Wednesday, August 17, 2011

                                                  Quiz 8:

1. Define the term, database, and explain how a database interacts with data
and information.

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

5. Differentiate between a file processing approach and the database
approach.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.

7. Explain how to access Web databases.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use


                                        ANSWER:

1.Database is an organized collection of data for one or more purposes, usually in digital form.

2.

3.Character- a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol such as in an alphabet or syllabary in the written form of a natural language.

Field-is an open-source software project initiated by OpenEnded Group, for the creation of their digital artworks.

Record- any document or other source of information compiled, recorded or stored in written form or on film, or by electronic process, or in any other manner or by any other means.

File- is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.


4. Data Dictionary- is acentralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.

File Retrieval- is the retrieval of inaccessible or contaminated data from media that has been damaged in some way.

Data Security- is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled.


Backup- is making copies of data which may be used to restore the original after a data loss event.

Recovery- restoration to a former or better condition.

5. Database Approach:
  • Self contained nature of database systems (database contains both data and meta-data).
  • Data Independence: application programs and queries are independent of how data is actually stored.
  • Data sharing.
  • Controlling redundancies and inconsistencies.
  • Secure access to database; Restricting unauthorized access.
  • Enforcing Integrity Constraints.
  • Backup and Recovery from system crashes.
  • Support for multiple-users and concurrent access.
File Processing Approach- these are basically text files that are stored on your server that you can use to store your data, change, manipulate and generally use how you want.

6. Relational Database- matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand.

Object-oriented databases store objects rather than data such as integers, strings or real numbers.

Multi-Dimensional Database- is a database which has been constructed with the multiple dimensions pre-filled in hyper dimensional “cubes” of data rather than the traditional two dimensional tables of Relational Databases.

7.


8. Computer Security Risk- a risk is a vulnerability that could allow loss of confidentiality, integrity, or availability of computer services and where there is a possibility of the vulnerability being exploited.

hacker- a person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

cracker- is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.

script kiddie- an inexperienced and unskilled "hacker" who attempts to infiltrate or disrupt computer systems by running pre-fabricated scripts designed to crack those systems.

corporate spy- "competitive intelligence professionals."

Unethical Employee-can take many forms, ranging from theft to disclosure of confidential information to the misrepresentation of products and services.

cyberextortionist-is an individual or group who uses email as an offensive force.


9.Database design Guidelines:
While designing a relational database, it is a good idea to distribute the information in multiple tables. It is not advisable to store all the information in a single table, although it is easier to design. When your database grows in size, the efficiency decreases accordingly.

Responsibilities of the database analysts and administrator:
  • adminster
  • develop
  • maintain 
  • implement the policies and procedures necessary to ensure the security and integrity of the corporate database.
  • security
  • architecture
  • warehousing 
  • business analysis
  • Implementation of data models
  • Database design 
  • Database accessibility
  • Performance issues
  • Capacity issues
  • Data replication
  • Table Maintainence
10. To prevent unauthorized computer access:
  • Operating system and software patches and updates
  • Passwords
  • Get a hardware of software firewall
  • Trojans, viruses, spyware and other malware
  • Know how to handle e-mails
  • Alternative browser
  • Run system scans to check for vulnerabilities

Monday, August 1, 2011

                                                                   QUIZ 7:

1. Discuss the components required for successful communications.

2. Identify various sending and receiving devices.

3. Describe uses of computer communications.

4. List advantages of using a network.

5. Differentiate among client/server, peer-to-peer, and P2P networks.

6. Describe the various network communications standards.

7. Explain the purpose of communications software.

8. Describe various types of lines for communications over the telephone network.

9. Describe commonly used communications devices.

10. Discuss different ways to set up a home network.


                                                            ANSWER:

1.Components for a successful communication:
  • sender
  • receiver
  • medium
2. Sending and Receiving Devices:
  • microcomputer
  • minicomputers
  • mainframes
  • cellular telephones
  • pagers 
3.Uses of Computer communication- impression formation, deception, group dynamics, disinhibition and especially relationship formation.

