Tuesday, October 18, 2016

Chapter 15

Chapter 15: ??

Every classmates or teacher who are seeing this might be wondering where is the chapter 15 because the last chapter is chapter 14.

Don't be panic like him, please calm down.

Chapter 15 is not a chapter about computer applications or anything related to it (although it has some relations to it). Chapter 15 is about me. It is about what I wanted to share with anyone reading this blog.

So first of all, I felt freedom.

Yes, free at last. It is so true to my feeling right now.

I felt freedom from finishing summarising all 14 chapters covered in computer applications subject. It is not just 14 chapters, it is 14 chapters with each chapter full of new computing keywords (which helps you of course) and that every chapter of them have an average of 50 pages (what the hell?). If I were to read all 14 chapters for my exam, that is fine (it is better than the form 4 and 5 history textbooks). But the problem is that I kind of don't like working in front of a computer and what is worse is that I spent an average of 1 hour to finish summarising a chapter. Yes, I did copy from the slides most of the time, but I do my best to search for each definition of keywords and include them in my summarisation (you might not notice it if you didn't pay attention). So what is it that I don't like when working in front of a computer, if you refer to Chapter 1, you might know the answers.

 This is one of the reasons, bad posture (it felt like shit).

For this reason, I have to take a pause and walk away from the computer whenever I felt like and stretch my body that has been tortured by computer!!! Not to mention the eyesight problems too. It just has so many health risk in working with a computer, that's why I hope that I will get a job that involve less time working in front of a computer in the future. However, I am comfortable with playing games in computer though that I didn't play games much nowadays (less than 30 minutes and less than 1 day in a week that I have spent in playing games).

For all of the reasons that I have mentioned, can you imagine how suffering it was for me to spend an average of 1 hour in typing blog (no copy paste here) and that my feeling of freedom after everything is finished!!!

Hooray! Another picture to celebrate my freedom.

You must be noticing some real difference between this chapter and the rest of the chapters right. That it is full of pictures in this chapter, because I finally have that feeling of excitement to blogging again! I wonder why our beloved teacher, Miss Wan Irma (is it okay to mention your name here, miss? I did it anyway) have this intention or different approach on our assignment section. The intention I meant is summarising the chapters with blog, maybe teacher like blogging (her blog is eyeonly16.blogspot.my or can be found on the right side of my blog) and wants us to apply this in our lives too? Since this is computer applications and that we have to "apply". What I want to say here is "Teacher, I did it, I love blogging, only in this last chapter". 

I love blog, but it has to do with what you write in the content. 
Seriously, I don't love it so much.

Right now, what I want you all to do is to focus on my blog title. Why I choose to name it as "Howl Comp"? First of all, I wanted to be different from the rest of my classmates. I didn't start the blog first (yes, I am lazy) and have seen others uploaded their blog. What I saw is that their blog titles are really "logic". What that mean is they named their blog as either their student ID (luckily student ID is not something that thefts want) or their own name. Yes, I don't like to see that everything is normal.

No, I won't do this.

Besides that, I have a thought at that time that other people (not from our class) around the world might bump into my blog. So I named it as something a little different but can be understood by others (I even edit the blog title's picture myself). And hope that they can benefit from our lessons too, but according to the statistics of page view, my thought was wrong. And part of it is my fault too, on not making the other chapter better and more interesting to read (I just felt like dying, can't help here bro). And that our knowledge or explanations on each keyword is not so deep (sorry, am lazy here). But the main reason is that Google has dominated the world with its search engine, which will lead to more popular web sites (I did that too). 

Google has dominated the world, at least from my points of view.

Since our computer applications classes are finished, I want to take this chance to thank you, teacher for the time on teaching us. I know teacher had disappointment on some of us that are not paying attention in class including myself. Sorry that I can't help with that, but sometimes I am paying attentions too. This subject is definitely helping us in understanding more about computing world. For example, I can correlate some of my old PC problems with the subject like the POST problem. And I also notice that an ergonomic keyboard might be of a real help for me right now since I am typing a lot and I do felt that the normal keyboard is not really comfortable for prolonged use of keyboard. But certain terms or area is not really necessary from my points of view. One more thing that my group members had mentioned in the video for assignment is that the tutorial class is not really necessary for this subject as they hoped for lab or hands on experience for deeper understanding on the computer hardware. I know this proposal will be hard to manage, but this is it, our opinions. What I find really interesting about our teacher is that teacher had memorised all of the students' name. And whenever I see her calling our names, I have a thought in my mind "is she practicing her memories", LOL. 

Thank you teacher.

Lastly, I hope all my fellow classmates will not fail the test.

Teacher will not want to see this.

So here, another 40 minutes spent on this chapter. That is all, and remember this is the last chapter. I will not do this again. 

Stretching is needed in a hurry.

Please comment below if you have anything to say. Please do comment even if you don't have anything to say, I just wanted to see if there is anyone reading this. Thanks.











Chapter 14

Chapter 14: Enterprise Computing

Enterprise computing is a buzzword that refers to business-oriented information technology that is critical to a company's operations. It involves the use of computers in networks, such as LANs and WANs (Wide Area Network), or a series of interconnected networks that encompasses a variety of different operating systems, protocols and network architectures.

Types of enterprises:
A) Retail.
B) Manufacturing.
C) Service.
D) Wholesale.
E) Government.
F) Educational.
G) Transportation.

Four common categories in an enterprise are Executive management, Middle management, Operational management and non-management employees.

Enterprise information- information gathered in the ongoing operations of enterprise-sized organisation. For example, Business intelligence, Business process management and Business process automation. Resources will be managed by managers by Planning, Organising, Leading and Controlling.

Information system- a set of hardware, software, people, data and procedures that work together to produce information.

Functional units within an enterprise:
A) Accounting and Finance
1) Accounting software- manages everyday transaction.
2) Billing software- reconcile purchases with customer payments.
3) Financial software- helps managers budget, forecast and analyse.

