Vocab 9 - 15 & Web 2.0 (Includes reversed cards as well) Flashcards
Computer communications
A process in which two or more computers or devices transfer data, instructions, and information.
- Sending device → Communications channel → Receiving device
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
cybercrime
A Network or Internet-based illegal act
Computer Security Risks
- Internet and network attacks
- unauthorized access and use
- hardware theft (stealing a thumb drive or hard drive)
- system failure (lightning strike)
- infromation theft (stollen identity)
- software theft (illegal copy)
Data transmitted over networks
Has a higher degree of security risk than data kept on an organization’s premises
online security service
A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
Virus
Affects a computer negatively by altering the way the computer works <!--EndFragment-->
Worm
Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->
Trojan Horse
A malicious program that hides within or looks like a legitimate program <!--EndFragment-->
Rootkit
Program that hides, creating a “back door” for a remote location to take full control of the computer.
Symptoms of an infected computer include:
- Runs much slower than usual
- Available memory is less than expected
- Files become corrupted
- Screen displays unusual message or image
- Music or unusual sounds play randomly
- Existing programs and files disappear
- Programs or files do not work properly
- Unknown programs or files mysteriously appear
- System properties change
- Operating system does not boot (start up)
- Operating system shuts down unexpectedly
Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:
- Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
- Never open an email attachment unless you are expecting it and it is from a trusted source.
- Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
- Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
- Scan all downloaded programs for viruses and other maleware.
- If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
- Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
- Install a personal firewall program.
- Stay informed about new virus alerts and virus hoaxes.
botnet
A group of compromised computers connected to a network
A compromised computer is known as a zombie
DoS attack
A denial of service attack: disrupts computer access to Internet services
Distributed DoS (DDoS)
back door
A program or set of instructions in a program that allows remote attackers to bypass security controls
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate.
firewall
Hardware and/or software that protects computers and networks from intrusion
Intrusion detection software
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system breaches
Honeypot
Vulnerable computer that is set up to entice an intruder to break into it
Unauthorized access
The use of a computer or network without permission <!--EndFragment-->
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->
The measures organizations take to help prevent unauthorized access and use:
- Acceptable use policy
- Disable file and printer sharing
- Firewalls
- Intrusion detection software
Access controls
Define who can access a computer, when they can access it, and what actions they can take:
- Two-phase processes called identification and authentication
- User name
- Password
- Passphrase
- CAPTCHA
possessed object
- Any item that you must carry to gain access to a computer or computer facility.
- Often are used in combination with a personal identification number (PIN)
biometric device
Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Digital forensics
The discovery, collection, and analysis of evidence found on computers and networks
Areas that use digital forensics
- Law enforcement
- Criminal prosecutors
- Civil lawsuits, discovery
- Military intelligence
- Insurance agencies
- Information security departments
Hardware theft
The act of stealing computer equipment <!--EndFragment-->
Hardware vandalism
The <!--StartFragment--> act of defacing or destroying computer equipment <!--EndFragment-->
Software theft occurs when someone:
- Steals software media
- Intentionally erases programs
- Illegally copies a program
- Illegally registers and/or activates a program
- Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
EULA
An End User License Agreement typically contains the following conditions:
- Permitted to…
- Install the software on a certain number of computers (usually one)
- Make one copy of the software
- Remove the software from your computer before giving it away or selling it
- Not permitted to…
- Install the software on a network
- Give copies to friends or colleagues while continuing to use the software
- Export the software
- Rent or lease the software
Information theft
Occurs when someone steals personal or confidential information
Encryption
A process of converting readable data into unreadable characters to prevent unauthorized access
- Transposition
- Substitution
- Expansion
- Compaction
Transposition
Switch the order of characters
Substitution
Replace characters with other character
Expansion
Insert characters between existing characters
Compaction
Remove characters and store elsewhere
Public Key Encryption
- The sender creates a document to be email to the receiver.
- The sender uses the receiver’s public key to encrypt the message.
- The receiver uses his or her private key to decrypt the message.
- The receiver can read or print the message.
digital signature
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Often used to ensure that an impostor is not participating in an Internet transaction
Web browsers and Web sites use ________ techniques
encryption
Popular security techniques include:
- Digital Certificates
- Transport Layer Security (TLS)
- Secure HTTP
- VPN (Virtual Private Network)
system failure
The prolonged malfunction of a computer
A variety of factors can lead to system failure, including:
- Aging hardware
- Natural disasters
- Electrical power problems
- Noise, undervoltages, and overvoltages
- Errors in computer programs
Two ways to protect from system failures caused by electrical power variations include ___________ and ____________.
- surge protectors
- uninterruptable power supplies (UPS)
backup
Is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
To back up a file means to make a copy of it
Offsite backups
Backups are stored in a location separate from the computer site
- Cloud Storage
Three-generation backup policy
Grandparent → Parent → Child
Two backup categories:
- Full backup
- Selective backup
- Differential
- Incremental
Wireless Security
Wireless access poses additional security risks
About 80 percent of wireless networks have no security protection (“unsecured wireless network”)
“War driving” allows individuals to detect wireless networks while driving through an area
In additional to using firewalls, some safeguards improve security of wireless networks
- Change the default SSID (Service Set Identifier)
- A wireless access point should not broadcast an SSID
- Configure WAP so only certain devices can access (e.g., MAC address configuration)
- Use WPA or WPA2 security standards •(do not use WEP)
Health Concerns of Computer Use
The widespread use of computers has led to health concerns
- Repetitive strain injury (RSI)
- Tendonitis
- Carpal tunnel syndrome (CTS)
- Computer vision syndrome (CVS)
Ergonomics
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Computer addiction
Occurs when the computer consumes someone’s social life. Symptoms include:
- Craves computer time
- Overjoyed when at the computer
- Unable to stop computer activity
- Irritable when not at the computer
- Neglects family and friends
- Problems at work or school
Computer ethics
Are moral guidelines that govern the use of computers and information systems
Information accuracy is a concern
Not all information on the Web is correct!
Intellectual property rights
Are the rights to which creators are entitled for their work <!--EndFragment-->
A copyright protects any tangible form of expression
IT code of conduct
Is written guidelines that help determine whether a specific computer action is ethical or unethical <!--EndFragment-->
IT Code of Conduct
- Computers may not be used to harm other people.
- Employees may not interfere with others’ computer work.
- Employees may not meddle in others’ computer files.
- Computers may not be used to steal.
- Computers may not be used to bear false witness.
- Employees may not copy or use software illegally.
- Employees may not use others’ computer resources without authorization.
- Employees may not use others’ intellectual property as their own.
- Employees shall consider the social impact of programs and systems they design.
- Employees always should use coputers in a way that demonstrates consideration and respect for fellow humans.
