Complete Notes
Complete Notes
Understanding the
real risks. (cookies vs firewall)
Using the Internet and the Web wisely. (finding good information)
Information
technology (IT) is a field of study focused
on managing and processing information
and the automatic retrieval of information.
Information technology includes computers, telecommunications, and software
deployment.
Bluetooth: works by transmitting radio waves to a terminal, the terminal then sends the data across a
wireless network where it is recorded in the UPS (company of example) database
Creating websites to sell art, and creating new wats to sell new performances to audiences.
Using computer programs for art, adobe illustrator, photoshop, and corel painter
Teachers can give students virtual tours of museums around the world
Teachers need to be more tech savy than students and use programs to teach courses
Using computer software and equipment to solve crimes, such as facial recognition software, using
information databases
Computer forensics is a growing career path, where focus is on illegal actions on the internet
Dr. Paul Ekman created a program that recognizes small micro-expressions in the face to determine
emotions of an individual
Network Adapter
Network
Military Careers:
Universal remote Drive that Drone
The ASVAB (Armed
Services Vocational Aptitude Battery) exam is
a requirement for entry into the U.S. armed
services,
Ranchers must look out form disease outbreaks, so they use RFID tags (radio frequency identification
tags), it’s a small microchip in the cows ears.
Cranberry growers have automated water pumps that keep the crop from freezing
Environmental and governmental regulations are pushing manufacturers to create more fuel efficient cars.
Cars have more sensors now to determine amount of fuel to spray into cylinders, same with braking
systems
BrainGate software which translates thoughts into commands for robotic limb
Robot surgery
VeriChip, chip that identifies a person by transmitting itself with radio waves
Tornado forecasting
Using analyzing computer technology to increase athlete’s performance, such as golfing and swimming
where technique is everything
Knowledge is Power
Data: is the representation of a fact, figure, or an idea. (can be a number word, pircutre, or sound)
(input)
Information: is data that has been organized or presented in a meaningful fashion. (output)
Computers gather data and create a finished display of useful information such as an id card.
Hardware: any part of the computer that you can physically touch
Software: computer programs that allow the hardware components to perform different
tasks
Application software: set of programs that you can use on a computer to help you carry
out tasks such as writing a research paper
System software: the set of programs that enables the computer’s hardware devices and
application software to work together.
Operating system (OS): the program that controls the way in which your computer
system functions (monitor, mouse)
Input Devices
Microphones
Keyboards
Standard QWERTY keyboard, designed to slow typewriter people down to prevent mistakes
Sometimes fewer keys or they are arranged on top of other keys with the combination of a (fn)
button
Flexible keyboards
Laser keyboards
Numeric keypad
Yup
Magnifier
Customizable buttons
File storage
Touch Screens
Image Input
A webcam
Sound Input
Desktop microphones
Trackball
Output Devices
Output devices enable the sending of processed data out of the computer
Monitor/display
Printer
Monitors
Light shines through pixels that are moved by electric current and we see the desired colour
Contrast Ratio: measure of the difference in the light intensity between the brightest white and
the darkest black. 400:1 and 1000:1 is preferable
Viewing angle: the measurement in degrees of how far to the side of the image you can move
before the image quality degrades to unacceptable levels. 150 degrees is usually
recommended.
Brightness: measured as candelas per square meter (cd/m2) or nits, brightness is a measure of
the greatest amount of light showing when the monitor is displaying pure white of 300cd/m2 or
greater is recommended
Response Time: ms. of how long it takes for pixel to change color, a quicker time produces a
more smooth image quality
Yes!
Projector
Printers
Impact printer that uses hammer to put ink on paper, the dot-matrix printer was the most
common
Laser printers uses laser beams and static electricity to deliver toner
Portable printers
Wifi is quicker
All-in-one printer: combines the function of printer, scanner, copier, and fax
Thermal printer: works by melting wax based ink onto ordinary paper, the process is called
thermal wax transfer printing, or direct thermal printing (used for receipt printing)
Resolution: image clarity, measured in dots per inch (dpi), the greater the better
Color output: Inkjet printer with four color printer (cyan, magenta, yellow and black), or 6 ink, or
just 2
Laser printers have 4 separate toner cartridges, and the toner is blended in various quantities to
produce the entre color spectrum
Duty cycle: the number of printed pages the printer can reliably produce on a monthly basis. It’s
the manufacturers figure to how long the machine can run before it needs a rest, or what
percentage of time it’s supposed to be in use.
Cost of consumables
Consumer report magazines can help evaluate what the best printers are
Sound Output
Speakers, surround sound speakers, sub-woofer (low base speaker), ear phones
What’s on a motherboard?
CPU (central processing unit), ROM and RAM cache, also houses room for expansion
cards/adaptor cards, that offer additional functionality
Expansion cards: sound card, video card, modem card, network interface card (NIC) (cable
internet), USB firewire ports
Memory
RAM random access memory: used for quickly taking and storing information, its therefore a
volatile storage location because all the information gets erased when the computer is shut off
Does the motherboard contain any other kinds of memory besides RAM?
ROM read only memory, has all the instructions the computer needs when it starts up, it is non-
volatile
Processing
What is CPU?
Hz hertz, machine cycles per minute, the CPU decodes the instructions into something the
computer can understand, and then executes them and stores the results back into its memory
Besides the number of cores, are there other factors that determine processing power?
Cashe memory, front side bus (FSB), determines how fast data is exchanged between the CPU
and RAM
Storing Data and Information
Internal drive bays cannot be seen, it holds all permanently stored programs and data
external drive bays: can be seen and accessed such as cd/dvd drives
Hard Drives
Optical Storage
Optical drives read cd’s dvd’s or blu-ray disk, they work by little pits being etched into the cd
Flash Storage
Solid state drive (SSD) does not create noise, emit little heat, are faster and powerful, as they
don’t need any spinning platters or motors
Which ports help me connect with other computers and the Internet?
VGA (video graphics array) port is the port to which CRT monitors connect
VGA ports
High definition multimedia interface (HDMI), carries both high definition and uncompressed
digital audio on one cable (DVI carry’s video signals)
You can add them to open expansion card slots on the motherboard
What if there are no open slots on the motherboard when I can insert an expansion card?
Power Controls
Should I turn off my computer every time I’m done using it?
Ergonomics: an applied science concerned with designing and arranging things people use so
that the people and things interact more efficiently and safely
Position your monitor correctly: 25 inches away from the eyes, and at eye level or 15 to 20
degrees below eye sight
Assume a proper position while typing: repetitive strain injury (RSI) caused by repetitive or
awkward movements of a part of the body
Take breaks from computer tasks: focus on an object at least 20 feet away for a little while
The Internet
Was created to respond to these two concerns: establishing a secure form of military
communications and creating a means by which all computers could communicate.
“internetworking” project called the Advanced Research Projects Agency Network (ARPANET)
Did the same people who invented the internet invent the web?
Is e-mail private?
No it is open and the messages are archived for later use in a lawsuit or investigation
E-mail clients: office outlook that act like a post office for different mail for different accounts
More versatile
Instant Messaging
Group Communication
Netiquette
Flooding: spamming
Web 2.0 evolved type of Web interactions between people, software, and data
Yes, there are hackers and others who distribute or misuse your information, and your content
reaches places it shouldn’t be
What is a blog?
Easy to make, they are usually written by one author and several entries are listed on a page, it
is open to the public
A vlog is a personal journal that uses video as the primary content, can also contain text,
images, and audio
Free blog hosting sites such as blogger.com or create your own website for a blog
Spam blogs (blogs) filled with fake articles and stolen text (tactic known as blog scraping)
Wikis
A type of web site that allows users to change its content by adding, removing or editing the
content, they can be used to express thoughts and opinions about certain topics, it’s a
“common” opinion (ex. Google doc)
Can be accurate or not, depending on the group who verify the information
What is a podcast?
A podcast is a clop of audio or video content that is broadcast over the Internet using
compressed audio and video files, they might include radio shows, audio books, magazines and
even educational programs
Broadcast is a combination of broadcasting and IPod (IPod because it’s the most popular PMP
portable media player)
So what makes podcasting different from just listening to an audio file on the computer
or PMP?
What is RSS?
XML-based format facilitates the delivery of frequent content upgrades on Web pages
Made so that aggregators (programs that go out and grab the latest updates of Web material)
can find and download only the new content to your computer
You need a computer, microphone, web cam for video podc, additional software, and creating
an RSS feed, and uploading it to the web.
What’s a webcast?