B) Human Resources
1) HRIS (Human Resources Information System)- manages one or more human resources functions.
2) Employee Relationship Management System- manages communication between employees and business.

C) Engineering and Product Development
1) Computer-aided Design (CAD)- software aid in engineering, drafting and design.
2) Computer-aided Engineering (CAE)- uses computers to test product designs.

D) Manufacturing
1) Computer-aided Manufacturing (CAM)- use of computers to control production equipment.
2) Computer-integrated Manufacturing (CIM)- uses computers to integrate the many different operations of the manufacturing process.
3) Material Requirements Planning (MRP)- uses software to help monitor and control processes related to production.
4) Manufacturing Resource Planning II (MRP II)- is an extension of MRP and also includes software that helps in scheduling.
5) Quality Control System- helps an organisation maintain or improve the quality of its products or services.

E) Marketing
1) Marketing Information System- serves as a central repository for the tasks of a marketing department.

F) Sales
1) Sales Force Automation (SFA) software- equips travelling salespeople with electronic tools they need to be more productive.

G) Distribution
1) Distribution system- provide forecasting for inventory control, manage and track shipping of products and provide information and analysis on inventory in a warehouse.

H) Customer Service
1) Customer Interaction Management (CIM) software- manages the day to day interactions with customers.

I) Information Technology
1) Makes technology decisions for the enterprise in case like whether to build or buy new information system and when a computer or information system has outlived its useful life.
2) Web Site Management Programs- collect data designed to help organisations make informed decisions regarding their Web presence.
3) Office Information System (OIS)- oriented to word processing, electronic mail and other similar office functions.
4) Transaction Processing System (TPS)- for business transactions involving the collection, modification and retrieval of all transaction data.
5) Management Information System (MIS)- focuses on management of information systems to provide efficiency and effectiveness of strategic decision making.
6) Decision Support System (DSS)- a set of related computer programs and data required to assists with analysis and decision making within an organisation.
7) Expert System- a piece of software programmed using artificial intelligence. It uses database of expert knowledge to offer advice or make decision. For example, it is the help button found in our operating system.
8) Integrated Information System (IIS)- an array of multiple information sets linked together in an organised way.
It includes:
i) Customer Relationship Management- manages information about customers, interactions with customers, past purchases and interests.
ii) Enterprise Resource Planning- provides centralised, integrated software to help manage and coordinate ongoing activities.
iii) Content Management System- information system that combine databases, software and procedures.

Technologies used in enterprise:
A) Portals- a collection of links, content and services presented on a Web page that are interesting for a particular job function/

B) Data Warehouse- a huge database that stores and manages the data required to analyse historical and current transactions.

C) Electronic Data Interchange (EDI)- a set of standards that control the transfer of business data and information among computers both within and among enterprise.

D) Extranet- a portion of a company's network that allows customers or suppliers of a company to access parts of an enterprise's intranet.

E) Web Services- allow businesses to create products and B2B interactions over the Internet.

F) Document Management System (DMS)- allows for storage and management of a company's documents.

G) Workflow- a defined process that identifies the specific set of steps involved in completing a particular project or business process.

H) Virtual Private Network- allow customers or vendors to connect to company network server in a private network connection.

Virtualisation- practice of sharing or pooling computing resources.
A) Server virtualisation- physical server can be divided into many virtual servers.
B) Storage virtualisation- single logical storage device can be created from many physical storage devices.

Cloud computing- an Internet service that provides computing needs to computer users.
A) Grid computing- combines many servers and/or personal computers on a network to act as one large computer.

Types of E-commerce:
A) E-retail- occurs when retailers use the Web to sell their products or services.
B) Finance- financial tools such as online banking and online trading services are provided.
C) Travel- travel related services like airline reservations, destinations are provided.
D) Entertainment and Media- entertainment and media such as video, audio or games are provided.
E) Health- health related services or informations are provided.

Enterprise hardware- allows large organisations to manage and store information and data using devices geared for heavy use, maximum availability and maximum efficiency.
A) RAID (Redundant Array of Independent Disks)- duplicates data and implements duplication in different ways.
B) Network Attached Storage (NAS)- a server that provides storage to users and information systems attached to the network.
C) Storage Area Network (SAN)- high-speed network that provides storage to other servers to which it is attached.
D) Enterprise Storage System- a strategy that focuses on the availability, protection, organization, and backup of storage in a company.
E) Blade Server- packs a complete computer server on a single card (called a blade) rather than a system unit.
F) Thin Client- a small terminal like computer that mostly relies on a server for data storage and processing.

High availability system- continues running and performing tasks for at least 99 percent of the time. It include hot-swapping and redundant components.

Scalability- measures of how well a computer hardware, software or an information system can grow to meet increasing performance demands.

Interoperability- ability for an information system to share information with other information systems within an enterprise.

Types of backup methods:
1) Full- fastest recovery method. All files are saved. Disadvantage is longest backup time.
2) Differential- fast backup method and require minimal storage. Disadvantage is recovery is time consuming because the last full backup plus differential backup are needed.
3) Incremental- fastest backup method and require minimal storage. Only most recent changes saved. Disadvantage is recovery is most time consuming because the last full backup and all incremental backups since the last full backup are needed.
4) Selective- fast backup method which provide great flexibility. Disadvantage is difficult to mange individual file backups.
5) Continuous- the only real time backup and recovery of data is very fast. Disadvantage is very expensive and requires a great amount of storage.

Disaster recovery plan- a written plan describing the steps a company would take to restore computer operations in the event of a disaster. Contains four major components which are Emergency plan, Backup plan, Recovery plan and Test plan.



Sunday, October 16, 2016

Chapter 13

Chapter 13: Computer Programs and Programming Languages

As all of you might heard of programmers anywhere even in movies. Programmer is the one who create computer program (a series of instructions that directs a computer to perform task) using various programming language (the language or instruction that tells computer how and what to do with specific action) such as Java, C or C++. Simple said, programming language is used to communicate with a computer.