Information privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
- Huge databases store data online
- It is important to safeguard your information
cookie
A small text file that a Web server stores on your computer
Web sites use cookies for many reasons, including:
- Personalization of the experience
- Store passwords
- Assist with online shopping
- Track site visits
- Target advertisements
Spam
An unsolicited e-mail message or newsgroup posting
E-mail filtering
Blocks e-mail messages from designated sources
Anti-spam programs
Attempt to remove spam before it reaches your inbox
Phishing
A scam that sends an official-looking e-mail that attempts to obtain your personal and financial information
Pharming
A scam that attempts to obtain your personal and financial information via spoofing
The 1970 Fair Credit Reporting Act
Limits the right to view a credit report to those with legitimate business needs
Social engineering
Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naiveté <!--EndFragment-->
Employee monitoring
Uses computers to observe, record, and review employees’ computer use during work on on breaks (if using an employer’s computer) <!--EndFragment-->
Content filtering
The process of restricting access to certain material on the Web
Many businesses use content filtering
Internet Content Rating Association (ICRA)
Web filtering software
Restricts access to specified Web sites
Digital forensics
The discovery, collection, analysis, and reporting of evidence found on computers and digital devices
- Focuses on computers, digital devices, and networks
- Digital evidence exists on a variety of computers
- The forensic analysis of computers and digital devices specifically involves the examination of media, programs, and data and log files
- Fastest growing discipline in the forensics field
- Also referred to as computer forensics, network forensics, or cyberforensics
Digital forensics examiners must have:
- Knowledge of the law
- Technical experience with many types of hardware and software products
- Superior communication skills
- Familiarity with corporate structures and policies
- A willingness to learn and update skills
- A knack for problem solving
Digital forensics covers several overlapping areas:
- Law enforcement
- Homeland security
- Businesses and other private sector organizations
Digital Forensics in Action: Identity Theft
Steps
- Step 1: Gather materials to analyze
- Computer media
- Computers and peripherals
- GPS receivers
- Network hardware
- Computer software
- Step 2: Transport the materials
- Step 3: Preserve the media
- Step 4: Extract evidence
- Step 5: Analyze evidence
- Analyze mobile devices
- Analyze chat room logs
- Analyze browser history logs
- Step 6: Document results
Digital Forensics in Action: Spam Attacks
A digital forensics examiner might use the following techniques to locate the attacker and/or the computer network facilitating the attacks:
- Analyze network traffic
- Track packet routes
- Analyze Internet access provider logs
- Analyze a packet trace
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
cybercrime
Network or Internet-based illegal act.
Names for Different Types of Cyber-Criminals
- Hackers
- Crackers
- Script Kiddies
- Corporate Spies
- Unethical Employees
- Cyberextortionists
- Cyberterrorists
online security service
A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
Wireless Internet access points
They allow people to connect wirelessly to the Internet from home, work, school, and in many public locations
GPS
Global Positioning System: is a navigation system comprising one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the GPS receiver’s geographic location
GPS receivers are:
- Built into many mobile devices (like your phone so the police can find you when you call 911 for help)
- Available as a handheld device
- Available with motor vehicles
collaborate
Many programs provide a means to ___________, or work together online, with others connected to a server
Collaboration software includes tools that:
… enable users to share documents via online meetings and communicate with other connected users. Examples:
- Online meetings
- Web conferences
- Document management systems
Web services enable programmers to:
… create applications that communicate with other remote computers over the Internet or on an internal business network
mashup
A Web application that combines services from two or more sources
network
A collection of computers and devices connected via communication devices and transmission media
Network Advantages:
- Facilitate communications
- Share hardware
- Share data
- Share software
- Transfer funds
LAN
A Local Area Network: connects computers and devices in a limited geographical area
WLAN
A Wireless LAN: is a LAN that uses no physical connections
MAN
A Metropolitan Area Network: connects LANs in a metropolitan area
WAN
A Wide Area Network: covers a large geographical area
network architecture
The design of computers, devices, and media on a network
P2P
An Internet network on which users access each other’s hard disks and exchange files
Network Topology
Refers to the layout of the computers and devices in a network:
- Star Network
- Bus Network
Intranet
An internal network that uses Internet technologies <!--EndFragment-->
Extranet
Allows customers or suppliers to access part of its Intranet
Network Communications Standards
- Ethernet
- TCP/IP
- Wi-Fi
- Bluetooth
Ethernet
A network standard that specifies no computer controls when data can be transmitted <!--EndFragment-->
TCP/IP
A network standard that defines how messages are routed within a network <!--EndFragment-->
Wi-Fi
Identifies any network based on the 802.11 standard that facilitates wireless communication.
- Newest is 802.11ac (1 Gbps and higher)
- Sometimes referred to as Wireless Ethernet
Bluetooth
Defines how two Bluetooth devices use short-range radio waves to transmit data.
RFID
Uses radio signals to communicate with a tag placed in or attached to an object, animal, or person
Communications software:
- Helps users establish a connection to another computer or network
- Manages the transmission of data, instructions, and information
- Provides an interface for users to communicate with one another
communications device
Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
digital modem
Sends and receives data and information to and from a digital line. Examples:
- DSL modem
- Cable modem
NIC
A Network Interface Card enables a computer or device to access a network.
- Available in a variety of form factors
- Wireless network cards often have an antenna
WAP
A Wireless Access Point is a central communications device that allows computers and devices to transfer data wirelessly or to a wired network
router
Connects multiple computers or other routers and transmits data to its correct destination
- Many routers are protected by a hardware firewall
hub or switch
connects several devices
Capabilities of home networks include:
- •\Connecting to the Internet at the same time
- Sharing a single high-speed Internet connection
- Accessing files and programs on other computers
- Sharing peripherals
- Playing multiplayer games
- Connecting game consoles to the Internet
- Using VoIP
Types of wired home networks:
- Ethernet
- Powerline cable
- Phoneline
Bandwidth
The amount of data that can travel over a communications channel
Latency
The time it takes a signal to travel from one location to another
Transmission media
Carry one or more signals
Broadband media
Transmit multiple signals simultaneously
Physical Transmission Media
- Twisted-pair cable
- Coaxial cable
- Fiber-optic cable
Cellular radio
A form of broadcast radio that is used widely for mobile communications
communications satellite
Receives microwave signals from earth, amplifies them, and broadcasts the signals over a wide area
Database
Collection of data organized in a manner that allows access, retrieval, and use of that data <!--EndFragment-->
Data
Collection of unprocessed items:
- Text
- Numbers
- Images
- Audio
- Video <!--EndFragment-->
Information
Processed data:
- Documents
- Reports
- Audio
- Images
- Video <!--EndFragment-->
Database software
Often called a database management system (DBMS), allows users to:
- Create a database
- Input, modify, and delete data
- Sort and retrieve (extract) data
- Create forms and reports
Data integrity
Refers to the quality of the data
GIGO
Garbage in, garbage out points out that the accuracy of a computer’s output depends on the accuracy of the input
Useful data and information should have the following characteristics:
- Accurate
- Verifiable
- Timely
- Organized
- Accessible
- Useful
- Cost-effective
The Hierarchy of Data
Data is organized in layers:
- File
- Tables/queries/reports
- records
- fields
- characters
character
one byte:
- Number
- letter
- space
- punctuation mark
- symbol
field
A combination of one or more related characters:
- Field name
- Field size
- Data type
Common data types
- Text (2013: Short Text)
- Numeric
- AutoNumber
- Currency
- Date
- Memo (2013: Long Text)
- Yes/No
- Hyperlink
- Object
- Attachment
record
A group of related fields
primary key
Uniquely identifies each record
table (data file)
A collection of related records
Table maintenance
Refers to the procedures that keep data current:
- Adding records
- Modifying records
- Deleting records
Maintaining Data
- Users add new records to tables when they obtain new data
- Users modify records to correct inaccurate data or update old date
- When a record no longer is needed, a user deletes it from a table
Data Validation
Compares data with a set of rules or values to verify accuracy:
- Alphabetic/Numeric check
- Range check
- Consistency check
- Completeness check
- Check digit
- Other checks
File processing approach
- Each department has its own set of files
- Used for many years
- Have data redundancy
- Isolate data
- Some use Excel for complex lists (not a “database”) <!--EndFragment-->
Database approach
- Programs and users share data
- Reduce data redundancy
- Improve data integrity
- Easier access
- Reduced development time
- Can be more vulnerable <!--EndFragment-->
data dictionary
Contains data about each file in the database and each field in those files
DBMS
Database Management System: provides several tools that allow data retrieval and maintenance
- Query language
- Query by example
- Form
- Report generator
query language
Consists of simple, English-like statements that allow users to specify the data to display, print or store
QBE
Query by example: provides a GUI (Graphical User Interface) to assist users with data retrieval
form
A window on the screen that provides areas for entering or modifying data
report generator
Allows users to design a report, retrieve data into the report, and display or print the report
Provides the means to ensure that only authorized users access data at permitted times by:
- Access privileges
- Principle of “least privilege”
A DMBS provides techniques to restore the database in case it is damaged or destroyed:
- Backup
- Log
- Recovery utility
- Continuous backup <!--EndFragment-->
data model
Consists of rules and standards that define how the database organizes data
relational database
Stores data in tables comprising fields and records:
- Each record (row) has a primary key
- Each field (column) has a unique name
relationship
A link between tables
SQL
Structured Query Language: is a query language that allows users to manage, update, and retrieve data
OODB
An object-oriented database: stores data in objects
Examples of applications appropriate for an object-oriented database include:
- Multimedia database
- Groupware database
- Computer-aided design database
- Hypertext database
multidimensional database
Can store data in more than two dimensions of data
- Sometimes known as a hypercube
- Can consolidate data much faster than a relational database
data warehouse
A huge database that stores and manages the data required to analyze historical and current transactions
Databases on the Web allow you to:
- Shop for products or services
- Buy or sell stocks
- Search for a job
- Make airline reservations
- Register for college classes
- Check semester grades
Database Design Guidlines
- Determine the purpose of the database
- Design the tables or files:
- Design tables or files
- Each table or file should contain data about one subject. The student table, for example, contains data about students.