A webcast is a broadcast of audio or video content over the internet. It is a one-time event
Streaming audio continuously feeds an audio file to your browser, its better than waiting to
download an entire file before using it
Plug-in: (or player) a special software program that allows you to use a certain media
Yes, through a cache (temporary storage place) where website information is stored
Selling or advertising
Click and brick: stores physically and online at the same time (ex. Best buy)
Buying stuff…
E-commerce Safeguards
Avoid making online transactions when using public computers (they can record your key
strokes)
Pay by credit card, not debit card, credit cards have laws to protect the users
Firefox
Safari
Google Chrome
HTTP: hypertext transfer protocol, it is the protocol that allows files to be transferred from a Web
Server
FTP: file transfer protocol, used to download files from the computer to a Web Server.
What’s the information after the domain name that I sometimes see?
The subdirectory, it identifies each subpage that is visited
Breadcrumb trail: a list of pages within a Web site you’ve visited, you use the back and forward
buttons to navigate the trail
Favorites or bookmarks
Live bookmarks, the web page RSS feeds come to you, if you want updates in news, sprots,
etc.
Social bookmarking also known as tagging, allows you to store, organize, and manage
bookmarks or tags of Web pages
Use a search engine, a program that searches the web for keywords
Subject directory can also be used, which is a structured outline of a Web’s sites organized by
topics and subtopics
Search Engines
First part is a spider; it collects data on the Web with the keywords
Second part is the indexer program which organizes the data into a large database
Third part is the search engine software, it pulls out relevant data according to your searches
Youtube
Originally Boolean operators were needed to help redefine search (are words such as AND
NOT OR that describe the relationship between keywords in a search)
How can I make sure a Web site is appropriate use for research?
A computer is either a client (asks for data), or a server (a computer that receives requests and
returns data)
Main pathways of the internet travel are called the internet backbones
Each time the computer connects to the internet it is assigned a unique identification number, its
called an Internet Protocol Address or IP address.
The IP address is commonly a dotted quad or dotted decimal with its four numbers
Broadband Connections
What is broadband?
Satellite broadband
Cable is a one way service for the tv, in order for the internet to work
cable companies must upgrade their networks with two-way data transmission capabilities
Uses phone lines, and allows for phone and data transmission to share the same line
Phone lines are made of pairs of twister copper wires known as twister pair wiring
Three cables, one for phone, and the other 2 for internet in receiving and sending data
Cable services are slower when many users are using it, as it packs up the cable traffic
Strands of optically pure glass or plastic which are arranged in bundles called optic cables and
transmit data with light which makes the speed so fast. The computer reads the light through
electrical pulses
What special equipment do I need to hook up to broadband?
It require a modem, it translates the broadband signal into digital data and back again
Sometimes DSL filters are needed to reduce interference caused when the DSL equipment
shares the same lines as the standard phone line
What options exist when cable and DSL are not available?
Wireless
Aircard/ cellular modems, placed in Express card slot, which allows the user to have wireless
internet access with notebooks and netbooks
Dial-Up Connections
How does dial-up connection work?
A dial-up modem converts (modulates) the digital signals the computer understands and also
has to translate (demodulate) the received information
Speed: data transfer rate (speed at which data travels between computers), also known as
connection speed
More bandwidth!
How else will the Internet become a more integral part of our lives?
Four: Application Software
What is software?
Spreadsheet software
Text
Values
Formulas
Functions
What kinds of graphs and charts can I create with spreadsheet software?
Any…
Presentation Software
Presentation software
Database Software
Purchase history
Evernote
What applications should I use to manage my time, contact lists, and tasks?
Microsoft outlook
What tools can I help me work more efficiently with productivity software?
A wizard: a guide that walks you through the steps necessary to complete a
complicated task
Macro: small program that groups a series of commands, so that they will run as a
single command
It is a single software program that incorporates the most commonly used tools of many
productivity software programs into a single integrated program
yes, the programs are geared towards home owners, and casualists
Podcasts, bought
MP3 Recordings
CD ripping
CD burning
Format conversion
MP4- MPEG-4
Itunes, winamp
Are there Web-based programs available to edit, share, and store my photos?
Gaming Software
How do I tell what computer games are appropriate for a certain user?
Entertainment Software Rating Board (ESRB), has two parts: rating symbol, age
appropriateness, and content descriptors, E, T,,M,AO
Educational Software
What types of programs are available to train you to use software or special
machines?
Drawing Software
Illustration software
What software can I use to lay out and design newsletter and other publications?
Just convert something into a webpage if it was only one file, convert to a Web
compatible format
Palo Alto Software’ Business Plan Pro and Marketing Plan Pro helps users write
strategic and development plans for general business and marketing needs
Enterprise resource planning (ERP) system: lets business consolidate multiple systems
into one and improve coordination of these business areas across multiple departments.
They help control many “back office” operations. Oracle and SAP
Mapping programs such as DeLorme Street Atlas USA and Microsoft Street and Tips
Online mapping service is what people go to now, work with GPS system
Many companies use a GIS (geographical information system) to assist with mapping,
managing, analyzing, and displaying data, in a spatial form
IBM’s Websphere, GoEmerchant, and ProStores business offer bundled Web Site
creation and hosting services, shopping cart setup, and credit card processing services
Integrated help means that the documentation for the product is built directyly into the
software
Malektips.com
Buying software
Software Liscenses
Software license is an agreement between the user and the software company
Concurrent licenses limit the number of people accessing the software at any given time
Does open source software require a license?
Copyleft: modified open source software under that terms as the original software, it
must be distributed as free software
Pre-Installed Software
Basic stuff
Trials expire, and they use up memory, and processing power, reduce battery power
Web-based Applications
Software as a Service (SaaS), also known as Web-based applications, the user uses
the program online
Good docs
What advantages do Web-based applications have?
Collarboration, portability
Discounted Software
Yes, for short periods of time, and so that the developer can get increased awareness
of the product
Yes ffs!
Freeware: any copyrighted software that you can use for free
Opensource: programs are free to use on the condition that any changes you make to
improve the source code must be distributed for free
Is it still freeware if I’m asked to pay for the program after using it a while?
Can shareware programmers make me pay for their shareware once I have it?
No it stops working
Are there risks associated with installing beta versions, freeware, and shareware
or downloading them from the Internet?
Yes beta versions are buggy and can screw your computer
Depends how often you use it, and whether the upgrade is cost effective
If I have an older version of software and someone sends me files from a newer
version, can I still open them?
Called backward compatible, but most programs are not forward compatible
System requirements: specify the minimum recommended standards for the operating
system and other requirements
Installing Uninstalling, and Starting Software
Wizard
How is the installation process different from software I download from the web?
No disk…
Shortcut
Taskbar
Utility program: performs many of the general housekeeping tasks for the computer
Multitask
Multiuser
Real time operating system (RTOS): machines that are required to do a series of
specific tasks in an exact amount of time
RTOS are sued for the military, science, and aerospace industries
What is UNIX?
MacOS
What is Linux?
Linux is open source operating system, its based on the central programming code with
the rest from GNU
Android, MeeGo
How does the operating system control how I interact with my computer?
User interface
Processor Management
How exactly does the operating system coordinate all the activites?
When an action is asked, the OS creates a unique signal called an interrupt (each
device has its own interrupt)
The interrupt table is in the RAM, which the OS does peemptive multitasking by
performing tasks with higher assigned priority first
Ex. When a printer needs to print something the OS puts a “memo” in the RAM called a
stack. The memo is what the computer was doing before it started to work on the printer
request
OS puts the requests in another area called the buffer until the spooler a program that
helps coordinate all print jobs currently being sent to the printer
Why does the operating system have to manage the computer’s memory?
It needs to control the amount of space in the RAM so that it can make sure it doesn’t
get filled up, and so that it can delete older requests
Different versions of OS which require more RAM such as the more robust versions of
windows
Some of the RAM data is temporarily stored in the area of the hard drive called the
swap file/page file, this swapping process is known as paging
How does the operating system manage the hardware and peripheral devices?
Each program has a device driver that facilitates communication between the hardware
device and the operating system
Devices that are included in Windows are called “Plug and Play” , where the computer
automatically recognizes the device
Programs may become unstable (stop responding), fixed with Windows with its Roll
Back Driver that removes a newly installed driver and replaces it with the last one that
worked
How does the operating system help application software run on the computer?
With application programming interface (API), that application software needs in order
to interact with the OS, ex. Direct X for multimedia enhancement
Programmers only need to refer to the API code blocks, and the program is very similar
to other ones which make it easy to incorporate
Boot process (start-up process) to load the operating system into the RAM, boot from
bootstrap (loads a small program used to start a larger program
What are the steps involved in the boot process?
The CPU activates the basic input/output system (BIOS), OS onto the RAM
How does the computer determine whether the hardware is working properly?
The BIOS goes through a list of devices in its search for the drive that contains the
system files (main files of the OS), when located it is sent into RAM, once the process is
finished the kernel (supervior program) is loaded, it manages everything else, the kernel
is the memory resident (it stays in the RAM the whole time), less critical parts don’t stay
on the RAM and so called non-resident.
