Programs that control or maintained the operation of a computer -Operating System - Utility program Operating System -Set of programs contain instruction to coordinate all the activities among computer hardware resources - Cold Boot: Turning on a computer that has been powered off completely -Warm Boot : Using the operating system to restart a computer -A boot drive is the drive from which your computer start -User Interface (UI) controls how you enter data and instructions and how information is displayed on screen Driver- A small program that tells the operating system how to communicate with a specific devices Type of Operating System:- -Stand-alone= DOS, MacOS -Server = Linux, Solaris - Embedded= Blackberry, iPhones OS Stand-alone Operating System - - A complete operating system that works on computers Server Operating System -Window Server 2008 -UNIX -LINUX -Solaris -NetWare Embedded Operating System - Resides on a ROM chip on a mobile devices or a consumer electronic devices -Embedded Linux, Blackberry, Symbian OS, iPhones OS Utility Programs
-A system software that allow users to maintain tasks -File manager is a utility that performs functions related to file management -Disk Defragmenter reorganizes the files and unused space on a computer 's hard disk so that the operating system accesses data more quickly and programs run faster -File compression utility shrinks the size of a file
0 Comments
OBJECTIVES: •Discuss the special information requirements of an enterprise-sized corporation •Identify information systems and software used in the functional units of an enterprise •Describe and list general purpose and integrated information systems used throughout an enterprise •Describe and list types of technologies used throughout an enterprise •Describe virtualization, cloud computing, and grid computing •Discuss the computer hardware needs and solutions for an enterprise •Discuss high availability, scalability, and interoperability •Determine why computer backup is important and how it is accomplished •Discuss the steps in a disaster recovery plan ENTERPRISE COMPUTING -the use of computer in networks that encompass a variety of different operating systems,protocols, and network architectures -Types of enterprise include : Retail, Manufacturing, Service, Wholesale, Government, Educational, Transportation Information System in the Enterprise -a set of hardware,software, data, people, and procedure that work together to produce information -Computer-aid design (CAD) --> computer special software that aid in engineering, drafting, and design -Computer-aid engineering (CAE) --> use computer to test product design -Computer-aid manufacturing (CAM) --> to control production equipment -Computer-integrated manufacturing (CIM) --> to integrate many different operations of the manufacturing process -Material Requirement Planning (MRP) --> uses software to help monitor and control processes related to product -Material Requirement Planning II (MRPII) --> and extension of MRP and also includes software that helps in schedule Enterprise technology and methodology -Portals = collection of information presented on a Web page that are interesting for a particular job function -Data Warehouse= a huge database that stores and manages the data required to analyze historical and current transaction -EDI = control business data and info within enterprise -Extranet= portion of a company’s network that allows customers or suppliers of a company to access parts of an enterprise’s intranet -Web Service = to create product and B2B interaction over the internet -Document management system = allows for storage and management of a company's document -Workflow = process that identifies the specific set of steps involved in completing a particular project or business process -Virtual private Network (VPN) = provide users and customers with a secure connection to the company network server Virtualization -The practice of sharing or pooling computing resources -Server Virtualization = Provides the capability to divide a physical server logically into many virtual server -Storage Virtualization =Provides the capability to create a single logical storage device from many physical storage devices Cloud Computing -An internet service that provides computing needs to computer users Grid Computing -Combines many servers and/or personal computers on a network to act as one large computers Enterprise Hardware -Large organization to manage and store information and data using devices gear RAID =Duplicates data and implements duplication in different way Network attach storage (NAS) =a server that provides storage to users and information system attached to the network Storage Area network (SAN) =A high speed network provide storage to other servers to which it is attached High Availability system
-running and performing task continuously without stopping Scalability =A measure of how well computer hardware, software, of an information system can grow to meet increasing performance Interoperability =ability for an information system to share information with other information systems within an enterprise OBJECTIVES:-
Computer Programmes -Instructions that directs a computer to do certain task Machine Languages -The first generation of programming language -Language that computer directly recognize Assembly Language -The second generation of programming language -Symbolic instructions written by programmers Procedural Language -Third generation language -Programmer writes instruction to tell the computer to accomplish certain task -C programming language is used to write today's programs -COBOL (Common Business-Oriented Language) is an English-like terms that use in business application Object-Oriented Programming (OOP) language -allow programmer reuse or modify existing object -Advantages are: Object can be reused, programmers create applications faster, work well in a RAD environment, most programmes development tools are IDEs -Visual Basic is based on the BASIC programming language -Visual C++ is based on C++ -Visual C# combines the programming elements of C++ with an easier rapid-development environment -Visual programming language is a language that uses visual or graphic interface for creating all source mode 4GL (4th generation language) is a nonprocedural language that enable users and programmers to access data in database Application Generator -A programs that creates source code or machine code from a specification of the required functionality Macro -a series of statement that instructs an application to complete a task Web Page Development