- Design the records and fields for each table or file.
- Be sure every record has a unique primary key
- Use separate fields for logically distinct items.
- Do not create fields for information that can be derived from entries in other fields.
- Allow enough space for each field.
- Set default values for frequently entered data.
- Determine the relationships amoung the tables or files.
DA
Database Analyst: Decides on proper field placement, defines data relationships, and identifies user access privileges
DBA
Database Administrator: Creates and maintains data dictionaries, manages security, monitors performance, and maintains backup and recovery procedures
Employees should learn how …
to effectively use a database:
- Use database tools
- Identify new data for the database
- Maintain the database
System development
A set of activities used to build an information system.<!--EndFragment-->
system
A set of components that interact to achieve a common goal <!--EndFragment-->
IS
Information System: A collection of hardware, software, data, people, and procedures that work together to produce quality information
System development activities are grouped into phases, collectively called:
the system development life cycle (SDLC)
SDLC
system development life cycle
Three general system development guidelines:
- Group activities or tasks into phases
- Involve users
- Define standards
Phases of System Development
- Planning
- Analysis
- Design
- Implementation
- Operation, Support, and Security
- Repeat
The planning phase – four major activities:
- Review and approve project requests
- Prioritize project requests
- Allocate resources
- Form a project development team
Project management
The process of planning, scheduling, and controlling system development activities
Aspects of project management:
- Project scope
- Required activities
- Activity time estimates
- Activity cost estimates
- Order of activities
- Concurrent Activities
Gantt chart
A popular tool used to plan schedule relationships among project activities
Feasibility
A measure of how suitable the development of a system will be to the organization
- Operational feasibility
- Schedule feasibility
- Technical feasibility
- Economic feasibility
analysis phase – two major activities:
- Preliminary investigation
- Determine and define precise nature of the problem/improvement
- Interview the user who submitted the request
- Detailed analysis
- Study current system
- Determine user requirements (wants and needs)
- Recommend solution
During system development, members of the project team gather data and information using several techniques
- Review documentation
- Observe
- Survey
- Interview
- Joint Application Development
- Research
The design phase – two major activities:
- Acquire hardware and software to meet requirements
- Develop the details of the new or modified information system
prototype
A (proof of concept) – a limited, working model of the proposed system
- Prototypes have inadequate or missing documentation
- Users tend to embrace the prototype as a final system
- Prototypes should not eliminate or replace current system activities
Implementation phase
Construct the new or modified system and deliver it. Common steps:
- Develop programs
- Install and test the new system
- Train users
- Convert to the new system
Operation, support, and security phase
Provide ongoing assistance for an Information System and its users after implementation. Common activities:
- Perform maintenance activities
- Monitor system performance
- Assess system security
Enterprise computing
- Comprehensive use of computers in networks (e.g., LANs and WANs)
- Can include a series of interconnected networks
- Involves a variety of operating systems, protocols, and network architectures
Types of enterprises include:
- Retail
- Manufacturing
- Service
- Wholesale
- Government
- Educational
- Transportation
Most Enterprises are ____________ organizations
hierarchical
In an Enterprise, personnel typically fall into one of four categories:
- Executive Management
- Middle Management
- Operational Management
- Non-management Employees
Enterprise information
Information gathered in ongoing operations of an
- Enterprise-sized organization
- Business intelligence
- Business process management
- Business process automation
Managers
Coordinate resources by carrying out four activities:
- Planning
- Organizing
- Leading
- Controlling
Information System
A set of hardware, software, data, people, and procedures that work together to provide information
Enterprise functional units might include:
- Accounting and Finance
- Human Resources
- Engineering or Product
- Manufacturing
- Marketing
- Sales
- Distribution
- Customer Service
- Information Technology
Accounting software
Manages everyday transactions
Billing software
Helps the company reconcile purchases with customer payments
Financial software
Helps managers budget, forecast, and analyze
Human Resources Information System
Manages one or more human resources functions
Employee Relationship Management System
Manages communication between employees and the business
MRP
Material Requirements Planning - Uses software to help monitor and control processes related to production
MRP II
Manufacturing Resource Planning II - is an extension of MRP that includes software to help with scheduling
Distribution Systems
- Provide forecasting for inventory control
- Manage and track shipping
- Provide analysis and information on warehouse inventory
CIM
Customer Interaction Management - software manages day-to-day customer interactions
IT Department
Information Technology department - makes technology decisions for the enterprise:
- Build or buy new Information Systems?
- Has an Information System and its technology outlived useful life?
Web site management programs
Collect data designed to help organizations make informed decisions regarding Web presence
General purpose Information Systems categories:
- Office Information System
- Transaction Processing System
- Management Information System
- Decision Support System
- Expert System
Batch processing vs. real-time online transaction processing
Batch processing can much longer to complete. The process for each is as follows:
- Batch processing
- Reservation requested
- Batch of reservations
- Process complete
- Real-time Online processing
- Reservation requested
- Process complete
Integrated Information Systems
- Customer Relationship Management
- Enterprise Resource Planning
- Content Management Systems
Customer Relationship Management
Manages information about customer interactions, purchases, and interests
Enterprise Resource Planning
Provides centralized, integrated software to help manage and coordinate ongoing activities
Content Management Systems
Combine databases, software, and procedures
portal
A collection of links, content, and services presented on a Web page related to a job
data warehouse
A huge database that stores and manages data required to analyze transactions
Workflow (or Flow Chart)
Identifies related steps involved in completing a project or business process
VPN
A Virtual Private Network - provides a secure connection to a network server
Virtualization
Supports sharing or pooling computing resources:
- Server virtualization
- Storage virtualization
Storage virtualization
Provides capability to create one logical storage device from many physical storage devices
Server virtualization
Provides capability to partition a physical server logically into many virtual servers
Cloud computing
Is an Internet-based service that provides computing services
Grid computing
Combines many networked servers and/or personal computers to act as one computer
SAN
A Storage Area Network - is a high-speed network that provides storage to other servers
An Enterprise Storage System focuses on:
- storage availability
- protection
- organization
- backup
Strategy = consolidate storage
blade server
Packs a complete computer server on a single card or blade rather than a system unit
- Individual blades are inserted in a blade server chassis
thin client
A small terminal-like computer that relies on a server for data storage and processing
high-availability system
Continues running and performing tasks for at least 99 percent of the time
- May include hot-swappable and redundant components
- When a component fails, another component takes over and the system continues to function
Uptime
Refers to working and available systems (vs. downtime)
Is a measurement in time or percentages of how long a system is working and available vs. how long it is down and unavailable.
Scalability
A measure of how well an Information System, or computer hardware and software can grow to meet increasing performance demands or organization expansion requirements
Interoperability
An Information System’s ability to share data and information with other Information Systems within an Enterprise
Type of Backup: Full
Advantages:
- Fastest recovery method.
- All files are saved.