When are the other components and configurations of the system checked?
CMOS checks the stuff, the registry (contains all the different configurations used by the
OS and by other applications
Why do I sometimes need to enter a login name and password at the end of the
boot process?
In safe mode you can use the Device Manager which has the Last Known Good
Configuration
Boot, patch
What are the main features of the Windows desktop and Start menu?
They look for repeated patterns of letters and replace these patterns with a shorter
placeholder, placeholder are catalogued and stored temporarily in a file called the
dictionary
Varies on the type and size of the file, and the compression method used
Audio files get rid of sounds that he human ear can’t hear
Picture files get rid of the pixels that you couldn’t see anyways
Disk cleanup: a windows utility that cleans, or removes unnecessary files for the hard
drive
Macs don’t need as they run more efficiently already, but the program IDefrag can be
used
Error-checking: aka scandisk is a windows utility that checks for lost files and fragments
as well as physical errors on your hard drive
Lost files and fragments of files are referenced on the file allocation table or FAT to files
that no longer exist of have been moved
Physical errors on the drive occur when the mechanism that reads the hard drive’s data
can no longer determine whether the area holds a 1 or 0, these are called bad sectors
Properties of a file
Problem Reports and Dr. Watson are programs that save logs when errors occur so that
the report can be sent to professional support
System Restore: allows for a role back to a specific data with system settings
Every time the computer starts or a new application installation Windows automatically
creates a system restore point
How can I protect my data in the event something malfunctions in my system?
Backup and Restore utility, which copies things to a disk or storage device
System repair disc, give you options for repairing the system on system boot up
Task Scheduler Utility, allows for the schedule tasks to run automatically at
predetermined time, with no additional action necessary on your part.
Accessibility Utilities
High contrast: adjust color scheme setting and contrast between text and background
f i ve
fi v e
summary
summary
chapter
works on.
software?
compression.
operating systems?
systems?
242 Chapter 5 Using System Software: The Operating System, Utility Programs, and File Management
interfaces (APIs).
windows features?
summary
9. How does the operating system help
they do?
stopped running.
243
Multiple Choice
1. Which is not an example of a smartphone
operating system?
b. Android d. webOS
technology?
a. Windows 7 c. Linux
process?
BIOS
file by its
a. name. c. extension.
b. path. d. type.
operating system?
been reached
d. Facilitating installation of
inclusion of drivers
a. thrashing.
b. multitasking.
c. caching.
d. paging.
a. Icon c. Taskbar
b. Gadget d. Widget
not true?
software code.
to respond to OS changes.
drive?
a. System Restore
b. Disk Defragmenter
c. File Compression
d. Disk Cleanup
utility?
a. System Restore
b. Disk Defragmenter
c. Windows Explorer
d. File Compression
True–False
___F_ 1. Only personal computers need some form of operating system software.
__T__ 4. Paging is the process of optimizing RAM storage by borrowing hard drive space.
___T_ 5. Windows 7 includes a compatibility feature that allows you to run software that is
Dynamic random access memory (DRAM) has been increasing by about 60 percent every year
“ To determine
your ideal
system, consider
what you want to
be able to do
with your
computer. ”
How does a notebook compare to a desktop for value?
Desktops are cheaper and more reliable
Laptops are more expensive and not as reliable
CPU subsystem
Memory subsystems (RAM)
Storage subsystems (hardrive)
Video subsystems
Audio subsystems
Ports
Cache memory, easier to process as the RAM is fast for the CPU
Level 1 cache is a block of memory that is built onto the cPU chip for storage of data or
commandes that have just been used
Level 2 cache: on the CPU chip, contains more storage area that area 1
Level 3 cache slower for the CPU to reach but larger in size
Front side bus (FSB) speed, connects the processor to the system memory, it’s a highway for
information and measured in MHz
How can I tell how much RAM is installed in my computer and how it’s being used?
Memory modules are called physical memory
Look at system properties
Measured in GB
Windows 7 uses a memory management technique known as SuperFetch, which monitors
which applications you use the most and preloads them into your system memory so that they’ll
be ready to go
Windows 7 uses a memory management technique known as SuperFetch, which monitors
which applications you use the most and preloads them into your system so that they’ll be read
y to go
How much memory does the operating system need to run?
The OS uses kernel memory, approx. 555MB of the total RAM available
Adding RAM
Is there a limit to how much RAM I can add to my computer?
Depends on number of slots on the motherboard
RAID 0 where the write begins on the first drive and the second drive jumps ahead to do the
next block of data, RAID 0 fails if either one of the drives stops working, so RAID 0 is for those
concerned with performance as it writes twice as fast. 1TB offers 1TB of data
RAID 1 where the data written on one drive is perfectly mirrored onto the second drive, this is a
more safer configuration
1TB offer 500GB of data, the second is for the “mirror”
Optical Storage
Use lasers, to etch pits into disks
Pits and Nano pits are called lands
Optical media: Blu-ray and DVD
Do I need separate players and burners for CD, DVD, and now BD formats?
It’s a hierarchy of playing with players
To make surround sound Dolby takes digital sound from a medium (DVD) and reproduces it in
eight channels. Seven channels cover the listening field with placement to the left front,
rightfrom ,right and left rear and two extra side speakers, the eighth is a subwoofer (plays really
low sounds)
I don’t need surround sound on my computer. Why else might I need to buy an upgraded
sound card?
They have more connection ports for music making stuff, jukeboxes, portable mini players
summary
you buy a new system because you think
yours may be unreliable, make sure the
problem is not one you can fix. Run a full
scan with antispyware software. Make sure
you have installed any new software or
hardware properly, check that you have
enough RAM, run system utilities such as
Disk Defragmenter and Disk Cleanup, clean
out your Startup folder, remove unnecessary
files from your system, and keep your software
updated with patches. If you continue
to have troubles with your system, reinstall
or upgrade your OS, and, of course, seek
technical assistance.
297
Multiple Choice
6. What allows two different programs
to be processed at one time?
a. Hyperthreading
b. SSD
c. Benchmarking
d. GPU
7. Which is not a type of memory stored
in your system?
a. RAM
b. Cache
c. CPU register
d. ALU
8. The optimal amount of memory for a
video card depends on
a. the quality of video you will be
watching.
b. the resolution of the monitor.
c. the number of monitors you have.
d. All of the above.
9. SuperFetch is a memory-management
technique that
a. determines the type of RAM your
system requires.
b. makes the boot-up time for the
system very quick.
c. preloads the applications you use
most into system memory.
d. defragments the hard drive to
increase performance.
10. What is the name for the time it takes
a storage device to locate its stored
data and make it available for
processing?
a. Clock speed
b. Access time
c. Data transfer rate
d. Seek time
True–False
__F__ 1. A single CPU can have multiple cores but cannot also use hyperthreading.
__T__ 2. The memory that your operating system uses is referred to as kernel memory.
__T__ 3. Motherboards are designed with a specific number of memory card slots.
__T__ 4. Cache memory is a form of read-only memory that can be accessed more quickly
by the CPU.
__T__ 5. Solid state drives are faster than hard drives and eSATA drives.
Chapter 7: Networking
Networking Fundamentals
Network: simply two or more computers that are connected via software and hardware so that
they can communicate with each other
Besides peripheral and Internet connections, does networking facilitate any other types
of resource sharing?
Network Architectures
Network architectures: refers to the design of a network (classified by how they are controlled
and the distance between their nodes)
Local administration: configuration and maintenance of the network must be performed on each
individual computer attached to the network (ex. Peer-to-peer network)
Central administration: tasks can be performed from one computer and affect the other
computers on the network (ex. Client/server network)
Peer-to-peer (P2P) network: each node connected to the network can communicate directly with
every other node on the network, all nodes are equal (peers)
Client/server networks: contains two different types of computers: clients and servers
Server: computer that provides information or resources to the client computers on the network
Are client/server networks ever used as home networks?
Home network server: designed to store media, share media across the network, and back up
files on computers connected to the network
Local area network (LAN): network in which nodes are located within a small geographic area
Wide area network (WAN): made up of LANs connected over long distances
Are wireless networks that cover large areas like cities considered WANs?
Metropolitan area network (MAN)
Network Components
Transmission Media
Twisted-pair cable: made up of copper wires that are twisted around each other and surrounded
by a plastic jacket (telephone)
Coxial cable: consists of a single copper wire surrounded by a layer of plastic (tv.)
Data transfer rate (bandwidth): maximum speed at which data can be transmitted between two
nodes on a network
Network Adapters
Network adapters: devices connected to or installed in a network nodes that enable the nodes
to communicate with each other and to access the network
Network interface card (NIC): designed to use different types of transmission media
Why would I ever consider using a wired connection with my notebook computer?