Types of programming languages and development tools:
A) Low level languages
1) Machine language- first generation of programming language. Only language the computer directly recognises.
2) Assembly language- second generation of programming language. Use of symbolic instructions.
3) Source program- contains the code to be converted to machine language.

B) Procedural languages- instructions that tell computer what and how to do.
1) Third generation language- a compiler translates an entire program before executing it, and an interpreter converts and executes one code statement at a time.
2) C programming language- used to write many of today's programs.
3) COBOL (COmmon Business Oriented Language)- designed for business application with easy to read English like statements.

C) Object oriented programming languages- allow reuse and modification of existing object. Advantages are objects can be reused, programmers create applications faster, work well in RAD (Rapid Application Development) environment and most program development tools are IDEs (Integrated Development Environment).
1) Java- an object oriented programming language developed by Sun Microsystem. Just In Time (JIT) compiler converts byte code into machine dependent code.
2) Microsoft .NET framework- allows almost any type of program to run on the Internet or an internal business network, as well as computers and mobile devices. Features include CLR (Common Language Runtime) and Classes.
3) C++- an extension of C programming language.
4) C#- based on C++ and was developed by Microsoft.
5) F#- combines the benefit of an object oriented language with those of a functional language.
6) Visual studio- Microsoft suite's of program development tools.
There are:
i) Visual Basic- based on BASIC programming language.
ii) Visual C++- based on C++.
iii) Visual C#- based on C#.
7) Visual programming language- uses a visual or graphical interface for creating all source code.
8) Borland's Delphi- program development tool that is ideal for building large scale enterprise and web applications in RAD environment.
9) Power Builder- program development RAD tool. Best suited for web-based, .NET and large scale enterprise object oriented applications.

D) Other programming languages and development tools
1) Fourth generation languages- non procedural languages that enable users and programmers to access data in database. Such as SQL (Structured Query Language).
2) Classic programming languages include Ada, ALGOL, APL, BASIC, Forth, FORTRAN, Hyper Talk, LISP, Logo, Modula-2, Pascal, PILOT, PL/1, Prolog, RPG and Small Talk.
3) Application generator- a program that creates source code or machine code from a specification of the required functionality. Often bundled as part of DBMS (Database Management System).
4) Macro- a series of statements that instructs an application how to complete a task. Can be created in two ways, record the macro with macro recorder and write the macro.

E) Web page development
1) HTML (Hypertext Markup Language)- special formatting language to format documents for display on the Web.
2) XHTML (Extensible HTML)- markup language that allows website to be displayed more easily on mobile devices.
3) XML (Extensible Markup Language)- allows web developers to create customised tags and use predefined tags to display content appropriately on various devices. Applications of XML are RSS 2.0 and ATOM.
4) WML (Wireless ML)- a subset of XML and is used to design pages for micro browsers.
5) CGI (Common Gate Interface)- used to send and receive information between computer and a web server. Such as Scripts, Applets, Servlets and ActiveX controls.
How a CGI scripts work:
i) Programmer stores CGI program in special folder on the web server such as /cgi-bin.
ii) Webmaster create a link between CGI program and web page. When a user displays the web page, CGI program automatically starts.
iii) User requests are sent to CGI program. CGI program will contact database and request the information for the user.
iv) CGI program receives information from database, assembles it in markup language format and sends it to user's web browser.
6) Various languages that are used to write Scripts, Applets, Servlets and ActiveX controls.
For example:
i) Java Script.
ii) Perl.
iii) PHP (Hypertext Preprocessor).
iv) Rexx.
v) Tcl.
vi) VBScript.
7) Dynamic HTML (DHTML)- allows web developers to include more graphical interest and interactivity.
8) CSS (Cascading Style Sheets)- contains the formats for how a particular objects should be displayed.
9) Ruby on Rails (RoR)- provide technologies for developing object oriented, database driven web sites.
10) Web 2.0- allows web sites to provide a means for users to share personal information, modify web site content and it has application software built into the site. Examples are mentioned in Chapter 2.
11) API (Application Program Interface)- a set of routines, protocols and tools for building software applications. It specifies how software components should interact.
12) Web page authoring software- can create sophisticated web pages that include images, video, audio, animation and other effects.
For example:
i) Dreamweaver.
ii) Expression Web.
iii) Flash.
iv) Share Point Designer.

F) Multimedia program development
1) Multimedia authoring software- allows programmers to combine text, graphics, animation, audio and video in an interactive presentation.
For example:
i) Tool Book.
ii) Director.

Program development- consists of a series of steps programmers use to build computer programs.
Steps:
A) Analyse requirements
1) Reviews the requirements.
2) Identifies input, processing and output. A.k.a IPO chart.

B) Design solution
1) Design a solution algorithm.
2) Structured design- where programmer begins with general design before moving towards detailed design.
3) Hierarchy chart- show program modules graphically.
4) Object oriented design- programmer packages the data and program into a single object. A.k.a encapsulation.
5) Sequence control structure- shows one or more actions following each other in order.
6) Selection control structure- tells program which action to take based on certain conditions.
Types:
i) If-then-else- If not A, then B.
ii) Case- If not A, B, C then D.
7) Repetition control structure- enables a program to perform one or more actions repeatedly as long as a certain condition is met.
Types:
i) Do-while.
ii) Do-until.
8) Flowchart- graphically shows the logic in a solution algorithm.
9) Pseudo code- uses a condensed form of English to convey program logic.
10) Unified Modeling Language (UML)- standard notation for object modeling and development.

C) Validate design
1) Check for logic error using test data.
Steps:
i) Develop various sets of test data.
ii) Determine the expected results.
iii) Step through the algorithm.
iv) Compare the results.
v) Repeat steps for each set of test data.

D) Implement design
1) Using a program development tool that assists the programmer by:
i) Generating or providing some or all code.
ii) Writing the code that translates the design into a computer program.
iii) Creating the user interface.
2) Extreme programming- a strategy where programmers immediately begin coding and testing as soon as requirements are defined.