4.Advantages of using a Network:
  • share software
  • share information with others on networks
  • share peripherals
  • speed of sharing software and information files
  • cheaper than buying individual software and hardware for each standalone especially if for a school, network software often offers deals for amount being purchased
  • security, files can be copy inhibit mode
  • centralized software management- software being loaded onto one computer but also this loads software to entire network at one time
  • electronic mail(e-mail) between network users, ideal for office memos
  • flexible access- access you files from any computer on the network unlike standalone which would mean only being able to access your data from the one computer you uploaded data onto.
5. Client/ Server-describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.


Peer-to-Peer-a distributed application architecture that partitions tasks or workloads between peers.


P2P network-a type of network in which each workstation has equivalent capabilities and responsibilities.


6.Network Communication Standards:

Ethernet- network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted; that is, each node attempts to transmit data when it determines the network is available to receive communications.

Token Ring- specifies that computers and devices on the network share or pass a special signal in an unidirectional manner and in a preset order.

TCP/IP- a network standard that defines how messages or data are routed from one end of the network to the other, ensuring the data arrives correctly.

Wi-Fi-is a series of network standards that specifies how two wireless devices communicate over the air with each other.

Bluetooth- a network standard, specifically a protocol, that defines how Bluetooth devices use short-range radio waves to transmit data.

Radio wave identification- is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.

WiMax-Short for World Wide Interoperability for Microwave Access,also known as 802.16, a network standard developed by IEEE that specifies how wireless devises communicate over the air in a wide area.

7.Comminication Software- used to provide remote access to systems and exchange files and messages in text, audio and/or video formats between different computers or user IDs.

8.Types of lines for communication over telephone network:
  • Fiber Optics-is a core glass that is coated with carbon black to reflect the light beam with the core and a protective paint coating of plastic.
  • Unshielded Twisted Pair- to prevent interference (so-called cross talk) by four pairs of 22-gauge wire around each other in the main cable.
  • Shielded Twisted Pair- consists of four pairs of wires that are wrapped around each other.  
  • Coxial- uses a single copper line that is in the middle.

Tuesday, July 26, 2011

                                         Quiz 6:

1.Define system software and identify the two types of system software.
2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.
3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
4.Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and
restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.



                                                        Answer:

1. System Software-is computer software designed to operate the computer hardware and to provide a platform for running application software.

 Types of System Software: 
  •  Operating System
  • Utility Software
 2. Windows Server- a brand name for a group of server operating systems released by Microsoft Corporation.

UNIX-  a multi tasking, multi user computer operating system.

LINUX- refers to the family of UNIX-LIKE computer operating systems using the LINUX KERNEl.

Solaris- is a UNIX operating system originally developed by Sun Microsytems.

NetWare-  is a network operating system developed by Novell, Inc.

3. Features of : 
Windows Embedded CE
  •  Component services
  • networking capabilities
  • multimedia support  and many other capabilities are contained within individual operating system features.
Windows Mobile 
  • Updated Lock Screen
  • Updated Today Screen
  • Windows Phone Marketplace
  • Windows Media Player Mobile
  • Microsoft My Phone
  • Social Networking Apps
  • Designer Themes
Palm OS- There is a "stylus" or "pen" which is utilized to faucet the onscreen keyboard or to write on the window in "Graffiti", which is fast shorthand document system.

BlackBerry
  • speakerphone system
  • broadband EV-DO wireless data
  • EDGE high speed wireless data and trackball.
Google Android
  • Hand Set Layouts
  •  Storage
  • Connectivity
  • Messaging
  • Web Browser
  • Java Virtual Machine
  • Media Support
  • Additional Hardware Support 
Embedded Linux

  • Complete and royalty-free out-of-the-box embedded Linux environment with full source code
  • Fully integrated and optimized BSPs for Digi hardware platforms
  • Built on recent stable version of Linux kernel
  • State-of-the-art graphical development environment based on open Eclipse framework
  • Digi is the single source for complete hardware and software support
Symbian OS
  • can also use languages like python, visual basic, OPL and Perl.
  • was built in such a way that it follows the three basic design rules.
  • event- based
  • Central Processing Unit is switched off when the running applications and programs are not linked to the event.
  • compatible with all kinds of devices.
4. Purpose of:

File Manager- provide network connectivity via protocols such as FTP, NFS, SMB, or WebDav.