Wireless signals are more susceptible to interference from magnetic and electrical sources
Building materials
Network navigation devices: facilitate and control the flow of data through a network, data is
sent over in media bundles, and each bundle is a packet
Router: transfers packets of data between two or more networks (home and internet networks)
Switch: “traffic cop” on a network, they receive data packets and send them to their intended
nodes on the same network (not between different networks)
Networking Software
They have specialized network operating systems (NOS) software installed on them
The software handles requests for information, Internet access, and the use of peripherals for
the rest of the network nodes (communication goes through server first)
NOS software for Windows Server 2008 R2 and SUSE Linux Enterprise Server
Current standard for Ethernet networks is the 802.11n standard, it is known as WiFi
Four standards are currently defined under the 802.11 WiFi standard: 802.11a, 802.11b,
802.11g, 802.11n (now the preferred choice for home networks with faster data transfer rates)
the standards work with backward compatibility
Transceiver: device that translates the electronic data that needs to be sent along the network
into radio waves and then broadcasts these radio waves to other network nodes, they also
receive the signals from other network nodes
Multiple Input Multiple Output (MIMO): technology used in the 802.11n standard that achieves
higher throughput
Earlier wireless standards only utilized one antenna for transmitting and receiving data, devices
that use MIMO technology are designed to use multiple antennas for transmitting and receiving
data.
Throughput Speeds
How can I tell how fast the wireless connection to my network is on my computer?
Gb Ethernet standard
Network Cabling
What type of cable do I need to connect to a wired Ethernet network?
Most popular is unishielded twisted-pair (UTP) cable, its composed of four pairs of wires that are
twister around each other to reduce electrical interference
Do all wired Ethernet networks use the same kind of UTP cable?
Cat 5E
Cat 6
Cat 6a
Are there other types of P2P networks that can be installed in the home?
Non-Ethernet networks in the home are extremely rare: 1. Ethernet networks are based on a
well-established standard, 2. Feature easy set-up, 3. providing good throughput for home
networking needs, 4. are cost effective
Does the type of operating system I’m using affect my choice of a home networking
standard?
All OS have a built in Ethernet software
Home Ethernet Equipment
Routers and Switches: Moving Data around Your Network
What equipment do I need for a home Ethernet network?
Combination of routers and switches are called routers or broadband routers
What can I attach to my network to facilitate file sharing and back up of data?
Network attached storage (NAS): specialized computing devices designed to store and manage
your data
Besides external hard drives, are their other NAS devices I could use on my network?
Home network server: automatically back up all computers connected to the network, acts a
repository for files to be shared across the network, function as an access gateway to allow any
computer on the network to be accessed from a remote location
What types of digital entertainment devices can I use to view streaming or downloaded
media?
Network ready televisions
DVRs (digital video recorders), record high-definition television programs (ex. TiVo)
Why should I be worried about someone logging onto my wireless network without my
permission?
Piggybacking: connecting to a wireless network without the permission of the owner, any illegal
actions can be done through your network which is where it becomes traced by the law
enforcement
1. Change your network name (SSID) server set identifier: you’re advertising that you
haven’t changed any of the other default settings
2. Disable SSID broadcast
3. Change the default password on your router
4. Turn on your security protocols
5. Wired Equivalent Privacy (WEP) or Wifi Protected Access (WPA) (both use encryption to
protect data in your wireless transmissions
6. Implement media access control (MAC) address, only restricted devices can use the
network
7. Limit your signal range
8. Apply firmware upgrades
s s e ven
eve n
summary
summary
chapter
Internet).
network?
Internet.
secure?
or WEP.
advantages/disadvantages of setting
up one?
network?
every network?
network to run.
running?
summary
9. What problems might I encounter
Multiple Choice
1. All of the following are advantages of
sharing
a. peripherals.
b. an Internet connection.
c. files.
d. MAC addresses.
networks.
home networks.
client/sever networks.
a. Network adapters
b. Networking software
c. Network navigation devices
d. Transmission media
networks?
a. Repeater c. Router
b. Switch d. Hub
connection.
connection.
d. a client/server network.
networks.
networks.
areas of a home.
nodes.
referred to as a
a. LAN. c. HAN.
b. MAN. d. WAN.
networks.
networks.
a wireless network.
a. NetID. c. SSID.
b. HAN-ID. d. Wifi-ID.
a. gateway.
b. switch.
c. router.
d. repeater.
True–False
network adapter.
__T__ 3. WEP and WPA are popular wired network security protocols.
__T___ 5. 802.11n wireless networks provide faster throughput than wired gigabit Ethernet
networks.
A digital lifestyle
When did everything go “digital”?
Everything now is digital
Text Mesaging
What is text messaging?
Short message service (SMS)
Internet Connectivity
How do I get Internet service for my smartphone?
Wireless internet service provider or wireless ISP, data plan: internet connectivity plan
At what speed is digital information transferred to my smartphone?
EDGE (enhanced data rate for global evolution) and 3G, 4G is coming in
What new features come with having an Internet-based digital phone at home?
Other services can be bundled with the VoIP such as TV cable
Digital Music
How can I create music files easily?
Portable media players (PMPs): small portable devices that enable you to carry your
MP3 files around with you
Are PMP devices the only choice for portable media management?
Digital cameras, gaming devices PSP
What is I want to store more music or video than the memory on my PMP allows?
Add flash drives or larger sizes
How did the shift to digital music impact the music industry?
MP3.com had problems, Napster fixed this
Napster used peer-to-peer sharing
Why buy any music if peer-to-peer (P2P) sharing sites are still operating?
Its illegal
Digital Navigation
How has digitized information impacted navigation?
GPS (global positioning system) devices
How do I get GPS in my car?
Portable GPS, PDA/smartphone equipped with GPS, or with the car
If I don’t have a GPS, how does the 911 system know where I am?
The Federal Communications Commission (FCC) mandated that every cell phone have
a GPS chip inside it to follow the E911 program to located the precise information for
any 911 call.
Digital Photography
What is “analog” photography?
SLR (single-lens reflex): when the shutter opens light touches the film and a chemical
reaction occurs, the film is later processed
Digital Video
Where does digital video come from?
Digital cameras, Google Video, YouTube, Netflix
Since the conversion of digital TV signals, are there any more free television
signals?
Yes, if you live in an area with good “over-the-air” (OTA) reception, you can pick up any
free local television
Ubiquitous Computing
What is in the future for our digital lifestyles?
Mark Weiser “computing will be woven into the fabric of everyday life until it is
indistinguishable from it” this concept is called ubiquitous computing
“smart things” era is just beginning
How will our lifestyles change as computing becomes everywhere and invisible?
WineM: each bottle is labeled with a radio frequency identification tag when it is stored
by the owner, the owner can ask the wine rack to show juct the Chardonay and LED
lights just show on those bottles, or it alerts when a bottle is removed
How will our “ownership” of objects change with the new access to information?
Large item purchases become “subscriptions” like a riding a bike in Germany
Car Share programs
What if each of the cell phones distributed around the world had integreated
atmospheric sensors?
They could tag flu viruses or weather
e eighitght
summary
summary
chapter
services.
analog?
computers.
memory.
outside of work?
difficult before.
summary
8. What changes does ubiquitous
model.
399
e eighitght
self-test
self-test
chapter 402 Chapter 8
Instructions: Answer the multiple-choice and true–false questions below for more practice
Multiple Choice
1. Which is not a factor that determines
digital camera?
data?
a. Mapping
b. Standardizing
c. Synchronizing
d. Transferring
phone is stored in
a. read-only memory.
b. the display.
d. random-access memory.
would purchase
a. a netbook.
b. a tablet PC.
c. an Internet tablet.
d. a notebook.
a. packet-to-packet networking.
b. peer-to-peer sharing.
c. person-to-person texting.
d. power-to-power delivery.
a. Microbrowser
b. Extension
c. Push technology
d. 3G standard
a. nonvolatile memory.
c. SSD memory,
d. volatile memory.
goes out.
secure connection.
very reliable.
connectivity.
contain images?
a. MMS
b. ISP
c. SMS
d. MiFI
True–False
___T_ 1. All smartphones allow you to add more memory.
___F_ 2. Digital music files must be converted to the MP3 format if they are transferred to a
mobile device.
__T__ 3. A codec is the algorithm that compresses and decompresses video files.
__F__ 4. If your digital camera doesn’t support wireless connectivity, you can use a
___T_ 5. Some Internet-enabled devices like the Nokia N810 Internet tablet use Skype for
With all the news coverage about cybercrimes, aren’t people being cautious?
No, Messaging Anti-Abuse Working Group (MAAWG)
Worms
What is a worm?