E) Test solution
1) To ensure program runs correctly and is error free.
2) Some errors are syntax errors and logic errors.
3) Debugging- is required to remove the bugs found in a program.
4) Beta- a program that has most or all of its features and functionality implemented. Beta mostly found in new software or games to test the performance as well as the market.

F) Document the solution
1) Review the program code.
2) Review all the documentation.

Saturday, October 15, 2016

Chapter 12

Chapter 12: Exploring Information System Development

System development is the development of an information system. System is a set of components that interact to achieve a common goal. System development should involve representatives from each department in which the proposed system will be used.
Information system is a collection of hardware, software, data, people and procedures that work together to produce quality information.

There are 5 phases in system development life cycle, below is the introduction of each phases:
1) Planning
- Review project requests.
- Allocate resources.
- Form project development team.
- Brainstorm idea and concept.
2) Analysis
- Analyse ideas and concepts from planning phase and determine the best.
- Study current system.
- Determine user requirement.
3) Design
- Acquire hardware and software.
- Create prototype.
- Develop details of system.
4) Implementation
- Install and test prototype.
- Train users.
- Improve prototype if needed.
5) Operation, Support and Security
- Perform maintenance activities.
- Monitor system performance.
- Maintain and update system security.

General guidelines for system development:
1) Group activities or task into phases.
2) Involve users.
3) Define standards.

Ongoing activities of system development:
A) Project management- process of planning, scheduling and controlling the activities during system development.
Mainly focus on areas such as:
1) Project scope.
2) Required activities.
3) Time estimates for each activities.
4) Cost estimates for each activities.
5) Order of activities.
6) Activities that can take place at the same time.
Software or tools used to help in project management:
1) Gantt chart- a popular tool used to plan and schedule the time relationships among project activities.
2) PERT (Program Evaluation Review Technique) chart- a project management tool used to schedule, organise and coordinate tasks within a project.

B) Feasibility- measure of how suitable the development of system will be to the organisation.
In terms of:
1) Operational feasibility- does it help in daily operation?
2) Schedule feasibility- can we meet the schedule requirement?
3) Technical feasibility- can we meet the technical requirements?
4) Economic feasibility- can it produce profit?

C) Documentation- the collection and summarisation of data and information.

D) Data and information gathering
Techniques used by members of the project team to gather data and information during system development:
1) Review documentation.
2) Observe.
3) Survey.
4) Interview.
5) JAD (Joint Application Design) session.
6) Research.

System development project is required when:
1) A user request a new or modified system.
2) Organisation wants to improve hardware, software or other technology.
3) Situation beyond controls of organisation may require change.
4) Management might mandate a change.
5) A user may request for a new information system using a request for system services or a project request.

Activities that involve during the phases of system development life cycle.
A) Planning
Four major activities that are performed:
1) Review and approve project requests.
2) Prioritise the project requests.
3) Allocate resources.
4) Form a project development team.

B) Analysis
Two major activities that are performed:
1) Preliminary investigation- determines and defines the exact nature of the problem or improvement as well as interview the user who submitted the request.
2) Perform detailed analysis- study of current system, determine the users' wants, needs and requirements and recommend a solution.
Tools that are used during analysis phase:
1) Process modeling (analysis and design technique that describes the processes that transform inputs into outputs) is done during the analysis phase and it consists of:
i) Entity-relationship diagram (ERD)- a tool that graphically shows the connections among entities (objects in a system that have data) in a system.
ii) Data flow diagram (DFD)- a tool that graphically shows the flow of data in the system.
iii) Project dictionary- contains all documentations deliverables of a project. Style of writing is structured English.
2) Decision table and decision tree.
i) Decision table- a table that lists a variety of conditions and actions that correspond to each condition. In table format.
ii) Decision tree- shows the conditions and actions graphically.
3) Data dictionary- stores the data item's name, description and other details about each data item.
4) Object modeling- combines data with the processes that act on the data into a single unit called object.
5) UML (Unified Modeling Language)- standard notation for object modeling and development.
Examples of diagram included in UML:
1) Use case diagram- graphically shows how actors (users) interact with the information system.
2) Class diagram- graphically shows classes and subclasses in a system.
Steering committee will discuss the system proposal and decides which alternative (packaged software, custom software, outsourcing) to pursue.

C) Design
Activities that are performed:
1) Acquire hardware and software
Steps:
i) Identify technical specifications.
ii) Solicit vendor proposals.
iii) Test and evaluate vendor proposals.
iv) Make a decision.
2) Develop all of the details of the new or modified information system
Involve:
i) Database design.
ii) Input and output design.
iii) Program design.
After that, a prototype (working model of proposed system) will be created.
With the help of:
1) Computer-aided Software Engineering (CASE)- tools that are designed to support one or more activities of system development.
It contains:
i) Project repository.
ii) Graphics.
iii) Prototyping.
iv) Quality assurance.
v) Code generator.
vi) Housekeeping.

D) Implementation
It involves:
1) Develop programs
Steps:
i) Analyse the requirements
ii) Design the solution.
iii) Validate the design.
iv) Implement the design.
v) Test the solution.
vi) Document the solution.
2) Install and test the new system
Various test performed:
i) Unit test- verifies that each individual program or object works by itself.
ii) System test- verifies that all programs in an application work together properly.
iii) Integration test- verifies that an application works with other applications.
iv) Acceptance test- check the new system to ensure that it works with actual data.
3) Train users
It involves showing users how to use the new hardware and software in the system by:
i) One-on-one sessions.
ii) Classroom-style lectures.
iii) Web-based training.
4) Convert to new system
Types of conversion strategies:
i) Direct conversion- directly convert old system to new system.
ii) Parallel conversion- converting old system to new system while still using old system.
iii) Phased conversion- converting old system to new system in various phase. For example, 70% usage on old system and 30% usage on new system for first phase. And 30% usage on old system and 70% usage on new system for last phase.
iv) Pilot conversion- rolling out new system for small group of users for testing and evaluation.