Search Utility- to find quickly Files, Folders and Text on your Local, Network, DVD, CD-ROM, USB Hard or Flash Drives.

    Image Viewer- display stored graphical image.

    Uninstaller- designed to remove other software or parts of it from a computer.

    Disk Cleanup- to free up disk space on a computer's hard drive.


    Disk defragmenter- to increase access speed by rearranging files stored  on a disk to occupy contiguous storage locations.

    Back up and Restore Utilities- creates safety copies of your most important personal files, so you're always prepared for the worst.

    Screen saver- to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use.

    Personal Firewall-controls network traffic to and from a computer, permitting or denying communications based on a security policy.

    Antivirus Programs-is used to prevent, detect, and remove malware, including computer viruses, computer worm, trojan horses,  spyware, and adware.

    Spyware and Adware Remover-to detect and remove spyware, adware, and other malware such as keyloggers, rootkits, Trojan horses, and browser hijackers.

    Internet Filters- monitor web content viewed on a particular computer or network.

    File Compression- used when sending a file from one computer to another over a connection that has limited bandwidth
        -makes the file smaller and, therefore, the sending of the file is faster.


    Media Player- data storage devices that play media.

    disc burning -lets you create audio and data CDs, Video DVD authoring, the ability to burn Data DVDs, HD-DVDs and Blu-ray Discs.

    Personal Computer Maintenance- to avoid many problems, computer slows down, you get a lot of freezes, files and programs take forever to open. 
        -Windows comes with a set of utilities to aid in the maintenance of your computer.

    Monday, July 25, 2011

                                                            Quiz 5:
    1. Differentiate between storage devices and storage media.
    2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.
    3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.
    4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.
    5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers

                                                            ANSWER:

    1.Storage device refers to the apparatus for recording computer data. Examples are the RAM, floppy drives, ZIP drives, and other disks drives. While, storage media are the materials on which data are written and stored. Examples are the floppy disks, optical discs, hard disks, etc.

    2. Tape- hanging posters, decorative book cover, fix broken tail light on vehicle, twist a long piece into rope (thousands more uses), tape wires down on floor or out of the way,  tape wires back together after splicing (much wider than electricians' tape), reattach rear view mirror, repair cracked windshield/window, patch ripped clothing, hide unsightly wallpaper seams.

    Magnetic Stripe Cards- an effective form of information storage.

    Smart Cards- is a portable computational device with data storage ability, very reliable form of personal identification and a tamper-proof, secure information repository.

    Microfilm- Because of its large storage capacity, microfilm was mainly used for archival purposes.

    Microfiche- It is primarily used for high-capacity storage. The function has now been replaced by digital imaging and storage, but there are still data being archived as microfiche and huge archives of data that have not been transfered to digital storage systems.

    Enterprise Storage- is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous (and possibly dissimilar) computer systems.

    3.Solid State Drive- is an electrical term that refers to electronic circuitry that is built entirely out of semiconductors.

    Memory Card- is an electronic flash memory data storage device used for storing digital information.

    USB Flash drive- is a small device that stores information and files from a computer.

    Express Card Modules- can provide the quickest way to download pictures from today's high-capacity digital camera cards (CompactFlash, MMC, MemoryStick, SD, xD, etc.).

    4.CDs- an optical disc used to store digital data.

    Archive Disc- 



    Picture CD- holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression.

    DVDs- offer higher storage capacity than compact disc while having the same dimensions.

    Blu- ray disc- is an optical disc storage medium designed to supersede the DVD format.

    5. Ink-jet Printer- create text and images by small nozzles spraying ink onto printer paper. The ink absorbs into the paper at different amounts and levels of crispness depending on the paper and ink quality. 

    Photo Printer -it is able to run on battery power, it is versatile as to photo size, it has good consumer reviews, it has good specifications.

    Laser Printers- speed, memory, resolution, duplexing, all in one printer, media support, consumables.