Disadvantages:
- Longest backup time.
Type of Backup: Differential
Advantages:
- Fast backup method.
- Requires minimal storage space to backup.
Disadvantages:
- Recovery is time-consuming becaus the last full backup plus the differential backup are needed.
Type of Backup: Incremental
Advantages:
- Fastest backup method.
- Requires minimal storage space to backup.
- Only most recent changes saved.
Disadvantages:
- Recovery is most time-consuming becaus the last full backup and all differential backup since the last full backup are needed.
Type of Backup: Selective
Advantages:
- Fast backup method.
- Provides great flexibility
Disadvantages:
- Difficult to manage individual file backups.
- Least manageable of all the backup methods..
Type of Backup: Continuous
Advantages:
- The only real-time backup.
- Very fast recovery of data.
Disadvantages:
- Very expensive and requires a great amount of storage.
Disaster Recovery Plan
Describes the steps a company would take to restore computer operations.
Four major Disaster Recovery Plan components:
- Emergency plan
- Backup plan
- Recovery plan
- Test plan
Job opportunities in the computer industry generally are available in one or more of these areas:
- Business and Government IT
- Hardware
- Software
- Service and repair
- Sales
- Education and training
- IT Consulting
Employees in IT:
(Information Technology):
- Work as a team to meet information requirements of their organization.
- Also keep computer operations and networks running
Jobs in IT are usually in six main categories
- Management
- System development and programming
- Technical services
- Operations
- Training
- Security
The hardware and equipment field
Consists of manufacturers and distributors of computers and technology-related hardware
- Careers in this field are available with companies that design, manufacture, and produce computers and devices
The computer software field
Consists of companies that develop, manufacture, and support software
Job titles include:
- Project leader
- Project manager
- Desktop or mobile application programmer/developer
- Technical lead
- Software engineer
- Computer scientist
The service and repair field
- Provides:
- Preventive maintenance
- Component installation
- Repair services
- Requires a knowledge of electronics
Computer salespeople
- Must possess a general understanding of computers and a specific knowledge of the products they are selling.
- Some work for computer equipment and software manufacturers, while others work for retailers.
Corporate trainers
Teach employees how to use software, design and develop systems, write programs, and perform other computer-related activities
An IT consultant
Provides computer services to his or her clients
Preparing for a Career in the Computer Industry -
Three broad disciplines produce the greatest number of entry-level employees
- Computer Information Systems
- Computer Science
- Computer Engineering
Computer information systems
- Programming
- Operating systems
- Systems analysis and design
- Databases
- Networking
- Web development
Computer Science
- Artificial intelligence
- Data communications
- Data and file structures
- Operating systems
- Application and systems programming
- Systems analysis and design
Computer Engineering
- Application and systems programming
- Data and file structures
- Networks
- Operating systems
Tools for keeping up-to-date on industry trends and technologies and develop new skills
- Professional organizations and personal networks
- Professional growth and continuing education
- Computer publications
- Certification
Professional Computer Organizations
Computer professionals with common interests and a desire to extend their proficiency form computer-related professional organizations
user group
A collection of people with common interests in hardware or software
- Groups can be an effective and rewarding way to learn about and continue career development
Conferences, conventions, and trade shows
Are a great way to stay aware of new products and services. Example:
- International Consumer Electronics Show (CES)
Certification
Is the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area
Computer certifications are available in these areas:
- Application software
- Operating systems
- Programming
- Hardware
- Networking
- Digital forensics
- Security
- The Internet
- Database systems
The World Wide Web has changed the way that people
- Do business
- Communicate
- Share information
The Web has evolved from:
A collection of Web sites to supporting Web applications
Web 2.0 is characterized by
interactive applications
Newer Web sites provide users with a rich browsing experience
- Customizable layout
- Bold graphics
- Tabs
- Additional services
Web 2.0 is the result of several developments:
- Connectivity almost everywhere
- Mobile phones capable of accessing the Web
- Web-based applications available for many devices
- Web developers deploy new versions of software applications with no required user involvement
- Society has embraced technological changes
Online conversations
- Blogs
- Wikis
- Sharing media
- Collaboration
Web 2.0 is often referred to as:
A read/write Web, or a Database-backed Web
- Web applications read from or write to a database
A Web server
Processes requests for Web pages sent over the Internet from a Web client
- Known as Client-Server model
Web 2.0 utilizes
Applications that connect people and technologies that link data
The Internet makes it possible to:
Access information from any Internet-connected device
- Web-based tools for collaboration
- Web applications
- Other technologies for sharing information
Cloud computing
Describes how applications are stored and deployed on a network of Internet servers
- Cloud requires the Internet
Cloud computing service providers offer:
Server space and applications
- Companies such as Google, Amazon, Microsoft, and Salesforce provide Cloud servers for individuals and businesses
Cloud computing includes various Services – some examples are:
- Infrastructure as a Service (IaaS)
- Internet delivery of a networked computing structure
- Platform as a Service (PaaS)
- Delivery of a computing platform over the Internet
- Software as a Service (SaaS)
- Delivery of software applications over the Internet
Infrastructure as a Service (IaaS)
Internet delivery of a networked computing structure
Platform as a Service (PaaS)
Delivery of a computing platform over the Internet
Software as a Service (SaaS)
Delivery of software applications over the Internet
Cloud Categories
- Public Cloud
- Hybrid Cloud
- Private Cloud
- Many Cloud storage providers offer limited storage for free, and charge an additional fee for more storage
Using virtualization, one host machine can:
Operate as if it were several smaller servers
Mashups
- Are Web applications that combine content or data from multiple online sources
- Content is continuously updated
- Content is sourced from RSS Feeds and Web services
Web 3.0
- Is the term that describes emerging trends that link information in new way
- Agents can make decisions and take actions based on a user preferences
- Many describe Web 3.0 as the rise of the “Semantic Web”
- Intelligent software tools can read Web pages and discern useful information from them
- A Web of data
Reverse?
A process in which two or more computers or devices transfer data, instructions, and information.
- Sending device → Communications channel → Receiving device
Computer communications
Reverse?
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
computer security risk
Reverse?
A Network or Internet-based illegal act
cybercrime
Reverse?
- Internet and network attacks
- unauthorized access and use
- hardware theft (stealing a thumb drive or hard drive)
- system failure (lightning strike)
- infromation theft (stollen identity)
- software theft (illegal copy)
Computer Security Risks
Reverse?
Has a higher degree of security risk than data kept on an organization’s premises
Data transmitted over networks
Reverse?
A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
online security service
Reverse?
Affects a computer negatively by altering the way the computer works <!--EndFragment-->
Virus
Reverse?
Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->
Worm
Reverse?
A malicious program that hides within or looks like a legitimate program <!--EndFragment-->
Trojan Horse
Reverse?
Program that hides, creating a “back door” for a remote location to take full control of the computer.
Rootkit
Reverse?
- Runs much slower than usual
- Available memory is less than expected
- Files become corrupted
- Screen displays unusual message or image
- Music or unusual sounds play randomly
- Existing programs and files disappear
- Programs or files do not work properly
- Unknown programs or files mysteriously appear
- System properties change
- Operating system does not boot (start up)
- Operating system shuts down unexpectedly
Symptoms of an infected computer include:
Reverse?
- Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
- Never open an email attachment unless you are expecting it and it is from a trusted source.
- Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
- Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
- Scan all downloaded programs for viruses and other maleware.
- If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
- Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
- Install a personal firewall program.
- Stay informed about new virus alerts and virus hoaxes.
Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:
Reverse?
A group of compromised computers connected to a network
A compromised computer is known as a zombie
botnet
Reverse?
A denial of service attack: disrupts computer access to Internet services
Distributed DoS (DDoS)
DoS attack
Reverse?
A program or set of instructions in a program that allows remote attackers to bypass security controls
back door
Reverse?
A technique intruders use to make their network or Internet transmission appear legitimate.