D) Operation, Support and Security
Activities that are performed:
1) Perform maintenance activities- to maintain the lifetime of the system.
2) Monitor system performance- to see if any improvement is needed.
3) Assess system security- manage the security and keep it updated.
Computer security plan should have:
1) Identify all information assets of an organisation.
2) Identify all security risks that may cause an information asset loss.
3) For each risk, identify the safeguards that exist to detect, prevent and recover from a loss.





Chapter 11

Chapter 11: Manage Computing Securely, Safely and Ethically.

As the title says, we have to manage computing securely, safely and ethically to avoid any loss of private information and also the performance of computer. This is important since the computer virus been invented, as well as more and more different malware, trojan horse and spyware is coming out and spreading over the internet. It is hard to trace the originality of the viruses and destroy them completely as they will replicate themselves over time. What we can do as a user is to prevent the viruses from entering our computer system with the aid of various antivirus software.

Computer security risk- any event or action that could cause a loss of or damage to computer hardware, software, data, information and processing capability.
Type of computer security risk:
A) Cybercrime- an online or internet-based illegal act.
For example:
1) Hackers- where a person's computer is broken into so that any personal or sensitive information could be obtained. But there are ethical hackers (provide benefit) and unethical hackers (steal information).
2) Crackers- where a computer program's license or password is bypassed.
3) Script kiddies- where a person uses existing scripts or code to hack into a computer.
4) Corporate spies- a covert gaining competitor's information.
5) Unethical employees- employee who obtain company's information and sell it.
6) Cyberextortionists- crime involving attack or threat of attack with purpose to get money out of it.
7) Cyberterrorists- act of internet terrorism in terrorists activities, including acts of deliberate, large scale disruption of computer networks by the means of tools such as computer viruses.

B) Internet and network attacks- often caused by viruses, malware, spyware or trojan horse.
Users may use online security service (websites that evaluates computer to check for internet and e-mail vulnerabilities) such as Audit My PC, McAfee Free Scan and Symantec Security Check.
Types of internet and network attacks:
1) Computer virus- affects a computer negatively by damaging computer system and hardware.
2) Worm- replicate itself and will take up hard disk space and internet bandwidth.
3) Trojan horse- hides itself and looks like a legitimate program that will steal information.
4) Rootkit- hides in a computer and allows someone from remote location to take full control.
5) Botnet- a group of compromised computers a.k.a zombie connected to a network.
6) Denial of service attack (DoS attack)- disrupts computer access to internet services.
7) Back door- a program or set of instructions in a program that allow users to bypass security control.
8) Spoofing- a technique intruders used to make their network or internet transmission appear legitimate.
Symptoms of infected computer:
1) Operating system run slower than usual.
2) Available memory is less than expected.
3) Files become corrupted.
4) Screen displays unusual messages or images.
5) Music or unusual sound plays randomly.
6) Existing program and files disappear.
7) Program or files do not work properly.
8) Unknown program or files mysteriously appear.
9) System properties changed.
10) Operating system does not start up.
11) Operating system shut down unexpectedly.
Tips for preventing viruses and other malware:
1) Never start a computer with removable device connected to computer unless it is not infected.
2) Never open an unknown e-mail attachment.
3) Install an antivirus software and keep it updated.
4) Scan all downloaded programs for virus and malware.
5) Delete e-mail attachment that is infected.
6) Scan removable media with antivirus software before using it.
7) Install a personal firewall program (hardware and/or software that protect a network's resources from intrusion).
8) Stay informed about new virus alerts and virus hoaxes.
Intrusion detection software- notifies network administrators of suspicious behaviour patterns or system breaches by analysing all network traffic and accesses system vulnerabilities to identify unauthorised intrusions.
Honeypot- vulnerable computer that is set up to entice an intruder to break into it.

C) Unauthorised access and use
Unauthorised access- use of computer or network without permission.
Unauthorised use- use of computer or its data for unapproved or illegal activities.
Ways that an organisation takes to prevent unauthorised access and use:
1) Acceptable use policy (AUP)- a document stipulating constraints and practices that a user must agree to for access to a corporate network or internet. A type of terms and conditions.
2) Disable file and printer sharing- so that computer files cannot be displayed by other computers in a network.
3) Firewalls- hardware and/or software that protect a network's resources from intrusion.
4) Intrusion detection software- notifies network administrators of suspicious behaviour patterns or system breaches by analysing all network traffic and accesses system vulnerabilities to identify unauthorised intrusions.
5) Access control- define who can access a computer and types of actions they can take with the use of username, password, passphrase and CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart).
6) A possessed object- any item that a user must carry to gain access to a computer or computer facility.
7) Biometric device- authenticate a person's identity by translating a personal's characteristic into a digital code to match with digital code in a computer. Such as fingerprint reader or facial recognition system.
Digital Forensic- discovery, collection and analysis of evidence found on computers and networks. Application can be found in many areas such as law enforcement, criminal prosecutor, military intelligence, insurance agency and information security department.

D) Hardware theft- stealing computer's hardware.
Hardware vandalism- destroying of computer's hardware.
Ways that a company or school use to reduce the chances of theft:
1) Physical access controls.
2) Alarm systems.
3) Cables to lock equipment.
4) Real time location system.
5) Passwords, possessed object and biometrics.

E) System failure- prolonged malfunction of a computer. Often caused by aging hardware, natural disasters, electrical power problems (noise, undervoltages and overvoltages) and errors in computing programs.
Ways to prevent system failure:
1) Surge protectors.
2) Uninterruptable power supplies (UPS).