Multimedia Program Development --> Multimedia authoring software - allows programmers to combines text, Graphic , animation, video, audio, and video in an interactive presentation Programs Development
Analyze requirement --> Design solution --> Validate design --> Implement design --> Test solution --> Document solution
OBJECTIVES:- - Define system development and list the system development phases - Identify the guidelines for system development - Discuss the importance of project management, feasibility assessment, documentation, and data and information gathering techniques - Explain the activities perform in the planning phases - Discuss the purpose of the activities perform in the analysis phase - Describe the various tools used in process modelling - Describe the various tools used in object modelling - Explain the activities perform in design phases - Recognize the develop programs activity is part of system development - Discuss the activities performed in the implementation phase -Discuss the purpose of the activities performed in the operation, support, and security phases System development -A set of activities used to build information system Phases = Planning --> Analysis --> Design --> Implementation --> Management Guidelines = Group activities or tasks into phases, Involve users, and Define standards Project Management - The process of managing activities during development. For ex, project scope, required activities, times estimation, estimates cost, order of activities, activities that can take place at the same time Feasibility - A measure of how suitable the development of a system will be to the organization -Operational, Schedule, Technical, Economic feasibility Documentation -The collection and summarization of data and information Data and Information gathering techniques:- -Review documentation -Observe -Survey -Interview -JAD sessions -Research Planning Phases: -A project to begins when the steering committee receives project request - Review and approve the project request --> Prioritize the request --> Allocate resources --> Form a project development team Analysis Phases: -Two major activities: Preliminary investigation, Perform detail analysis -Preliminary investigations determine and defines the exact nature of the problem or improvement -Perform detail analysis study how the system work, determine the user's requirement, and recommend a solution Process modelling -An analysis and design technique that describes processes that transform input to outputs -Entity-relationship diagrams, data flow diagram, project dictionary Object modelling -Combines data with the processes that act on the data into a single unit, called an object Design Phases -Two major activities: Acquire hardware and software, Develop all the details of the new or modified information system. -Database design, Input and output design, Program design. Prototype -A working model of the proposed system Implementation Phases -Construct the new or modified system and then deliver it Develop programs --> Install and test the new system --> Train users --> Convert the new system - Various test needed : Unit test, Systems test, Integration test, Acceptance test Operation, Support, Security Phases
- To provide ongoing assistance for an information system and its users after the system is implemented Perform maintenance --> Monitor system performance --> Access system security -Computer security plan - Identify all information assets of an organization - Identify all security risks that may cause an information asset loss -For each risk, identify the safeguards that exist to detect, prevent, and recover from a loss OBJECTIVES: - •Discuss the purpose of the components required for successful communications and identify various sending and receiving devices •Describe the uses of computer communications •List advantages of using a network, and differentiate among LANs, MANs, and WANs •Differentiate between client/server and peer-to-peer networks, and describe how a P2P network works •Differentiate among a star network, bus network, and ring network •Describe the various network communications standards •Explain the purpose of communications software •Describe various types of lines for communications over the telephone network •Describe commonly used communications devices •Discuss different ways to set up a home network •Describe various physical and wireless transmission media COMMUNICATION -A process in which two or more computers or devices transfer data, instructions, and information Sending devices -> Communication channel -> Receiving device Uses of computer communications -Blogs,chatroom, email, fax, FTP, Instant messaging, internet, newsgroup, RSS, Video conferencing,VoIP, Web, Web 2.0, web folders, and Wikis Network- A collection of computers devices connected together via communications and transmission of data Advantages of using network: -