Spoofing
Reverse?
Hardware and/or software that protects computers and networks from intrusion
firewall
Reverse?
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system breaches
Intrusion detection software
Reverse?
Vulnerable computer that is set up to entice an intruder to break into it
Honeypot
Reverse?
The use of a computer or network without permission <!--EndFragment-->
Unauthorized access
Reverse?
The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->
Unauthorized use
Reverse?
- Acceptable use policy
- Disable file and printer sharing
- Firewalls
- Intrusion detection software
The measures organizations take to help prevent unauthorized access and use:
Define who can access a computer, when they can access it, and what actions they can take:
- Two-phase processes called identification and authentication
- User name
- Password
- Passphrase
- CAPTCHA
Access controls
Reverse?
- Any item that you must carry to gain access to a computer or computer facility.
- Often are used in combination with a personal identification number (PIN)
possessed object
Reverse?
Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
biometric device
Reverse?
The discovery, collection, and analysis of evidence found on computers and networks
Digital forensics
Reverse?
- Law enforcement
- Criminal prosecutors
- Civil lawsuits, discovery
- Military intelligence
- Insurance agencies
- Information security departments
Areas that use digital forensics
Reverse?
The act of stealing computer equipment <!--EndFragment-->
Hardware theft
Reverse?
The <!--StartFragment--> act of defacing or destroying computer equipment <!--EndFragment-->
Hardware vandalism
Reverse?
- Steals software media
- Intentionally erases programs
- Illegally copies a program
- Illegally registers and/or activates a program
- Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
Software theft occurs when someone:
Reverse?
An End User License Agreement typically contains the following conditions:
- Permitted to…
- Install the software on a certain number of computers (usually one)
- Make one copy of the software
- Remove the software from your computer before giving it away or selling it
- Not permitted to…
- Install the software on a network
- Give copies to friends or colleagues while continuing to use the software
- Export the software
- Rent or lease the software
EULA
Reverse?
Occurs when someone steals personal or confidential information
Information theft
Reverse?
A process of converting readable data into unreadable characters to prevent unauthorized access
- Transposition
- Substitution
- Expansion
- Compaction
Encryption
Reverse?
Switch the order of characters
Transposition
Reverse?
Replace characters with other character
Substitution
Reverse?
Insert characters between existing characters
Expansion
Reverse?
Remove characters and store elsewhere
Compaction
Reverse?
- The sender creates a document to be email to the receiver.
- The sender uses the receiver’s public key to encrypt the message.
- The receiver uses his or her private key to decrypt the message.
- The receiver can read or print the message.
Public Key Encryption
Reverse?
An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Often used to ensure that an impostor is not participating in an Internet transaction
digital signature
Reverse?
encryption
Web browsers and Web sites use ________ techniques
Reverse?
- Digital Certificates
- Transport Layer Security (TLS)
- Secure HTTP
- VPN (Virtual Private Network)
Popular security techniques include:
Reverse?
The prolonged malfunction of a computer
system failure
Reverse?
- Aging hardware
- Natural disasters
- Electrical power problems
- Noise, undervoltages, and overvoltages
- Errors in computer programs
A variety of factors can lead to system failure, including:
Reverse?
- surge protectors
- uninterruptable power supplies (UPS)
Two ways to protect from system failures caused by electrical power variations include ___________ and ____________.
Reverse?
Is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
To back up a file means to make a copy of it
backup
Reverse?
Backups are stored in a location separate from the computer site
- Cloud Storage
Offsite backups
Reverse?
Grandparent → Parent → Child
Three-generation backup policy
Reverse?
- Full backup
- Selective backup
- Differential
- Incremental
Two backup categories:
Reverse?
Wireless access poses additional security risks
About 80 percent of wireless networks have no security protection (“unsecured wireless network”)
“War driving” allows individuals to detect wireless networks while driving through an area
Wireless Security
Reverse?
- Change the default SSID (Service Set Identifier)
- A wireless access point should not broadcast an SSID
- Configure WAP so only certain devices can access (e.g., MAC address configuration)
- Use WPA or WPA2 security standards •(do not use WEP)
In additional to using firewalls, some safeguards improve security of wireless networks
Reverse?
The widespread use of computers has led to health concerns
- Repetitive strain injury (RSI)
- Tendonitis
- Carpal tunnel syndrome (CTS)
- Computer vision syndrome (CVS)
Health Concerns of Computer Use
Reverse?
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
Reverse?
Occurs when the computer consumes someone’s social life. Symptoms include:
- Craves computer time
- Overjoyed when at the computer
- Unable to stop computer activity
- Irritable when not at the computer
- Neglects family and friends
- Problems at work or school
Computer addiction
Reverse?
Are moral guidelines that govern the use of computers and information systems
Information accuracy is a concern
Not all information on the Web is correct!
Computer ethics
Reverse?
Are the rights to which creators are entitled for their work <!--EndFragment-->
A copyright protects any tangible form of expression
Intellectual property rights
Reverse?
Is written guidelines that help determine whether a specific computer action is ethical or unethical <!--EndFragment-->
IT code of conduct
Reverse?
- Computers may not be used to harm other people.
- Employees may not interfere with others’ computer work.
- Employees may not meddle in others’ computer files.
- Computers may not be used to steal.
- Computers may not be used to bear false witness.
- Employees may not copy or use software illegally.
- Employees may not use others’ computer resources without authorization.
- Employees may not use others’ intellectual property as their own.
- Employees shall consider the social impact of programs and systems they design.
- Employees always should use coputers in a way that demonstrates consideration and respect for fellow humans.
IT Code of Conduct
Reverse?
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
- Huge databases store data online
- It is important to safeguard your information
Information privacy
Reverse?
A small text file that a Web server stores on your computer
cookie
Reverse?
- Personalization of the experience
- Store passwords
- Assist with online shopping
- Track site visits
- Target advertisements
Web sites use cookies for many reasons, including:
Reverse?
An unsolicited e-mail message or newsgroup posting
Spam
Reverse?
Blocks e-mail messages from designated sources
E-mail filtering
Reverse?
Attempt to remove spam before it reaches your inbox
Anti-spam programs
Reverse?
A scam that sends an official-looking e-mail that attempts to obtain your personal and financial information
Phishing
Reverse?
A scam that attempts to obtain your personal and financial information via spoofing
Pharming
Reverse?
Limits the right to view a credit report to those with legitimate business needs
The 1970 Fair Credit Reporting Act
Reverse?
Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naiveté <!--EndFragment-->
Social engineering
Reverse?
Uses computers to observe, record, and review employees’ computer use during work on on breaks (if using an employer’s computer) <!--EndFragment-->
Employee monitoring
Reverse?
The process of restricting access to certain material on the Web
Many businesses use content filtering
Internet Content Rating Association (ICRA)
Content filtering
Reverse?
Restricts access to specified Web sites
Web filtering software
Reverse?
The discovery, collection, analysis, and reporting of evidence found on computers and digital devices
- Focuses on computers, digital devices, and networks
- Digital evidence exists on a variety of computers
- The forensic analysis of computers and digital devices specifically involves the examination of media, programs, and data and log files
- Fastest growing discipline in the forensics field
- Also referred to as computer forensics, network forensics, or cyberforensics
Digital forensics
Reverse?
- Knowledge of the law
- Technical experience with many types of hardware and software products
- Superior communication skills
- Familiarity with corporate structures and policies
- A willingness to learn and update skills
- A knack for problem solving
Digital forensics examiners must have:
Reverse?
- Law enforcement
- Homeland security
- Businesses and other private sector organizations
Digital forensics covers several overlapping areas:
Reverse?
- Step 1: Gather materials to analyze
- Computer media
- Computers and peripherals
- GPS receivers
- Network hardware
- Computer software
- Step 2: Transport the materials
- Step 3: Preserve the media
- Step 4: Extract evidence
- Step 5: Analyze evidence
- Analyze mobile devices
- Analyze chat room logs
- Analyze browser history logs
- Step 6: Document results
Digital Forensics in Action: Identity Theft
Steps
Reverse?