F) Information theft- stealing other's information like identity or personal information.
Ways to reduce information theft:
1) Encryption- process of converting readable data into unreadable characters to prevent unauthorised access.
Example of encryption algorithms:
i) Transposition- switch the order of characters.
ii) Substitution- replace characters with other characters.
iii) Expansion- insert characters between existing characters.
iv) Compaction- remove characters and store elsewhere.
2) Public key encryption- uses a paired public and private key algorithm for secure data communication.
How it works:
i) A sender will encrypt the message or document to be e-mailed to receiver by using the receiver's public key.
ii) The receiver will decrypt the message or document with his/her private key.
3) Digital signature- an encrypted code that a person, web site or organisation attaches to an electronic message to verify the identity of the sender.
4) Digital certificate- an electronic passport that allows a person, computer or organisation to exchange information securely over the internet using the public key infrastructure (PKI).
5) Transport layer security (TLS)- provide secure communications on the internet such as e-mail, internet faxing and other data transfers.
6) Secure HTTP (Hypertext Transfer Protocol)- allows secure exchange of files on the WWW.
7) VPN (Virtual Private Network)- technology that creates an encrypted connection over a less secure network.

G) Software theft- occurs when someone steals software media, intentionally erases programs, illegally copies a program and illegally registers and/or activates a program.
Ways a software developer use to prevent software theft:
1) Single user license agreement- user is permitted to install the software only on one computer, make one copy of the software and must remove the software from computer before giving or selling it to others. User is not permitted to install the software on network, give copies to others while still using it, export the software and rent the software.
2) Copyright law- copying, loaning, borrowing, renting or distributing software without copyright or permission from the software developer.
3) Product activation- some software may require product activation code.

Beside computer security risk, there is wireless security risk. And the ways to prevent it are a wireless access point should not broadcast an SSID (Service Set Identifier), change the default SSID, configure a WAP (Wireless Application Protocol) and use WPA (Wi-Fi Protected Access) or WPA 2 security standards.

The best way to reduce computer security risk is having a good ethics and society.
Under Ethics and Society,
Computer ethics are the moral guidelines that govern the use of computers and information systems.
Intellectual property rights are the rights to which creator are entitled for their work.
Copyright protects any tangible form of expression.
IT code of conduct is a written guideline that help determine ethical and unethical computer action.
For example:
1) Computers may not be used to harm other people.
2) Employees may not interfere with others' computer work.
3) Employees may not meddle in others' computer files.
4) Computers may not be used to steal.
5) Computers may not be used to bear false witness.
6) Employees may not copy or use software illegally.
7) Employees may not use others' computer resources without authorisation.
8) Employees may not use others' intellectual property as their own.
9) Employees shall consider the social impact of programs and systems they design.
10) Employees always should use computers in a way that demonstrates considerations and respect for fellow humans.

Green computing involve reducing the electricity and environmental waste while using a computer.
Green computing suggestions:
1) Use computers and devices that comply with the Energy Star program.
2) Turn off computers when not in use.
3) Use LCD monitor instead of CRT monitor.
4) Turn on power save mode.
5) Use paperless method to communicate.
6) Recycle paper.
7) Buy recycled paper.
8) Recycle toner cartridges.
9) Recycle old computers, printers and other devices.
10) Telecommute to save gas.
11) Use video conferencing and VoIP for meetings.

Information privacy- refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Examples on how to safeguard personal information:
1) Fill only necessary information on any form.
2) Avoid shopping club and buyer cards.
3) Ask before giving personal information to any merchants.
4) Install a cookie manager to filter cookies.
5) Turn off file and printer sharing on internet connection.
6) Install a personal firewall.
7) Inform merchant not to distribute your personal information.
8) Clear history file frequently on browser.
9) Do not reply to spam for any reason.
10) Surf the web anonymously.

Cookie- a small text file that a web server stores on your computer. It allows personalisation, store users' passwords, assist with online shopping, track how often users visit a site and target advertisement.

Spam is an unsolicited e-mail message or newsgroup posting.
E-mail filtering blocks e-mail messages from designated sources.
Anti-spam programs attempt to remove spam before it reaches your inbox.
Phishing is a scam where an official looking e-mail message that attempts to obtain your personal and financial information.
Pharming is a scam where spoofing is used as an attempt to obtain your personal and financial information.
Content filtering is the process of restricting access to certain material on the web.
Web filtering software restricts access to specified websites.

Social engineering is defined as gaining unauthorised access or obtaining confidential information by taking advantage of trust and naivety.
Employee monitoring involves the use of computers to observe, record and review an employee's use of a computer.




Friday, October 14, 2016

Chapter 10


Chapter 10: Managing a Database

Database is a collection of data organised in a manner that allows access, retrieval and use of that data (collection of unprocessed items such as text, image, numbers, audio and video). Managing a database is rather important because it will affect the productivity of a company. Processed data is called information and it contains documents, audio, images and video. And luckily, there are plenty of database software a.k.a database management system (DBMS) that will help managing a database.
It allows users to:
1) Create a computerised database.
2) Add, modify and delete data.
3) Sort and retrieve data.
4) Create forms and reports from the data.

Some terms found:
1) Data integrity- identifies the quality of the data.
2) Garbage in, garbage out (GIGO)- accuracy of a computer's output depends on the accuracy of the input.

Valuable information is what every users need and it is very important for a company in its daily operation and long term decision or strategies.
Characteristics of valuable information:
1) Accurate- valuable information needs to be accurate and free from error.
2) Timely- valuable information needs to be up to date.
3) Organised- valuable information needs to be organised for easier reading.
4) Accessible- valuable information needs to be accessible for any users at any time.
5) Useful- valuable information needs to be useful in terms of its content.
6) Cost effective- valuable information needs to be cost effective that is getting high quality information at low price.

Hierarchy of data, from the top layer:
1) Character- is one byte and contain any numbers, letters, space, punctuation marks or other symbols.
2) Field- a combination of one or more related characters. Contain:
i) Field name
ii) Field size
iii) Data type such as text, numeric, auto number, currency, date, memo, yes/no, hyperlink, object and attachment.
3) Record- a group of related fields.
4) File- a set of records.