Worm is a virus that attempts to travel between systems through network connections to
spread an infection
Installing antivirus software: software specifically designed to detect viruses and protect
your computer and files from harm
Encryption Viruses
What are encryption viruses?
Encryption viruses: runs a program that searches for common types of data files (ex.
Word), and compresses them using a complex encryption key that renders them
unusable, the distributor will ask for money to decrypt the files, which makes it flawed
since the transaction can be traced
Virus Classifications
How else are viruses classified?
Polymorphic virus: changes its own code to avoid detection (main type of .exe files)
Multiplier virus: infect multiple file types in an effort to fool the antivirus software that is
looking for it
Stealth virus: temporarily erase their code from the files and hides in the RAM, not a
problem anymore as antivirus programs search RAM as well
Packet sniffer: computer program developed by hackers that looks at each packet as it
travels the Internet, vulnerable on wireless networks
Identity theft: someone using personal information about you to assume your identity for
the purpose of defrauding others
Trojan Horses
Besides stealing information what other problems can hackers cause if they
break into my computer?
Trojan horse: a program that appears to be something useful or desirable, but while it
runs does something malicious in the background without your knowledge
What damage can Trojan horses do?
Create backdoor program: allows hackers to take almost complete control of your
computer without your knowledge
Zombie: computer that a hacker controls
Logical ports are numbered and assigned to specific services, ex. WWB is port 80
Types of Firewalls
What kinds of firewalls are there?
What software firewalls are there?
Norton, McAfee, ZoneAlarm Internet Security Suite
Creating Passwords
What constitutes a strong password?
Several different characters that don’t constitute of words
What tools can I use to protect myself when using public computers?
IronKey, has everything done from the flash stick
What is adware?
Adware: software that displays sponsored advertisements in a section of your browser
window or as a pop-up ad box
What is spyware?
Spyware is an unwanted piggyback program that usually downloads with other software
you want to install from the Internet, and runs in the background of the system. It
transmits information about you, your habits.
Ex/ keystore logger: monitors keystrokes with the intent of stealing passwords, login IDs
or credit card information
Spam
How can I best avoid spam?
Spam: uwanted or junk e-mail
Spam filter: you can select in your e-mail account that places known or suspected spam
messages into a folder other than your inbox
Cookies
What are cookies?
Cookies (aka tracking cookies): small text files that some Web sites automatically store
on your computer’s hard drive when you visit them
Image backup (system backup): all system, application, and data files are backed up,
not just files that changed
Hoaxes
What is a hoax?
Hoax: attempt to make someone believe something that is untrue
Power Surges
What is a power surge?
Power surge: occur when electrical current is supplied in excess of normal voltage
Surge protector: device that protects your computer against power surges
How can I prevent my computers from losing power during a power outage?
Uninterruptible power supply (UPS): has surge protection and power supply
Deterring Theft
Alarms
What type of alarm can I install on my notebook computer?
Monitor alarm: uses a mall device called a key fob activator or punch in a code to
activate the alarm (if moved it sounds)
Software Alerts
How can my computer alert me when it is stolen?
LoJack: theft tracking device, with a transmitter
Computrace LoJack
What if the thieves find the tracking software and delete it?
Files are not visible
How can I ensure that I’ve covered all aspects of proteting my computer?
nine
summary
chapter
5. How do I create secure passwords
and manage all of my passwords?
Secure passwords contain a mixture of
upper- and lowercase letters, numbers, and
symbols, and are at least 14 characters long.
Passwords should not contain words that
are in the dictionary or easy-to-guess personal
information (like your pet’s name).
Online password checkers can be used to
evaluate the strength of your passwords.
Utilities built into Web browsers and Internet
security software can be used to manage
your passwords and alleviate the need to remember
numerous complex passwords.
6. How can I surf the Internet
anonymously and use biometric
authentication devices to protect my
data?
The current versions of the popular
browsers include tools (such as Chrome’s
Incognito feature) that hide your surfing activities
by not recording Web sites that you
visit, or files that you download, in your
browser’s history files. Biometric authentication
devices use a physical attribute (such as
a fingerprint) that is not easily duplicated to
control access to data files or computing devices.
Some notebooks today feature fingerprint
readers and facial recognition software
to control access.
7. How do I manage online annoyances
such as spyware and spam?
The Web is filled with annoyances such as
spam, pop-ups, cookies, spyware, and scams
such as phishing that make surfing the Web
frustrating and sometimes dangerous. Software
tools help to prevent or reduce spam,
adware, and spyware, while exercising caution
can prevent serious harm caused by
phishing, pharming, and other Internet
scams and hoaxes.
1. From which types of viruses do I
need to protect my computer?
A computer virus is a program that attaches
itself to another program and attempts to
spread to other computers when files are exchanged.
Computer viruses can be grouped
into five categories: (1) boot-sector viruses,
(2) logic bombs and time bombs, (3) worms,
(4) scripts and macros, and (5) encryption
viruses. Once run, they perform their
malicious duties in the background and are
often invisible to the user.
2. What can I do to protect my computer
from viruses?
The best defense against viruses is to install
antivirus software. You should update the
software on a regular basis and configure it
to examine all e-mail attachments for
viruses. You should periodically run a
complete virus scan on your computer to
ensure that no viruses have made it onto
your hard drive.
3. How can hackers attack my
computing devices, and what harm
can they cause?
A hacker is defined as anyone who breaks
into a computer system unlawfully. Hackers
can use software to break into almost any
computer connected to the Internet (unless
proper precautions are taken). Once hackers
gain access to a computer, they can potentially
(1) steal personal or other important
information, (2) damage and destroy data,
or (3) use the computer to attack other
computers.
4. What is a firewall, and how does it
keep my computer safe from
hackers?
Firewalls are software programs or hardware
devices designed to keep computers
safe from hackers. By using a personal firewall,
you can close open logical ports to invaders
and potentially make your computer
invisible to other computers on the Internet.
Multiple Choice
1. Computer viruses that hide in memory
a. logic bombs.
b. Trojan horses.
c. stealth viruses.
d. multipartite viruses.
called
a. boot-sector viruses.
b. script viruses.
c. polymorphic viruses.
d. time bombs.
a. inoculation. c. disinfection.
b. quarantine. d. eradication.
a. black-hat hackers.
b. script kiddies.
c. amateur hackers.
d. white-hat hackers.
a. Trojan horses
b. Backdoor programs
c. Zombies
d. Spyware
a. Trojan horses.
b. backdoor programs.
c. zombie webs.
d. botnets.
known as a
a. zombie infestation.
b. distributed denial-of-service
attack.
c. phishing attack.
d. pharming plague.
a. Packet gateways
b. IP addresses
c. Logical ports
d. Data paths
known as
a. pharmware.
b. adware.
c. spyware.
d. bloatware.
a. a system backup.
b. an incremental backup.
c. an image backup.
d. an incremental backup.
True–False
_F___ 1. An incremental backup back ups all files on your computer in a specified location.
__T__ 2. Even a properly installed surge protector may fail to protect a computer from all
power surges.
__F__ 4. When malicious code is planted on your computer that interferes with your
__T__ 5. If a password includes numbers, symbols, and upper- and lowercase letters, it is
The steps are referred to as the system development life cycle (SDLC)
Does the testing plan cover every possible use of the program?
The testing plan would describe how the error would be managed or how the output would be
generated for each input category
Object-Oriented Analysis
What is object-oriented analysis?
Object oriented analysis: programmers first identify all of the categories of inputs that are part of
the problem the program is trying to solve, these categories are called classes
Classes are nouns and methods are verbs
Programmers define the classes, data and methods
Different examples of a class is an object (employee names)
Why would a developed select the object-oriented approach over top-down design?
Object-oriented designs leads to reusability
Inheritance: a new class can automatically pick up all of the data and methods of an existing
class, and then extend and customize those to their own specific needs
Original class is called base class, and the modified is called derived class
Second generation language (2GL): assembly language that allows programmers to write their
programs using a set of short English-like commands that speak directly to the CPU and give
them programmer direct control of hardware
Third generation language (3GL): uses symbols and commands to help programmers tell the
computer what to do, ex. BASIC, FORTRAN, COBOL, C/C++, and Java
Fifth-generation language (5GL): “more natural” languages, ex. PROLOG Programming Logic
Using lots of rules that are mainly text based
Data types: describe the kind of data that is being stored at the memory location, so that
memory can be allocated as efficiently as possible
Int: integers, float: real numbers, char: characters, and bool: Boolean values (true-false)
Separate versions of the compiler are required if you want to compile code that will run on
separate processor types
Programmers have now made an executable program, .exe which is stored in 1s and 0s
language
How does an IDE help programmers when they are typing the code?