A digital forensics examiner might use the following techniques to locate the attacker and/or the computer network facilitating the attacks:
- Analyze network traffic
- Track packet routes
- Analyze Internet access provider logs
- Analyze a packet trace
Digital Forensics in Action: Spam Attacks
Reverse?
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
computer security risk
Reverse?
Network or Internet-based illegal act.
cybercrime
Reverse?
- Hackers
- Crackers
- Script Kiddies
- Corporate Spies
- Unethical Employees
- Cyberextortionists
- Cyberterrorists
Names for Different Types of Cyber-Criminals
Reverse?
A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
online security service
Reverse?
They allow people to connect wirelessly to the Internet from home, work, school, and in many public locations
Wireless Internet access points
Reverse?
Global Positioning System: is a navigation system comprising one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the GPS receiver’s geographic location
GPS receivers are:
- Built into many mobile devices (like your phone so the police can find you when you call 911 for help)
- Available as a handheld device
- Available with motor vehicles
GPS
Reverse?
Many programs provide a means to ___________, or work together online, with others connected to a server
collaborate
Reverse?
… enable users to share documents via online meetings and communicate with other connected users. Examples:
- Online meetings
- Web conferences
- Document management systems
Collaboration software includes tools that:
Reverse?
… create applications that communicate with other remote computers over the Internet or on an internal business network
Web services enable programmers to:
Reverse?
A Web application that combines services from two or more sources
mashup
Reverse?
A collection of computers and devices connected via communication devices and transmission media
network
Reverse?
- Facilitate communications
- Share hardware
- Share data
- Share software
- Transfer funds
Network Advantages:
Reverse?
A Local Area Network: connects computers and devices in a limited geographical area
LAN
Reverse?
A Wireless LAN: is a LAN that uses no physical connections
WLAN
Reverse?
A Metropolitan Area Network: connects LANs in a metropolitan area
MAN
Reverse?
A Wide Area Network: covers a large geographical area
WAN
Reverse?
The design of computers, devices, and media on a network
network architecture
Reverse?
An Internet network on which users access each other’s hard disks and exchange files
P2P
Reverse?
Refers to the layout of the computers and devices in a network:
- Star Network
- Bus Network
Network Topology
Reverse?
An internal network that uses Internet technologies <!--EndFragment-->
Intranet
Reverse?
Allows customers or suppliers to access part of its Intranet
Extranet
Reverse?
- Ethernet
- TCP/IP
- Wi-Fi
- Bluetooth
Network Communications Standards
Reverse?
A network standard that specifies no computer controls when data can be transmitted <!--EndFragment-->
Ethernet
Reverse?
A network standard that defines how messages are routed within a network <!--EndFragment-->
TCP/IP
Reverse?
Identifies any network based on the 802.11 standard that facilitates wireless communication.
- Newest is 802.11ac (1 Gbps and higher)
- Sometimes referred to as Wireless Ethernet
Wi-Fi
Reverse?
Defines how two Bluetooth devices use short-range radio waves to transmit data.
Bluetooth
Reverse?
Uses radio signals to communicate with a tag placed in or attached to an object, animal, or person
RFID
Reverse?
- Helps users establish a connection to another computer or network
- Manages the transmission of data, instructions, and information
- Provides an interface for users to communicate with one another
Communications software:
Reverse?
Any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
communications device
Reverse?
Sends and receives data and information to and from a digital line. Examples:
- DSL modem
- Cable modem
digital modem
Reverse?
A Network Interface Card enables a computer or device to access a network.
- Available in a variety of form factors
- Wireless network cards often have an antenna
NIC
Reverse?
A Wireless Access Point is a central communications device that allows computers and devices to transfer data wirelessly or to a wired network
WAP
Reverse?
Connects multiple computers or other routers and transmits data to its correct destination
- Many routers are protected by a hardware firewall
router
Reverse?
connects several devices
hub or switch
Reverse?
- •\Connecting to the Internet at the same time
- Sharing a single high-speed Internet connection
- Accessing files and programs on other computers
- Sharing peripherals
- Playing multiplayer games
- Connecting game consoles to the Internet
- Using VoIP
Capabilities of home networks include:
Reverse?
- Ethernet
- Powerline cable
- Phoneline
Types of wired home networks:
Reverse?
The amount of data that can travel over a communications channel
Bandwidth
Reverse?
The time it takes a signal to travel from one location to another
Latency
Reverse?
Carry one or more signals
Transmission media
Reverse?
Transmit multiple signals simultaneously
Broadband media
Reverse?
- Twisted-pair cable
- Coaxial cable
- Fiber-optic cable
Physical Transmission Media
Reverse?
A form of broadcast radio that is used widely for mobile communications
Cellular radio
Reverse?
Receives microwave signals from earth, amplifies them, and broadcasts the signals over a wide area
communications satellite
Reverse?
Collection of data organized in a manner that allows access, retrieval, and use of that data <!--EndFragment-->
Database
Reverse?
Collection of unprocessed items:
- Text
- Numbers
- Images
- Audio
- Video <!--EndFragment-->
Data
Reverse?
Processed data:
- Documents
- Reports
- Audio
- Images
- Video <!--EndFragment-->
Information
Reverse?
Often called a database management system (DBMS), allows users to:
- Create a database
- Input, modify, and delete data
- Sort and retrieve (extract) data
- Create forms and reports
Database software
Reverse?
Refers to the quality of the data
Data integrity
Reverse?
Garbage in, garbage out points out that the accuracy of a computer’s output depends on the accuracy of the input
GIGO
Reverse?
- Accurate
- Verifiable
- Timely
- Organized
- Accessible
- Useful
- Cost-effective
Useful data and information should have the following characteristics:
Reverse?
Data is organized in layers:
- File
- Tables/queries/reports
- records
- fields
- characters
The Hierarchy of Data
Reverse?
one byte:
- Number
- letter
- space
- punctuation mark
- symbol
character
Reverse?
A combination of one or more related characters:
- Field name
- Field size
- Data type
field
Reverse?
- Text (2013: Short Text)
- Numeric
- AutoNumber
- Currency
- Date
- Memo (2013: Long Text)
- Yes/No
- Hyperlink
- Object
- Attachment
Common data types
Reverse?
A group of related fields
record
Reverse?
Uniquely identifies each record
primary key
Reverse?
A collection of related records
table (data file)
Reverse?
Refers to the procedures that keep data current:
- Adding records
- Modifying records
- Deleting records
Table maintenance
Reverse?
- Users add new records to tables when they obtain new data
- Users modify records to correct inaccurate data or update old date
- When a record no longer is needed, a user deletes it from a table
Maintaining Data
Reverse?
Compares data with a set of rules or values to verify accuracy:
- Alphabetic/Numeric check
- Range check
- Consistency check
- Completeness check
- Check digit
- Other checks
Data Validation
Reverse?
- Each department has its own set of files
- Used for many years
- Have data redundancy
- Isolate data
- Some use Excel for complex lists (not a “database”) <!--EndFragment-->
File processing approach
Reverse?
- Programs and users share data
- Reduce data redundancy
- Improve data integrity
- Easier access
- Reduced development time
- Can be more vulnerable <!--EndFragment-->
Database approach
Reverse?
Contains data about each file in the database and each field in those files
data dictionary
Reverse?
Database Management System: provides several tools that allow data retrieval and maintenance
- Query language
- Query by example
- Form
- Report generator
DBMS
Reverse?
Consists of simple, English-like statements that allow users to specify the data to display, print or store
query language
Reverse?
Query by example: provides a GUI (Graphical User Interface) to assist users with data retrieval
QBE
Reverse?
A window on the screen that provides areas for entering or modifying data
form
Reverse?
Allows users to design a report, retrieve data into the report, and display or print the report
report generator
Reverse?