File maintenance refers to the procedure of adding, modifying and deleting records.
Validation compares data with a set of rules or values to find out if the data is correct. Database validation is required when databases get corrupted to check for corruption.
Types of validity checks:
1) Alphabetic/Numeric check- check if the alphabet or numbers are correct according to setting.
2) Range check- check that a value falls within a specific range.
3) Consistency check- check fields to ensure data in these fields corresponds.
4) Completeness check- check fields to ensure data in these fields are complete in terms of requirements.
5) Digit check- the last one or two digits are used to check the other digits are correct.

File processing versus Database approach.
File processing system:
1) Each department has its own set of files.
2) Have data redundancy.
3) Isolate data.

Database approach:
1) Programs and users share data.
2) Reduce data redundancy.
3) Improve data integrity.
4) Share data.
5) Allow easier access.
6) Reduce development time.
7) More vulnerable.

Features in database management system:
1) Data dictionary- contains data about each file in the database and each field in those lines.
2) Query language- consist of simple, english-like statements that allow users to specify the data to display, print or store.
3) Query by example (QBE)- provide a graphical user interface to assist users with retrieving data.
4) Form- window on the screen that provide areas for entering or modifying data in a database.
5) Report generator- allows users to design a report on the screen, retrieve data into the report design and then display or print the report.
6) Security- only authorised users can access data at permitted times such as access privileges and principle of least privilege.
7) Backup and restore- to save the data in database in another storage medium and can be returned to its original form later.
8) Data model- consists of rules and standards that define how the database organises data.
For example:
i) Relational database- stores data in tables that consist rows and columns. Relationship is the link within the data.
ii) Object oriented database (OODB)- stores data in objects. Examples of applications are multimedia database, groupware database, computer-aided design database and hypertext database.
iii) Object relational database- create relationship between object oriented data.
iv) Multidimensional database- can store data in more than two dimensions of data. A.k.a hypercube and it can consolidate data much faster than a relational database.
9) Data warehouse- huge database that stores and manages data required to analyse historical and current transactions.

Features of Web database:
1) Shop for products or services- Amazon, Alibaba.
2) Buy or sell stocks- NASDAQ.
3) Search for a job- Jobstreet.
4) Make airline reservations- Air Asia, Malaysia Airline, Tiger Air.
5) Register for college classes- UCSI Information Integrated System (IIS).
6) Check semester grades- UCSI IIS.

Database administration helps in the productivity, maintenance and design of database.
Guidelines for design of database:
1) Determine the purpose of the database.
2) Design the tables or files on paper first and each table or file should contain data about one subject.
3) Design the records and fields for each table or file.
4) Determine the relationships among the tables or files.
Database is managed by:
1) Database Analyst (DA)- decides on proper field placement, data relationship and identifies user's access privileges.
2) Database Administrator (DBA)- creates and maintains the data dictionary, manages security, monitors performance and checks backup and recovery procedures.



Thursday, October 13, 2016

Chapter 8

Chapter 8: Types of Storage

Storage holds data, instructions and information for future use. A storage medium is the physical material on which a computer keeps data, instructions and information. Every computer user must use a storage as it is used to store various informations. And every computer has preinstalled hard disk too. And storage has the limit to store data and it is called capacity. Usual capacity we can found is kilobyte (kb), megabyte (mb) and gigabyte (gb). We have mentioned hard disk just now, and hard disk is one of the storage device, which is defined as computer hardware that records and/or retrieves items to and from storage media. Two types of process found in storage device is reading (process of transferring items from storage medium to memory) and writing (process of transferring items from memory to storage medium). The speed or the time required for storage device to locate item on storage medium and deliver item from memory to processor is called access time. RAM has the fastest access time and hard disk, memory cards and USB flash drive, optical discs and tape has slower access time according to the sequence.

Types of storage device:
A) Hard disk- contains one or more inflexible, circular platters that use magnetic particles to store data, instructions and informations. It can store data using longitudinal recording or perpendicular recording.
Characteristics of hard disk:
1) Capacity- amount of data in bytes that can be stored.
2) Platters- circular disk on which magnetic data is stored.
3) Read/Write heads- mechanical head which move above platters and perform reading (transform platter's magnetic field into electric current) and writing (transform electric current into magnetic field).
4) Cylinders- two corresponding tracks on a fixed disk.
5) Sectors and tracks- sector is subdivision of a track  (a data storage ring).
6) Revolutions per minute- rotational speed.
7) Transfer rate- rate at which data is transferred from memory to platter or from platter to memory.
8) Access time- refer above.
One of the hard disk function is formatting (process of dividing disk into tracks and sectors so that operating system can store and locate data and information on the disk.
How a hard disk work:
1) Circuit board controls the movement of head actuator and small motor.
2) Small motor will spin the platter.
3) Head actuator will position read/write head over the correct location on the platter to read/write data.
One of the failure of hard disk is caused by head crash where a read/write head touches the platter.
How disk cache work:
1) A special purpose chip on the hard disk called controller receive request for data from processor.
2) It will checks disk cache for requested item.
3) If the item is not found in disk cache, it will locate the requested item on platters.
4) Lastly, it will transfer the item to processor.
Types of hard disk:
1) Redundant array of independent disk (RAID)- a group of two of more integrated hard disk.
2) Network attached storage (NAS)- a server connected to a network with the sole of providing storage.
3) External hard disk- separate free-standing hard disk that connects to a computer with cable or wirelessly.
4) Removable hard disk- hard disk that can be inserted or removed from a drive.
5) Miniature hard disk- hard disk in miniature size which is available in both form of internal and external hard disk. For internal miniature hard disk, it is often used in laptop.
Disk controller in hard disk contain special purpose chip and electronic circuits that control the transfer of data, instructions and informations from a disk to and from the system bus and other components of the computer.
Types of chip in disk controller:
1) Serial Advanced Technology Attachment (SATA)- a computer bus interface that connect host bus adapter (HBA) to storage device.
2) Enhance Integrated Drive Electronics (EIDE)- standard electronic interface between computer and storage device.
3) Small Computer System Interface (SCSI)- a set of parallel interface standards for attaching printers, disk drives, scanners and other peripherals to computers.
4) Serial Attached SCSI (SAS)- replaces SCSI.

B) Flash memory storage- a type of solid state media and contain no moving parts.
Solid state drive (SSD) have several advantages over magnetic hard disk such as faster access time, faster transfer rates, generate less heat and consume less power and last longer.
Types of flash memory storage:
1) Memory card- removable flash memory device that can be inserted and removed from a slot in computer, mobile devices and card reader/writer.
For example:
i) Compact Flash (CF)
ii) Secure Digital (SD)
iii) Secure Digital High Capacity (SDHC)
iv) Micro SD
v) Micro SDHC
vi) xD Picture Card
vii) Memory Stick
viii) Memory Stick Micro (M2)
2) USB flash drive- plug into USB port on a computer or mobile device.
3) Express card module-removable device that fits in express card slot.
\
C) Cloud storage- internet service that provides storage to computer users.
Cloud storage providers:
1) Windows Live Sky Drive- Backup or additonal storage for any type of files.
2) Flickr- Digital photos.
3) YouTube- Digital videos.
4) Facebook- Digital photos, digital videos, messages and personal information.
5) Google Docs- Documents, spreadsheets and presentations.
6) Gmail, Outlook- E-mail messages.
7) Amazon EC2, Amazon S3- Enterprise-level storage.
Benefits of cloud storage:
1) Access files from any computer.
2) Store large files instantaneously.
3) Allow others to access their files.
4) View time critical data and images immediately.
5) Store off site backups.
6) Provide data center functions.

D) Optical Discs- consists of a flat, round, portable disc made of metal, plastic and lacquer that is written and read by a laser.
How laser reads data on an optical disc:
1) Laser diode shines a light beam toward the disc.
2) If light strikes a pit, it scatters. If light strikes a land, it is reflected back toward the laser diode.
3) Reflected light is deflected to a light sensing diode, which sends a digital signal of 1 to the computer. Absence of reflected light is read as digital signal of 0.
Types of optical disc:
1) CD-ROM- can be read but not written to.
2) CD-R- multisession optical disc on which users can write but not erase.
3) CD-RW- erasable multisession optical disc.
4) DVD-ROM- high capacity optical disc, can be read but not written to.
5) Blu-ray Disc-ROM (BD-ROM)- has storage capacity of 100GB.
6) DVD-RW, DVD+RW, DVD+RAM- high capacity rewritable DVD formats.

E) Tape- magnetically coated ribbon of plastic capable of storing large amount of data and informations. Require tape drive to read and write data and information.

F) Magnetic stripe card- contains magnetic stripe that stores information.

G) Smart card- stores data on thin microprocessor embedded in the card.

H) Microfilm and microfiche- store microscopic images of documents on a roll or sheet film.

I) Enterprise storage- uses special hardware to store huge volume of data and information for large businesses.

Chapter 7

Chapter 7: Understanding Output

Output is data that has been processed into a useful form. Most often output we see are through output device such as monitor, speaker and printer. 

Types of output device:
A) Display device- visually conveys text, graphics and video information.
For example:
1) Monitor- a display screen used to provide visual output of a computer such as LCD (Liquid Crystal Display) Monitor and Widescreen. LCD uses a liquid compound to present information on a display device and it contain active-matrix display (depends on thin film transistor) and passive-matrix display (use a simple grid to supply charge). Quality of LCD monitor depends on resolution (number of pixels in rows and column), response time, brightness, dot pitch (distance between pixels) and contrast ratio (ratio of luminance of brightest colour to darkest colour). Graphic processing unit (GPU) controls the manipulation and display of graphics on a display device.
2) Plasma monitor- display devices that use gas plasma technology.
3) Television- such as digital television (DTV) and HDTV.
4) CRT monitor- uses cathode-ray tube to display.

B)Printer- device that accept text and graphics output from a computer and transfers the information to paper.
Types of printer:
1) Non-impact printer- forms characters and graphics on a piece of paper without striking and leaving mark on paper.
For example:
i) Ink-jet printer- forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper.
ii) Photo printer- produces colour photo-lab-quality pictures.
iii) Laser printer- high speed printer that uses laser technology. A rotating mirror will deflect a laser beam across surface of a drum that creates charges which will attract toner to stick to the drum. The toner will transfer to the paper when drum rotate and press against paper. And a set of roller uses heat and pressure to fuse the toner permanently to the paper.
iv) Multifunctional peripheral- a single device that scan, print, copies and fax.
v) Thermal printer- generate images by pushing electrically heated pins against the heat sensitive paper. For example, thermal wax-transfer printer and dye-sublimation printer.
vi) Mobile printer- small, lightweight and battery-powered printer for portability.
vii) Label printer- small printer that prints on adhesive-type material.
viii) Plotter- used to produce high quality drawings.
ix) Large-format printer- create photo-realistic quality colour prints on a larger scale.

2) Impact printer- form characters and graphics on a piece of paper by striking and leaving mark on paper.
For example:
i) Dot-matrix printer- produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon.
ii) Line printer- prints an entire line at a time.

C) Speakers, Headphones and Earbuds- an audio output device that produces sound.
For example:
1) Speaker- convert analog audio signals into equivalent air vibration in order to make audible sound.
2) Headphones- speaker that cover the ear.
3) Earbuds- rest inside ear canal.

D) Data projector- is a device that takes text and images displaying on computer screen and projects them on a larger screen.
For example:
1) LCD projector.
2) Digital light processing (DLP) projector.

E) Interactive white board- a touch sensitive device, resembling a dry-erase board that displays the image on a connected computer screen.

F) Force feedback game controller- send resistance to the device in response to actions of the user.

G) Tactile output- provide a user with physical response from the device.