    Monday, July 18, 2011

    Quiz 3

    1. Describe the four categories of output.
    2. The characteristics of LCD monitors, LCD screens, plasma monitors, and HDTVs.
    3. What are the components inside the systems units.
    4. The components of a processor and how they complete a machine cycle.
    5. Define a bit and describe how a series of bits represents data.
    6. Identify the categories of application software.
    7. Identify the key features of widely used business programs.
    8. What are the advantages of using application software on the Web.
    9. History of the Internet.
    10. What are different storage devices.


    ANSWERS:
    1. The four categories of output are: text, graphics, audio and video.
    2.Characteristics of:
    • LCD Monitor- ultra-slim, stylish,full color display devices for the PC that fit in any part of the home or office.
    • LCD Screens- lightweight, aesthetically appealing, energy efficient and long-term cost effective. 
    • Plasma Monitors- produce rich colors along with very deep blacks,wide viewing angles allow more people to be able to watch TV comfortably, pixels of Plasma TV’s are lit individually so the pixels can be completely turned off to display truck black colors. 
    • HDTVs- black level, brightness, contrast, color saturation, image processing, screen composition, tuners and cable card. 
     3. The Basic Components are:
    • Processor
    • memory
    • adapter cards
    • ports
    • drive bays
    • power supply
    • motherboard
    • chip
    • Central Processing Unit
    • Machine Cycle      
    4.Components of a processor:
    • Control Unit
    • Arithmetic/ Logic Unit (ALU)
    • Register
     The machine cycle is the name of the four operations of the CPU. The first step is to 'fetch' the program instuction/data from the memory. The second step is to 'decode', which means translate the instruction into instructions. Step three is to 'execute', carry out the instruction. Finally step four is to 'store', write the result back to memory.

    5. Short for binary digit, the smallest unit of information on a machine.
    When the user press any letter using the keyboard the electronic signal from that letter is sent to the system unit then the system unit convert it to its binary code and stored in memory for processing. After processing the binary code for that particular letter is converted to an image and displayed on the output device.

    6.Categories of Application Software:
    • Personal productivity Applications
    • Multimedia and Graphics applications
    • Communications applications 
    • Home and Educational
    7.  The Key Features in Business programs in terms of software is editting and typing and other stuff knowing what letters to use like formating.

    8.Using web authoring software can help build web pages faster, an advantage if you are facing a deadline or a large project. There are several different types of web authoring software you can use to make great web pages without having to know all of the ins and outs of web page creation.


    9. The USSR launches Sputnik, the first artificial earth satellite. In response, the United States forms the Advanced Research Projects Agency (ARPA) within the Department of Defense (DoD) to establish US lead in science and technology applicable to the military.
    RAND Paul Baran, of the RAND Corporation (a government agency), was commissioned by the U.S. Air Force to do a study on how it could maintain its command and control over its missiles and bombers, after a nuclear attack. This was to be a military research network that could survive a nuclear strike, decentralized so that if any locations (cities) in the U.S. were attacked, the military could still have control of nuclear arms for a counter-attack.

    Baran's finished document described several ways to accomplish this. His final proposal was a packet switched network.

    "Packet switching is the breaking down of data into datagrams or packets that are labeled to indicate the origin and the destination of the information and the forwarding of these packets from one computer to another computer until the information arrives at its final destination computer. This was crucial to the realization of a computer network. If packets are lost at any given point, the message can be resent by the originator."
    ARPA awarded the ARPANET contract to BBN. BBN had selected a Honeywell minicomputer as the base on which they would build the switch. The physical network was constructed in 1969, linking four nodes: University of California at Los Angeles, SRI (in Stanford), University of California at Santa Barbara, and University of Utah. The network was wired together via 50 Kbps circuits. The first e-mail program was created by Ray Tomlinson of BBN.

    The Advanced Research Projects Agency (ARPA) was renamed The Defense Advanced Research Projects Agency (or DARPA)

    ARPANET was currently using the Network Control Protocol or NCP to transfer data. This allowed communications between hosts running on the same network. Development began on the protocol later to be called TCP/IP, it was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA. This new protocol was to allow diverse computer networks to interconnect and communicate with each other.
    10. Different storage devices:
    • Hard drive
    • External Hard Drives
    • network Attached Storage
    • Optical Media Storage
    • Flash Drives