- Access privileges
- Principle of “least privilege”
Provides the means to ensure that only authorized users access data at permitted times by:
Reverse?
- Backup
- Log
- Recovery utility
- Continuous backup <!--EndFragment-->
A DMBS provides techniques to restore the database in case it is damaged or destroyed:
Reverse?
Consists of rules and standards that define how the database organizes data
data model
Reverse?
Stores data in tables comprising fields and records:
- Each record (row) has a primary key
- Each field (column) has a unique name
relational database
Reverse?
A link between tables
relationship
Reverse?
Structured Query Language: is a query language that allows users to manage, update, and retrieve data
SQL
Reverse?
An object-oriented database: stores data in objects
Examples of applications appropriate for an object-oriented database include:
- Multimedia database
- Groupware database
- Computer-aided design database
- Hypertext database
OODB
Reverse?
Can store data in more than two dimensions of data
- Sometimes known as a hypercube
- Can consolidate data much faster than a relational database
multidimensional database
Reverse?
A huge database that stores and manages the data required to analyze historical and current transactions
data warehouse
Reverse?
- Shop for products or services
- Buy or sell stocks
- Search for a job
- Make airline reservations
- Register for college classes
- Check semester grades
Databases on the Web allow you to:
Reverse?
- Determine the purpose of the database
- Design the tables or files:
- Design tables or files
- Each table or file should contain data about one subject. The student table, for example, contains data about students.
- Design the records and fields for each table or file.
- Be sure every record has a unique primary key
- Use separate fields for logically distinct items.
- Do not create fields for information that can be derived from entries in other fields.
- Allow enough space for each field.
- Set default values for frequently entered data.
- Determine the relationships amoung the tables or files.
Database Design Guidlines
Reverse?
Database Analyst: Decides on proper field placement, defines data relationships, and identifies user access privileges
DA
Reverse?
Database Administrator: Creates and maintains data dictionaries, manages security, monitors performance, and maintains backup and recovery procedures
DBA
Reverse?
to effectively use a database:
- Use database tools
- Identify new data for the database
- Maintain the database
Employees should learn how …
Reverse?
A set of activities used to build an information system.<!--EndFragment-->
System development
Reverse?
A set of components that interact to achieve a common goal <!--EndFragment-->
system
Reverse?
Information System: A collection of hardware, software, data, people, and procedures that work together to produce quality information
IS
Reverse?
the system development life cycle (SDLC)
System development activities are grouped into phases, collectively called:
Reverse?
system development life cycle
SDLC
Reverse?
- Group activities or tasks into phases
- Involve users
- Define standards
Three general system development guidelines:
Reverse?
- Planning
- Analysis
- Design
- Implementation
- Operation, Support, and Security
- Repeat
Phases of System Development
Reverse?
- Review and approve project requests
- Prioritize project requests
- Allocate resources
- Form a project development team
The planning phase – four major activities:
Reverse?
The process of planning, scheduling, and controlling system development activities
Project management
Reverse?
- Project scope
- Required activities
- Activity time estimates
- Activity cost estimates
- Order of activities
- Concurrent Activities
Aspects of project management:
Reverse?
A popular tool used to plan schedule relationships among project activities
Gantt chart
Reverse?
A measure of how suitable the development of a system will be to the organization
- Operational feasibility
- Schedule feasibility
- Technical feasibility
- Economic feasibility
Feasibility
Reverse?
- Preliminary investigation
- Determine and define precise nature of the problem/improvement
- Interview the user who submitted the request
- Detailed analysis
- Study current system
- Determine user requirements (wants and needs)
- Recommend solution
analysis phase – two major activities:
Reverse?
- Review documentation
- Observe
- Survey
- Interview
- Joint Application Development
- Research
During system development, members of the project team gather data and information using several techniques
Reverse?
- Acquire hardware and software to meet requirements
- Develop the details of the new or modified information system
The design phase – two major activities:
Reverse?
A (proof of concept) – a limited, working model of the proposed system
- Prototypes have inadequate or missing documentation
- Users tend to embrace the prototype as a final system
- Prototypes should not eliminate or replace current system activities
prototype
Reverse?
Construct the new or modified system and deliver it. Common steps:
- Develop programs
- Install and test the new system
- Train users
- Convert to the new system
Implementation phase
Reverse?
Provide ongoing assistance for an Information System and its users after implementation. Common activities:
- Perform maintenance activities
- Monitor system performance
- Assess system security
Operation, support, and security phase
Reverse?
- Comprehensive use of computers in networks (e.g., LANs and WANs)
- Can include a series of interconnected networks
- Involves a variety of operating systems, protocols, and network architectures
Enterprise computing
Reverse?
- Retail
- Manufacturing
- Service
- Wholesale
- Government
- Educational
- Transportation
Types of enterprises include:
Reverse?
hierarchical
Most Enterprises are ____________ organizations
Reverse?
- Executive Management
- Middle Management
- Operational Management
- Non-management Employees
In an Enterprise, personnel typically fall into one of four categories:
Reverse?
Information gathered in ongoing operations of an
- Enterprise-sized organization
- Business intelligence
- Business process management
- Business process automation
Enterprise information
Reverse?
Coordinate resources by carrying out four activities:
- Planning
- Organizing
- Leading
- Controlling
Managers
Reverse?
A set of hardware, software, data, people, and procedures that work together to provide information
Information System
Reverse?
- Accounting and Finance
- Human Resources
- Engineering or Product
- Manufacturing
- Marketing
- Sales
- Distribution
- Customer Service
- Information Technology
Enterprise functional units might include:
Reverse?
Manages everyday transactions
Accounting software
Reverse?
Helps the company reconcile purchases with customer payments
Billing software
Reverse?
Helps managers budget, forecast, and analyze
Financial software
Reverse?
Manages one or more human resources functions
Human Resources Information System
Reverse?
Manages communication between employees and the business
Employee Relationship Management System
Reverse?
Material Requirements Planning - Uses software to help monitor and control processes related to production
MRP
Reverse?
Manufacturing Resource Planning II - is an extension of MRP that includes software to help with scheduling
MRP II
Reverse?
- Provide forecasting for inventory control
- Manage and track shipping
- Provide analysis and information on warehouse inventory
Distribution Systems
Reverse?
Customer Interaction Management - software manages day-to-day customer interactions
CIM
Reverse?
Information Technology department - makes technology decisions for the enterprise:
- Build or buy new Information Systems?
- Has an Information System and its technology outlived useful life?
IT Department
Reverse?
Collect data designed to help organizations make informed decisions regarding Web presence
Web site management programs
Reverse?
- Office Information System
- Transaction Processing System
- Management Information System
- Decision Support System
- Expert System
General purpose Information Systems categories:
Reverse?
Batch processing can much longer to complete. The process for each is as follows:
- Batch processing
- Reservation requested
- Batch of reservations
- Process complete
- Real-time Online processing
- Reservation requested
- Process complete
Batch processing vs. real-time online transaction processing
Reverse?
- Customer Relationship Management
- Enterprise Resource Planning
- Content Management Systems
Integrated Information Systems
Reverse?
Manages information about customer interactions, purchases, and interests
Customer Relationship Management
Reverse?
Provides centralized, integrated software to help manage and coordinate ongoing activities
Enterprise Resource Planning
Reverse?
Combine databases, software, and procedures
Content Management Systems
Reverse?
A collection of links, content, and services presented on a Web page related to a job
portal
Reverse?
A huge database that stores and manages data required to analyze transactions
data warehouse
Reverse?
Identifies related steps involved in completing a project or business process
Workflow (or Flow Chart)
Reverse?
A Virtual Private Network - provides a secure connection to a network server
VPN
Reverse?
Supports sharing or pooling computing resources:
- Server virtualization
- Storage virtualization
Virtualization
Reverse?
Provides capability to create one logical storage device from many physical storage devices
Storage virtualization
Reverse?
Provides capability to partition a physical server logically into many virtual servers
Server virtualization
Reverse?
Is an Internet-based service that provides computing services
Cloud computing
Reverse?
Combines many networked servers and/or personal computers to act as one computer
Grid computing
Reverse?
A Storage Area Network - is a high-speed network that provides storage to other servers
SAN
Reverse?
- storage availability
- protection
- organization
- backup
Strategy = consolidate storage
An Enterprise Storage System focuses on:
Reverse?
Packs a complete computer server on a single card or blade rather than a system unit
- Individual blades are inserted in a blade server chassis
blade server
Reverse?
A small terminal-like computer that relies on a server for data storage and processing
thin client
Reverse?
Continues running and performing tasks for at least 99 percent of the time
- May include hot-swappable and redundant components
- When a component fails, another component takes over and the system continues to function
high-availability system
Reverse?
Refers to working and available systems (vs. downtime)
Is a measurement in time or percentages of how long a system is working and available vs. how long it is down and unavailable.
Uptime
Reverse?
A measure of how well an Information System, or computer hardware and software can grow to meet increasing performance demands or organization expansion requirements
Scalability
Reverse?
An Information System’s ability to share data and information with other Information Systems within an Enterprise
Interoperability
Reverse?
Advantages:
- Fastest recovery method.
- All files are saved.
Disadvantages:
- Longest backup time.
Type of Backup: Full
Reverse?
Advantages:
- Fast backup method.
- Requires minimal storage space to backup.
Disadvantages:
- Recovery is time-consuming becaus the last full backup plus the differential backup are needed.
Type of Backup: Differential
Reverse?
Advantages:
- Fastest backup method.
- Requires minimal storage space to backup.
- Only most recent changes saved.
Disadvantages:
- Recovery is most time-consuming becaus the last full backup and all differential backup since the last full backup are needed.
Type of Backup: Incremental
Reverse?
Advantages:
- Fast backup method.
- Provides great flexibility
Disadvantages:
- Difficult to manage individual file backups.
- Least manageable of all the backup methods..
Type of Backup: Selective
Reverse?
Advantages:
- The only real-time backup.
- Very fast recovery of data.
Disadvantages:
- Very expensive and requires a great amount of storage.
Type of Backup: Continuous
Reverse?
Describes the steps a company would take to restore computer operations.
Disaster Recovery Plan
Reverse?
- Emergency plan
- Backup plan
- Recovery plan
- Test plan
Four major Disaster Recovery Plan components:
Reverse?
- Business and Government IT
- Hardware
- Software
- Service and repair
- Sales
- Education and training
- IT Consulting
Job opportunities in the computer industry generally are available in one or more of these areas:
Reverse?
(Information Technology):
- Work as a team to meet information requirements of their organization.
- Also keep computer operations and networks running
Employees in IT:
Reverse?
- Management
- System development and programming
- Technical services
- Operations
- Training
- Security
Jobs in IT are usually in six main categories
Reverse?
Consists of manufacturers and distributors of computers and technology-related hardware
- Careers in this field are available with companies that design, manufacture, and produce computers and devices
The hardware and equipment field
Reverse?
Consists of companies that develop, manufacture, and support software
Job titles include:
- Project leader
- Project manager
- Desktop or mobile application programmer/developer
- Technical lead
- Software engineer
- Computer scientist
The computer software field
Reverse?
- Provides:
- Preventive maintenance
- Component installation
- Repair services
- Requires a knowledge of electronics
The service and repair field
Reverse?
- Must possess a general understanding of computers and a specific knowledge of the products they are selling.
- Some work for computer equipment and software manufacturers, while others work for retailers.
Computer salespeople
Reverse?
Teach employees how to use software, design and develop systems, write programs, and perform other computer-related activities
Corporate trainers
Reverse?
Provides computer services to his or her clients
An IT consultant
Reverse?
- Computer Information Systems
- Computer Science
- Computer Engineering
Preparing for a Career in the Computer Industry -
Three broad disciplines produce the greatest number of entry-level employees
Reverse?
- Programming
- Operating systems
- Systems analysis and design
- Databases
- Networking
- Web development
Computer information systems
Reverse?
- Artificial intelligence
- Data communications
- Data and file structures
- Operating systems
- Application and systems programming
- Systems analysis and design
Computer Science
Reverse?
- Application and systems programming
- Data and file structures
- Networks
- Operating systems
Computer Engineering
Reverse?
- Professional organizations and personal networks
- Professional growth and continuing education
- Computer publications
- Certification
Tools for keeping up-to-date on industry trends and technologies and develop new skills
Reverse?
Computer professionals with common interests and a desire to extend their proficiency form computer-related professional organizations
Professional Computer Organizations
Reverse?
A collection of people with common interests in hardware or software
- Groups can be an effective and rewarding way to learn about and continue career development
user group
Reverse?
Are a great way to stay aware of new products and services. Example:
- International Consumer Electronics Show (CES)
Conferences, conventions, and trade shows
Reverse?
Is the process of verifying the technical knowledge of an individual who has demonstrated competence in a particular area
Certification
Reverse?
- Application software
- Operating systems
- Programming
- Hardware
- Networking
- Digital forensics
- Security
- The Internet
- Database systems
Computer certifications are available in these areas:
Reverse?
- Do business
- Communicate
- Share information
The World Wide Web has changed the way that people
Reverse?
A collection of Web sites to supporting Web applications
The Web has evolved from:
Reverse?
interactive applications
Web 2.0 is characterized by
Reverse?
- Customizable layout
- Bold graphics
- Tabs
- Additional services
Newer Web sites provide users with a rich browsing experience
Reverse?
- Connectivity almost everywhere
- Mobile phones capable of accessing the Web
- Web-based applications available for many devices
- Web developers deploy new versions of software applications with no required user involvement
- Society has embraced technological changes
Web 2.0 is the result of several developments:
Reverse?
- Blogs
- Wikis
- Sharing media
- Collaboration
Online conversations
Reverse?
A read/write Web, or a Database-backed Web
- Web applications read from or write to a database
Web 2.0 is often referred to as:
Reverse?
Processes requests for Web pages sent over the Internet from a Web client
- Known as Client-Server model
A Web server
Reverse?
Applications that connect people and technologies that link data
Web 2.0 utilizes
Reverse?
Access information from any Internet-connected device
- Web-based tools for collaboration
- Web applications
- Other technologies for sharing information
The Internet makes it possible to:
Reverse?
Describes how applications are stored and deployed on a network of Internet servers
- Cloud requires the Internet
Cloud computing
Reverse?
Server space and applications
- Companies such as Google, Amazon, Microsoft, and Salesforce provide Cloud servers for individuals and businesses
Cloud computing service providers offer:
Reverse?
- Infrastructure as a Service (IaaS)
- Internet delivery of a networked computing structure
- Platform as a Service (PaaS)
- Delivery of a computing platform over the Internet
- Software as a Service (SaaS)
- Delivery of software applications over the Internet
Cloud computing includes various Services – some examples are:
Reverse?
Internet delivery of a networked computing structure
Infrastructure as a Service (IaaS)
Reverse?
Delivery of a computing platform over the Internet
Platform as a Service (PaaS)
Reverse?
Delivery of software applications over the Internet
Software as a Service (SaaS)
Reverse?
- Public Cloud
- Hybrid Cloud
- Private Cloud
- Many Cloud storage providers offer limited storage for free, and charge an additional fee for more storage
Cloud Categories
Reverse?
Operate as if it were several smaller servers
Using virtualization, one host machine can:
Reverse?
- Are Web applications that combine content or data from multiple online sources
- Content is continuously updated
- Content is sourced from RSS Feeds and Web services
Mashups
Reverse?
- Is the term that describes emerging trends that link information in new way
- Agents can make decisions and take actions based on a user preferences
- Many describe Web 3.0 as the rise of the “Semantic Web”
- Intelligent software tools can read Web pages and discern useful information from them
- A Web of data
Web 3.0