Local Area Network (LAN) - Limited internet in certain geographical area Wireless LAN (WLAN)- Connections that does not use physical cable Metropolitan Area Network (MAN) - Connects LAN in a metropolitan area Wide Area Network (WAN) - Networks that covers large geographical area Client/Server network- A powerful computers (server) is a hub to which computers and workstation (client) connected together Peer-to-Peer network- Internet network on which users access each other’s hard disks and exchange files directly over the Internet Network topology Star Network- A Local Area Network (LAN) which devices is connected directly to a central computer Bus Network- A LAN which each of the devices are connected to a single network cable Ring Network- Connects to exactly two other nodes, forming a single continuous pathway for signals through each node Network Communications Standard - Ethernet= A network standard that specifies no computer controls when data can be transmitted -Token ring= Standard specifies that computers and devices on the network share or pass a special signal -TCP/IP=a network standard that defines how messages are routed from one end of a network to another -Wifi= network based on the 802.11 standard that facilitates wireless communication -Bluetooth= Uses short ranges radio waves to transmit data -UWB (Ultra WideBand) = two UWB devices use short-range radio waves to communicate at high speeds -IrDA= Uses infrared to transmit data -RFID= uses radio signals to communicate with a tag placed in or attached to an object, animal, or person -WiMAX= Provides wireless broadband Internet access -WAP= Uses a client/server network Communications Software:- -Help users establish a connection to another computer or network -Manage transmission of data and info -Provide an interface for users to communicate with one another Type of line:-
Communication Devices: Wireless modem, Network card, Wireless access point Physical Transmission Data:-
-Twisted-pair cable -Fiber-optic cable -Coaxial cable Wireless Transmission Data:- -Infrared -Broadcast Radio -Cellular radio -Microwave radio -Communication satellite OBJECTIVE:- -Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators -Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks -Discuss techniques to prevent unauthorized computer access and use -Identify safeguards against hardware theft and vandalism -Explain the ways software manufacturers protect against software piracy -Discuss how encryption works, and explain why it is necessary -Discuss the types of devices available that protect computers from system failure -Explain the options available for backing up computer resources -Identify risks and safeguards associated with wireless communications -Recognise issues related to information accuracy, intellectual property rights, codes of conduct, and green computing -Discuss issues surrounding information privacy Computer security risks- Any event or action that could cause a loss on data, hardware, information or processing capability Cybercrime is an online or Internet-based illegal act. such as, -Hackers -Crackers -Script Kiddies -Corporate spies -Unethical employees -Cyberextortionists -Cyberterrorists Types of Internet and networks attack:- -Computer Virus -Worm -Trojan horse -Rootkit Ways to safeguard against these attack: - -Never start a computer with removable media inserted in a drives or plugged in the ports, unless the media are uninfected -Scan all downloaded programs for viruses and other malware -Install a personal firewall program -Stay informed about new virus alerts and virus hoaxes Techniques to prevent unauthorized computer access and use: -
Safeguard Against hardware theft and vandalism:- -Physical access controls -Alarm system -Cables to lock equipment -Real time location -Passwords,possessed objects, and biometrics Encryption - A process of converting readable data into unreadable character to prevent unauthorized access Example of Encryption work:- 1)The senders create a document to be e-mail to the receiver 2)The sender use the receiver public key to encrypt a message 3)The receiver uses his or her private key to decrypt the message 4)The receiver can read or print the decrypted message Ways to protect from system failures:- -Surge protector -Uninterruptable power supplies Backup Definition: A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. For example, cloud storage Two categories of backup, which are, full backup and selective backup Wireless Security -A wireless access point should not broadcast an SSID -Change the default SSID -Configure a WAP so that only certain devices can access it -Use WPA or WPA 2 security standards Internet accuracy is a concern. Not all information in the internet is correct
Intellectual property rights are the rights to which creators are entitled for their work An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Green Computing involves reducing the the electricity and environment waste while using computer Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them OBJECTIVES: - -Define the term , database, and explain how a database interacts with data and information -Define the term, data, integrity, and describe the qualities of valuable information -Discuss the terms, character, field, record, and file -Describe file maintenance,techniques and validation techniques -Differentiate between a file processing approach and the database approach -Discuss the functions common to most database management systems -Describe characteristics of relational, object-oriented, and multidimensional databases -Explain how to access Web databases -Identify database design guidelines and discuss the responsibilities of database analysts and administrators Database : Collection of data organized in a manner that allows access, retrieval, and use of that data Data : Collection of unprocessed item such as text, numbers,image, audio, video Information : Processed data, documents, audio, images, video Data Integrity identifies the quality of data Garbage in, Garbage out (GIGO) points out the accuracy of a computer's output depends on the accuracy of the input Qualities of valuable information:
Hierarchy of Data
Maintaining Data
Relational, Object-oriented, and Multidimensional Databases -Relational Database stores data in tables that consist of rows and column -Object-oriented database (OODB) stores data in objects. Ex, multimedia database, Groupware database, Computer-aid design database, Hypertext database -Multidimensional Database can store data in more than two dimension Database design guideline
Responsibility for managing and coordinating all database activities
|
Archives
October 2016
Categories |