Code editing: step in which programmers physically type the code into the computer
IDE includes an editor: a special tool that helps programmers as they enter the code,
highlighting keywords, and altering them to typos
How do programmers know whether there is anything wrong with their program?
Make sure the program input values are tested any way possible to look for bugs that might
occur
Is the testing plan reveals errors, why does the program compile?
Program can’t decide whether the programmer wrote is logical, the compiler only can make sure
that the specific rules of the language are followed
External testing: testing round people that will eventually purchase and use the software
Windows Applications
What languages do programmers use if they want to build a Windows application?
The programs have common features such as scroll bars, title bars, and text boxes
Visual Basic
What if programmers want to have a model of their program before it’s fully developed?
A format other than the System development life cycle (SDLC), is building a prototype at the
beginning of a large project
Prototyping is a form of rapid application development (RAD): an alternative to the waterfall
approach, RAD is used in Microsoft Visual Basic (VB)
VB is quick and simple interface, it has grown from BASIC (beginner’s all-purpose symbolic
instruction code)
VB 2010 and .NET Framework are both part of Visual Studio 2010 which provides a complete
set of develop tools
C and C++
What languages do programmers use if the problem requires a lot of “number
crunching”?
C/C++
Are C and C++ natural choices when I’m looking to learn my first language?
The notation is easy to master
They use small amounts of memory, and their basic components are common to many other
languages
Java and C#
What language do programmers use for applications that need to collect information
from network computers?
Java, and C# (sharp)
Can a Java application work on any type of computer?
No, the Java program does not care which CPU, OS, or user interface is
Target computers run a Java Virtual Machine software that can explain to the Java program
how to function on any specific system
Java applet: small Java-based program
Even though Java isn’t as fast as C++ it only needs to be compiled once, that’s why its special!
Are there tools that help programmers write in HTML and XHTML?
Adobe Dreamweaver and Microsoft Expression Web
summary
chapter
code?
about problems.
understand?
cycle?
play in programming?
task?
507
te n t en
self-test
self-test
chapter
is called
a. a loop.
b. a binary decision.
c. a test condition.
d. a control structure.
defined by their
prior to distribution.
communications.
of rich multimedia.
elements.
a. IDE
b. RAD
c. JAD
d. PDLC
developed?
identification
b. Analysis
c. Design
b. analysis phase.
c. design phase.
phase.
a. a debugger.
b. a problem statement.
c. an algorithm.
d. the SDLC.
a. Beta versions
b. Service packs
c. Documentation updates
d. Maintenance programs
b. Objective C
c. Java
d. ASP
Instructions: Answer the multiple-choice and true–false questions below for more
Multiple Choice
True–False
___F_ 1. When producing the fastest executable program is essential, programmers use a
___T_ 2. Companies release service packs to repair problems after software has been made
commercially available.
___F__ 3. Comments that programmers insert to explain the purpose of the code are written
in binary.
___F_ 4. Each step of the SDLC must be completed before moving on to the next.
___T_ 5. Programmers often use ActionScript to code prototypes for Windows applications.
Database: collection of related data that can be easily stored, sorted, organized and queried
Ex. Facebook news feed and your specified filtering preferences to what you think is relevant
Not every situation, if there isn’t that much information of sorted on a list already
When is a list not appropriate?
If complex information needs to be organized or more than one person needs access to it, a list
not an efficient solution
Data redundancy: retyping information ex. University student members who enrol every
semester
Data inconsistency: if information changes, multiple lists must be updated, and would be easy to
overlook some lists, or how a certain piece of information is entered psyc vs. psychology
Aside from data redundancy and inconsistency, are there any other problems with using
lists instead of databases?
Can’t I just exercise caution and set rules for updating lists?
Still room for errors, inability of the data to be shared, data redundancy
Databases
They: enable information sharing, promote data integrity, and allow flexible use of data
Data centralization: ensures data integrity, information is maintained only in one place
Many different users can access the data, and pull out required information accurately and
consistently
You may need a database administrator: an individual trained in the design and building of
databases to assist with the construction of large databases
Database Terminology
Fields
What is a field?
Primary Keys
Can fields have the same values in the same table?
Yes, two students live in the same town or have the same last name
Primary Key or key field: unique field
Database Types
Relational, object-oriented, and multidimensional
Relational is the most popular
Relational Databases
What is a relational database?
Relational database: organizes data in a table format by logically grouping similar data into a
relation (table that contains related data)
They are linked to each other by including their primary keys in other tables with related
information
Ex. 1 table has contact and id information of student, 2 table has class and courses enrolled in
Object-Oriented Databases
What is an object-oriented database?
Object-oriented databases store data in objects, rather than in tables
Based on programming principles
They can process requests for information faster than can relational databases
Multidimensional Databases
What is a multidimensional database?
Multidimensional database: stores data in more than two dimensional tables
In a cube format where each cube has a measure attribute: main type of data that the cube is
tracking
Other elements are known as feature attributes: which all describe the measure attribute in
some meaningful way
Each feature attribute could have different levels within
What are the advantages of multidimensional databases?
They can easily be customized to provide information to a variety of users (based on their
needs), and they can process data much faster than pure relational databases can
This database design is good for really large databases that offer instant customization to a
users needs ex. eBay
What does a data dictionary look like, and how do I create one?
Microsoft Access: called Field Properties box
1. Field name
2. Define data type
3. Set maximum field size
4. Set a default value for a field: the default value the field has unless the user enters
another value
Attributes such as field type and data are called metadata
Metadata: data that describes other data
What happens if I forgot to define a field in the data dictionary or if I want to add another
one later?
That’s fine; just make sure you have all the data together
Inputting Data
How do I get data into the database?
Input it
Outputting Data
How do I get data out of a database?
Print it
Many-to-many relationship: records in one table being related to multiple records in a second
table and vice versa
Normalization of Data
How do I decide which tables I need and what data to put in them?
Normalization of the data: recording the data only once
How do I get data in the tables to work together now that it is split up?
The tables must have a common field (column)
Foreign key: primary key of another table that is included for purposes of establishing
relationships with that other table, they contain the same data but not necessarily the same field
names
How do I ensure that a foreign key field contains a valid primary key from the related
table?
Enforce referential integrity: for each value in the foreign key of one table, there is a
corresponding value in the primary key of the related table (double checks whether its valid)
Data Storage
Small enterprises= 1 place is acceptable
Large multiple locations of your data= large data repositories called data warehouses and data
marts
Data Warehouses
What is a data warehouse?
Data warehouse: large-scale electronic repository of data that contain and organizes all the data
related to an organization in one place
Internal: includes spreadsheets and other ad hoc analysis tools that may contain data that
needs to be loaded into the warehouse
Data Staging
Does all source data fit into the warehouse?
No two source databases are the same but in different formats
Once the data is stored in the data warehouse. How can it be extracted and used?
Querying, and to get better querying results:
Online analytical processing (OLAP) software provides standardized tools for viewing and
manipulating data in a data warehouse. OLAP tools enable flexible views of the data, which
software users can change easily
Data marts
Is finding the right data in a huge data warehouse difficult?
Data mart: small slices of a data warehouse, it pertains to information related to a single
department
Managing Data: Information Systems
Information system: software-based solution used to gather and analyze information (ex.
Amazon;s president)
Information systems fall into one of five catagories: office support, transaction-processing
systems, management information systems, decision support systems, enterprise resource
planning (ERP)
Transaction-Processing Systems
What is a transaction-processing system?
Transaction-processing system (TPS): keeps track of everyday business activities (invoices,
transactions, useful for Universities)
Knowledge-Base Systems
What is a knowledge-based system, and how is it used in decision support systems?
Knowledge-based support system: provides additional intelligence that supplements the user’s
own intellect and makes the DSS more effective, it can be an expert system: tried to replicate
the decision-making process of human experts to solve specific problems
Another knowledge-base system is a natural language processing (NLP) system: enables users
to communicate with computer systems using a natural spoken or written language instead of
using a computer programming language (speaking to a computer, speech recognition)
All knowledge-based systems fall under AI
Artificial Intelligence (AI): branch f computer science to create computers that think like humans
Data mining
Data mining: process by which great amounts of data are analyzed and investigated
The objective is to spot significant patterns or trends within the data that would otherwise not be
obvious
e elevleen ven
summary
summary
chapter
systems do?
database?
summary
in accomplishing their day-to-day tasks and
work?
553
Client/Server Networks
Client/server networks contains severs as well as client computers, they are more
efficient and faster than P2P networks
Client/server networks do all the tasks for the nodes, and that’s known as a centralized
method
Extranet: only certain individuals or corporations can access it, a person can decide
who is permitted into the server
Extranets are useful for enabling electronic data change (EDI) which allows for the
change of large amounts of business data
Servers
What types of servers are found on larger client/server networks?
Dedicated server: server used to fulfill one specific function, such as handling a gaming
server, they help with reducing the load on the main server
File server: server that stores and manages files for network users
Print Servers
How does a print server function?
Print servers: manage all client requested printing jobs for all printers on a network
Application Servers
What function does an application server perform?
Application server: acts as a repository for application software where it can be
accessed, updated, and upgraded
Database Servers
What does a database server do?
Database server: provides client computers with access to information stored in
database at the same time
E-mail Servers
How is e-mail handled on a large client/server network?
E-mail server: process and deliver incoming and outgoing e-mail (like a post carrier)
Communications Servers
What type of communications does a communications server handle?
Communications server: handles all communications between the network and other
networks, including managing Internet connectivity (heavy load, and usually only server
that requires internet)
Web Servers
What function does a Web server perform?
Web Server: host web sites so it will be available through the Internet
They run specialized software such as Apache HTTP server, and Microsoft Internet
Information Services (IIS) that enable them to host Web pages
Network Topologies
Network topologies: physical or logical arrangement of computers, transmission, media
(cable), and other network components
Physical topology: refers to the layout of the “real” components of the network
Logical topology: refers to the virtual connections among network nodes
Bus Topology
What does a bus topology look like?
Bus/linear bus topology: all computers are connected in sequence on a single cable,
this was most often deployed in P2P networks
Now legacy technology with wireless technology that it doesn’t support very well
Data collisions: happens when two computers send data at the same time and the sets
of data collide somewhere in the media, are problems on all networks
On bus topology’s data collusion was fairly common as one communication medium
was used
Bus network is a passive topology as all the nodes listen for the right address
At the end of the bus network there is a terminator that absorbs a signal that didn’t go
through to a node
What are the advantages and disadvantages of bus networks?
Low cost, simplicity
Break in the medium causes communication disruptions
Ring Topology
What does a ring topology look like?
Ring/loop topology: data flows around a circle from device to device in one direction
Data packets are sent in token
Ring/loop is commonly called token-ring topology
Token method: when token is completed in transmission, the sending node creates a
new token
Ring topology: means that nodes participate in moving data through the network, large
networks have the capability to use multiple tokens to help move data faster
Star Topology
What is the layout for a star topology?
Star topology: most widely deployed client/server network layout today
The nodes connect to a central communications device called a switch in a pattern
resembling a star, the switch receives a signal from the sending node and retransmits it
to the node on the network that needs to receive the signal
Comparing Topologies
What topology is the best one?
Transmission Media
Transmission media: comprises of the routes that data takes to flow between devices
on the network
Twisted-Pair Cable
What does twisted-pair cable look like?
Twisted-pair cable: consists of pairs of copper wires twisted around each other and
covered by protective sheath
Shielded twisted-pair cable (STP): if the wire has a layer of foil around it
Unshielded twisted-pair (UTP) cable: if it doesn’t have a layer of foil around it
Coaxial Cable
What does coaxial cable look like?
Coaxial cable: used for televisions: the core, solid layer of nonconductive insulating
material, layer of braided metal shielded covers the insulation from interference,
external jacket of light weight plastic covers the internal cable components
Fiber-Optic Cable
What does fiber-optic cable look like?
Fiber-optic cable: comprised of a glass or plastic fiber through which the data is
transmitted
How does fiber-optic cable differ from twisted-pair and coaxial cable?
Electric and light transmission of signals, the fiber-optic is not affected by EMI, and RFI
Wireless Media Options
What wireless media options are there?
Wireless media: usually add-ons that extend or improve access to a wired network
Proprietary networking protocols that exist: Novell Internetwork Packet Exchange (IPX),
Microsoft NetBIOS Extended User Interface (NetBEUI), an Apple File Protocol (AFP)
Network Adapters
Network adapters: devices that perform specific tasks to enable computers to
communicate on a network, they are called network interface cards (NIC) on computers
Are MAC addresses useful for anything besides identifying a particular network
device?
They can be used to enhance network security
Only authorized MAC addresses can be allowed on a network
Are switches sufficient for moving data efficiently across all sizes of networks?
Larger networks need the network to be broken down into multiple segments known as
collision domains
Bridge: a device that is used to send data between these different collision domains
Routers
What device does a network use to move data to another network?
Router: looks at IP addresses
Access Privileges
How can I gain access to everything on the college network?
Unless you’re the admin
Aside from improper access, how else do data theft and destruction occur?
Industrial espionage, stealing documents
Flash drives could have Trojan horses on them, and they could act as “skeleton keys” to
the company’s network
How should network administrators protect their networks from portable storage
devices?
1. Educate employees
2. Create policies regulating the use of media in the workplace
3. Install security measures such as firewalls and antivirus software
4. Lock USB drives: DeviceLock and Safend
Firewalls
Is the college Internet connection vulnerable to hackers?
Yes
Does the firewall on my college’s network work the same way as a personal
firewall installed on a home network does?
Use packet screening: makes sure data packets are valid by internal network users,
works also when data is leaving the network, to make sure no Trojan horses are
emitting data
What other security measures does the firewall on a client/server networks use?
Bastion host: heavily secured server located on a special perimeter network between
the company’s secure internal network and the firewall
If a hacker attacks a bastion host, the internal network is still safe, and the attack can be
detected
chapter
navigation devices.
do?
a Web site.
planning a network?
resources).
business network?
connection.
of client/server networks?
networks (MANs).
network.
the network.
computers to participate in a
client/server network?
summary
Second, it breaks the data generated by
computer.
legitimate user.
Multiple Choice
1. Which of the following is not an advantage
of installing a client/server
network in a college?
a. Increased scalability
b. Decentralization of network
security protection
c. Sharing of files and data
d. Sharing of peripherals
in large businesses?
peer-to-peer networks.
networks.
centralized security.
a. WAN. c. PAN.
b. MAN. d. LAN.
a. Network adapters
b. Database server
c. Transmission media
d. NOS software
a. Database
b. Authentication
c. Communications
d. Application
a. Star c. Ring
b. Ethernet d. Bus
when
is not present.
cost.
8. NOS software is
client/server networks.
client/server network.
in a client/server network.
d. needed only when configuring a
networks.
a. authentication.
b. packet screening.
True–False
___T_ 1. Bridges are used to route data between two or more network collision domains.
___T_ 2. Two different types of network topologies can be deployed on the same network.
No one, but Government entities like NASA own part of the communications infrastructure
Non-profit organizations
Me and you!
The National Science Foundation (NSF) still pays for a large portion of the Internet’s
infrastructure and funds research and development of new technologies
Internet Networking
Network access points (NAPs): they were designed to move large amounts of data quickly
between networks
Client/server model
Web server
Commerce server
File server
Open system: its design would be made public access by any interested party
Circuit switching: a dedicated connection is formed between two points, and the connection
remains active for the duration of the transmission
This is inefficient with computers, as computers transmits data in a group (or burst) which has
moments of inactivity
Packet Switching
Packets contain:
Why do packets take different routes, and how do they decide which routes to use
Routers that connect ISPs decide which is the most efficient route
TCP/IP
IP Addresses
What is an IP address?
Unique identification number that defines each computer, service, or other device that connects
to the Internet
IP addresses must be registered with the Internet Corporation for Assigned Names and
Numbers (ICANN)
Classless interdomain routing (CIDER): allows a single IP address to represent several unique
IP addresses by adding a network prefix (a slash and number at the end of the last octet
Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP)
which belongs to the TCP/IP protocol suite
The ISP gives the user an IP address from a pool of available addresses
Connection-oriented protocol: two computers set-up the parameters before exchanging data this
is known as handshaking
Domain Names
Top-level domain (TLD) are standardized pools that have been established by ICANN
ICANN had VeriSign to oversee each TLD and domain name registrar for the .com and .net
domains
DNS Servers
The URL must be converted into an IP address, to do this the computer consults a database
that is maintained on a DNS (domain name system) server that functions like a phone book for
the Internet
If the search fals the ISP’s Web server will contact one of 13 root DNS servers, each DNS
server knows the location of all the DNS servers that contain the master listings for an entire
top-level domain, and the computer stores the DNS server in its cache for future use
File transfer protocol (FTP): enables users to share files that reside on local computers with
remote computers
Can you upload files with FTP?
Most FTP sites allow you to upload files, you need a browser that handles FTP transfers or you
need to obtain an FTP client application
Telnet
What is Telnet?
Telnet: both a protocol for connecting to a remote computer and a TCP/IP service that runs on a
remote computer to make it accessible to other computers
Telnet enables you to take control of remote computer (the server) with your computer (the
client) and manipulate files and data on the server as if the server were your own computer.
Used in school networks
WWW is actually a group of protocols and software that resides on the Internet
The Web provides an engaging interface for exchanging graphics, video, animations, and other
multimedia over the Internet
HTTP and SSL
Hypertext documents are documents in which texts linked to other documents or media (video
clips)
When the browser sends a request, does it do anything to make the information secure?
Transport layer security (TLS) and the secure socket layer (TLS) are two protocols that provide
data integrity an security for transmissions over the Internet
HTML/XHTML
They are set of rules from marking up blocks of text so that a browser knows how to display
them
XML
Users can build their own markup languages to accommodate particular data formats and
needs
No they were just used for text based arrangements not interactivity
Common gateway interface (CGI) provides a methodology for which your browser can request
for a program to be executed instead of just being delivered to the browser
Perl, C, C++
All programs are placed in a Cgi-bin directory, which the web site knows that these are
programs that must be executed
This runs on a Web Server rather than inside your browser, it is referred to as a server-side
program
Dynamic HTML
Can Web pages be made more interactive without accessing Web servers?
AJAX facilitates Web application creation, and doesn’t require Web site refreshment for
updating
What is JavaScript?
Cascading style sheet (CSS) is a list of statements that defines in one single location how to
display HTML/XHTML elements
With a hierarchy of rules such as background color, the “cascade” of style are ranked according
to their assigned weights
Document object model (DOM) to organize the objects and page elements
Client-Side Applications
Aside from CGI scripts, are there other ways to make a Web site interactive?
Client-side program that has the program running on the client server
The code must be embedded into the HTML/XHTML code using an HTML/XHTML embedded
scripting language
Most populat is JavaScript
Ray Tomlinson
Simple mail transfer (SMTP): responsible for sending e-mail along the Internet to its destination
Uuencode and uudecode were the most popular programs used for encoding and decoding
binary files
1990’s the multipurpose Internet mail extensions (MIME) specification was introduced in 1991 to
simplify attachments
Encryption: refers to the process of coding you e-mail so that only the person with the key to
code can decode and read the message
Two types:
Private-key encryption: between two parties, where there is a simple shift of letter to new
positions
Public-key encryption: two keys known as a key pair are created, the key for coding is generally
a public key, and the person who wants to open the code can message you asking for the code
When you receive the message you use your private key to decode it
What type of encryption is used on the Internet?
Pretty Good Privacy (PGP) are tried and true public-key packages
A key is a binary number, 10-bit key has 10 positions and might look like: 1001101011
Yes, its impossible to deduce the private key from the public key, but it can be hacked using
brute force
128-bit key
Securus Systems Ltd. Have developed secure data transmission software that works outside
the conventional SMTP mail servers
A safe point to point connection is established between the sender’ and recipient’s e-mail boxes
Instant Messaging
Cheaper
Firewall, antivirus
What types of businesses can benefit the most from cloud computing?
Businesses that need to process large amounts of data every once in a while
th i t hrteiernteen
summary
summary
chapter
communications?
used for?
Internet?
Internet’s costs.
components interact?
on the Internet.
chapter
authorized recipients.
company-owned IT departments. A
using
a. points of presence.
d. Web servers.
e-mail.
of Homeland Security.
browser
computing?
a. Increase in IT employee
headcount
costs
d. Difficulty in increasing
computing capacity
the Internet?
a. DNS c. XHTML
b. IP d. PGP
a. circuit switching.
b. protocol switching.
c. DNS switching.
d. packet switching.
represented by an alphanumeric
a. URL.
b. SMTP.
c. routing address.
d. DNS address.
a. called static.
b. more secure.
c. called dynamic.
d. volatile.
a. JavaScript
b. Telnet
c. HTTP
d. TCP/IP
possible?
a. HTML c. FTP
b. CGI d. XML
Instructions: Answer the multiple-choice and true–false questions below for more
Multiple Choice
True–False
__F__ 1. The costs associated with running the Internet are paid primarily through ISPs
collecting fees from customers and from funding by U.S. government agencies.
_F___ 3. A computer needs the XML address to locate a Web page accurately.
___F_ 5. Instant messages are generally secure because it provides a message encryption
software
Altair 8800 first personal computer for $395 or $498 for already built, just had 256bytes of
memory
Worked by entering strings of 1’s and 0’s by flashing lights on the front
Bill Gates and Paul Allen created a program that translates user commands into commands that
the computer can understand (compiling program). Which they sold to Ed Roberts the Altair
developer, The boys later created Microsoft
Steve Wozniak who brought his computer ideas ad prototypes to the Homebrew Computing
Club in Palo Alto
Steve Jobs liked Woz’s ideas and they created the Apple 1.
1977 Apple 2 was born, it had ROM instead of RAM which didn’t require the whole start up to be
rewritten, it was also easier to program for computer enthusiasts
Apple 3 made in 1980, had word processor, spreadsheet, and desktop publishing software
Steve Jobs called the company Apple because it was the perfect fruit it was high in nutrients,
and not easily damaged
The Osborne
Created the first portable computer in April 1988, because it was portable it was an instant
success
Included 64kb of memory, had floppy disk drives, word processing, and spreadsheet
The successor called the executive decreased sales of the Osborne, and the Compaq company
bought Osborne design.
IMB PCs
Started with large mainframe computers for corporations in 1980, and then created its first
personal computer named the IBM PC, where the PC term became the term to describe all
personal computers.
The IBM Pc dominated the field in Jan. 1983.
Starting languages of: Fortran, Algol, and Cobol which were used to created business financial,
statistical, and engineering programs
Beginner All-Purpose Symbolic Instruction Code (BASIC) was created in 1964. It allowed for an
easy way for early programmers to learn programming. Bill Gates wrote his Altair program with
it.
First Apple Computers ran The Control Program for Microcomputers (CP/M), founded by Gary
Kildall
Microsoft created the MS-DOS for IBM computers, which was based on Quick and Dirty
Operating System (QDOS)
Dan Brinklin and Bob Frankston created the program VisiCalc, a spreadsheet program
Xerox
Xerox worked on the Alto computer which worked on a What you see is what you get
(WYSIWYG) principle, which had files and folders to organize file management. It created the
Star Office System but it was too expensive for anyone to buy.
Apple created a cheaper one called the Macintosh, also had smaller floppy drives
Now it was easy to work on computers with a GUI, and people plunged into the attraction of the
internet boom in 1993
Silicon Graphics Inc. by Andreessen created the Netscape commercial Web browser, but it was
later pushed out of business from Microsoft
The Pascalane was the first accurate calculator created by Blaise Pascal in 1642, it could do all
simple calculation (+-/*)
200 Years later Joseph Jacquard created the Jacquard Loom which was an automated weaving
complex that relied on punch card process, which was adopted later on for computers
Babbage’s Engine
Charles Babbage in 1834 designed the first automatic calculator called the Analytical Engine.
Babbage was called the father of computing, as his computer had the Ram and processing
capabilities
Herman Hollerith in 1890, used Jacquard’s punch card concept and apply it to the machine
Hollerith Tabulating Machine, and started the IBM company (international business machines)
because of its success.
Konrad Zuse created the Z1 in 1936, had control unit and separate memory functions
Late 1939 John Atanasoff built the first electrically powered digital computer called the
Atanasoff-Berry Computer (ABC), first to use vacuum tubes instead of switches to store data,
first to use a binary system, have memory that repowered itself upon booting.
Howard Aiken and Grace Hopper designed the Mark between 1930’s and 1950. It could do all
four arithmetic operations (+-/*)
Hopper inventor the compiler a program that translates English language instructions into
computer language, he was the first to “debug” a computer when a moth that has flown into the
computer.
In 1936 Alan Turing created the hypothetical model that mathematically designed a mechanical
procedure or algorithim. The concept could read, write, and erase symbols written on squares of
infinit tape, this was he precursor to todays RAM.
The ENIAC
The Electronic Numerical Integrator and Computer (ENIAC), a machine used by the army to
calculate the settings used to weapons. It was created by John W. Mauchly and J.Presper
Eckert. It was big and clumsy it used a lot of vacuum tubes and square feet. It was used until
1955.
The UNIVAC
The Universal Automatic Computer completed in 1951 and manufactured by Remington Rand.
It ran on magnetic tape rather than punch cards. It became popular by predicting the outcome of
the Stevenson-Eisenhower presidential race. After that it was considered first-generation
computers and was the last to use computer vacuum tubes to store data.
Scientists at the Bell Telephone Laboratories in New Jersey created the transistor which was
other means of storing data. Computers that used these were considered second generation
computers.
In 1958 Jack Kilby invented the first integrated circuit, which had many small transistors within it,
making the computers smaller and lighter. The computers with circuits were considered third
generation computers.
In 1971 Intel created a microprocessor chip, which contained millions of transistors; it was the
CPU or brains of the computer. These computers were considered fourth generation computers
Multiple Choice: