Wednesday, April 10, 2019



statements of cash flow


  • usefulness of the statements of cash flows 
  • provides information to help asses 
  • entity ability to generate future cash flows 
  • entity ability to pay dividends and meet obligatclaions 
  • reasons for difference between net income and net cash provided (used) by operating activities 
  • cash investing and financing transactions during the period 
  • classification of cash flows 
  • operating activities 
  • investing activities 
  • financing activities 
  • cash flow from operating activities 
  • net income       -$145k 
  • any dep, amouunts, depletion, add back +$9000 
  • any loss or going ( do the opposite) +$3000
  • any increase or decrease in accounts receivable (asset) do the same  
  • BS of 2015 and 2016 
  • Current Asset - Accounts Receivable $3500
  • change decrease of 10000 
  • B/S; any increase or decrease in A/R do the deposit +$10000
  • BS; any increase or decrease in current liability (do the same ) +$16000
  • current liability A/P 10000 - 26000 
  • CS 100k      120k     change of 20k 
  • cash 33k

Tuesday, April 25, 2017

Databases: building solutions: databases

  • database definition
    • database management system (DBMS)
      • access, oracle etc.
    • Database application system (DBAS)
      • student enrollment management system, enrollment management system
  • data and information
    • data
      • unprocessed
    • information
      • processed
  • data processing
    • data integrity
      • database is a valid as the correctness of the information stored and processed
      • GIGO ( Garbage in Garbage Out
  • data processing
    • data integrity
      • database is as valid as the correctness of the information stored and processed
      • GIGO ( garbage in Garbage Out)
  • good information characteristics
    • accurate
    • verifiable
    • timely
    • organized
    • accessible
    • useful and informative
    • cost-effective
  • data hierarchy
    • data server
    • database application 1
      • table 1.1
      • table 1,2
        • record 1
        • record 2
          • field 1 (primary)
          • field 2  
    • data application 2
      • table 2.1
  • data types
    • text
    • numeric
    • auto number
    • currency
    • date
    • memo
    • yes/no
    • hyperlink
    • object
    • attachment
  • maintaining data
    • add
    • modify
    • delete
    • validate
  • data validation
    • alphabetic/numeric check
    • range check
    • consistency check
    • completeness check
    • check digit
  • Evolution of database management systems
    • file processing system
    • hierarchical database systems
    • relational database systems
    • object oriented database systems
    • big data systems
  • new types of database system
    • big data management systems
    • NoSQL database management systems
  • Advantages of Database Systems
    • reduced data redundancy
    • improved data integrity
    • efficiently shared data
    • relatively simple development
  • access database components
    • tables
    • queries
    • forms
    • reports
    • macros
    • modules
    • visual programming (visual basic)
  • relational database
    • the entity-relationship model
    • entities (objects)
      • students, classes etc.
    • relationships
      • enrollment ( student to classes)
  • types of relationships
    • one-to-one
    • one-to-many
    • a design example
      • creating tables to capture a database
  • querying the tables and the database
    • query by example
    • query language
      • SQL is the most popular query language
  • other database models
    • objects oriented database model
      • contains code and data
    • multidimensional database
      • in comparison, relational database is a two-dimensional database
    • web database
      • back end database to a fron-end web serve
    • big data
    • NoSQL
  • database personnel
    • database analyst
    • database adminstrators
    • database users
    • big data analyst
  • other database terms
    • data warehouse
    • data marts
    • data mining
  • big data
    • the processing of large amount of data
      • facebook
      • supermarket customer data

Data Communications

  • basic components
    • sender
    • receiver
    • communication medium
    • communication channel
    • communication session
  • communication application
    • blogs
    • chat rooms
    • email
    • fax
    • FTP
    • Instant messaging
    • Internet
    • Newsgroups
    • RSS
    • Video conferencing
    • VoIP
    • Web
    • Web 2.0
    • Web folders
    • Wikis
  • Internet Access Points
    • Unsecure access
    • secure access
  • WiMAX and Wi-Fi
    • Wi-Max
      • longer range and service offered by a provider
      • 4g,5g, etc.
    • Wi-Fi
      • shorter range locally managed
      • Hot spots
    • Wi-Di
      • wireless display
      • miracast
  • Collaboration
    • etherpad
    • teamviewer
    • google docs
    • office 365
    • others
  •  collaboration in cloud computing
    • google apps
      • google sites
      • google docs
      • google hangout
    • google+
  • office 365
    • office suite
    • onedrive
    • sharepoint
  • popular collaborative application with sharepont
    • online meetings
    • web conferences
    • document management systems
  • web technologies
    • web1.0
    • web 2.0
  • networks
    • LANs
      • WLANs
    • Campus Network
    • MANs
    • WANs
  • Network Types
    • Peer-to-Peer networks (p2p)
    • client server networks
    • internet peer-to-peer networks
    • Internet may also hos a client-server network
  • network topologies
    • star network
    • bus network
    • ring network
  • network technologies
    • Ethernet
    • token ring
    • TCP/IP
    • Wi-Fi
    • Bluetooth
    • UWB
    • IrDA
    • RFID
    • Wi MAX
    • NFC
  • Communication Lines
    • ISDN
    • DSL
    • Cable
    • FTTP
    • FTTH
    • T1
    • T3
    • ATM
    • OC3
  • Communication Software
    • FTP Client
      • CuteFTP
      • WS-FTP
      • FileZilla
      • BIt torrent
      • Github
  • Communication Devices
    • Network Interface card
    • switches
    • routers
      • cable and DSL
    • access points
    • firewalls
  • Home Network Options
    • Ethernet
      • wired
    • power line
    • phone line
    • wireless
  • communication media
    • twisted pair
    • coaxial cable
    • optical fiber
    • wireless
    • space
      • microwave
      • satellite
  • communication path
    • media
    • channel
    • session
    • bandwith measurement
      • broadband
      • baseband
  • space as a transmission media
    • radio
    • TV
    • Wireless
    • etc.

System Unit:Computing Components

  • Module Contents
    • describe the system units
    • motherboard components
    • processor
    • memory expansion slots and cards
    • ports
    • power supply
  • Objective
    • familiarize with the system components to help make a wise decision whe buying and using computers
  • Components of the system unit
    • motherboard
    • processor
    • memory
    • hard disk
    • expansion bus
      • video cards
    • ports
    • other drives and devices
  • the motherboard
    • processor socket
      • intel and other processors
    • memory slots
    • chip set
    • ports
    • expansion slots
  • processor
    • intel
      • Pentium dual core
      • Pentium quad core
      • i3,i5,i7
      • Atom
    • AMD
    • Nvidia
    • ARM
    • Qualcomm
    • Motorola
  •  processor components
    • ALU
    • registers
      • not often shown or mentioned, but present in thee CPU
    • Control Unit
    • Cache
      • L1, L2 etc.


Saturday, April 22, 2017

Digital Security and Ethics

  • Risks
    • Hacker
    • Cracker
    • Script Kiddie
    • Corporate spies
    • Unethical employees
    • Cyber-extortionist
    • cyber-terrorists
  • Types of Risks
    • Virus
      • Antivirus
    • Worm
    • Trojan Hose
      • Anti-spyware
      • Anti-malware
    • Rootkit
      • Anti-Virus
    • Ransomware
  • Risks Explained
    • Computer Virus
      • Affects a computer negatively by altering the way the computer works
    • Worm
      • copies itself repeatedly, using up resources and possibly shutting down the computer or network
    • Trojan Horse
      • A malicious program that hides within or looks like a legitimate program
    • Rootkit
      • Program that hides in a computer and allows someone from a remote location to take full control
  • Symptoms
    • OS running slow, stops intermittently or does not start
    • Less memory available
    • Corrupt files and programs
    • Programs do not operate properly
    • Unknown programs are activated
  • Tools
    • Hardware firewall
    • Software firewall
    • Anti-virus
      • Virus definition and signature
      • Quarantine
    • Anti-malware
    • Malware removal tool
    • Windows update
      • Service Packs
    • Internet security
  • Hardware Firewalls
    • Used for blocking access to ports on computers behind a firewall
    • Hides the IP address behind a private IP address
    • Built into many routers
      • In particular, into wireless routers
  • Hardware Firewall Brands
    • Wireless routers from the following brands have built-in firewalls
      • D-Link, Linksys and NetGear
  • Software Firewall
  • Barrier Against Intruders
    • Hardware firewall
    • Software firewall
  • Likely Source of Viruses
    • Email
      • This is the most likely source of viruses entering a computer
    • Removable disks, or flash disks in general
    • Booting with removable disks
    • Macros in Programs
    • Executing scripts in Web pages
  • Forced Execution
    • Some website would force the execution of a script
      • ctrl-alt-del and ending the task would provide a way out of executing the script
      • In some cases, closing the website would be a way out of executing the script
  • Preventing attacks
    • tips for preventing virus and other malware
      • never start a computer with removable media inserted in the drives or plugged in te ports, unless the media are uninfected
      • Never open an e-mail attachment unless you are expecting it and it is from a trusted source
      • Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it 
      • Install an antivirus program on all of your computers. update the software and the virus signature files regularly
      • scan all downloaded programs for viruses and other malware
      • if the antivirus program flags and e-mail attatchment as infected, delete or quarantine the attatchment immediately
      • before using any removable media, scan the media for malware/ Follow the procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users
      • Install a personal firewall program
      • stay informed about new virus alerts and virus hoaxes
  • Import Considerations in Preventing Attacks
    • Avoid booting a computer with a removable media
    • disable the execution of macros in office documents such as word and excel documents and outlook emails
  •  Cookies
    • cookies are stored on computers by website
    • Information stored in cookies are accessed by the website each time the site is visited
    • cookies can be and possibly should be removed as soon as possible, if not, periodically
  • types of cookies
    • authentication cookies
    • cookies stored by websites
    • third-party tracking cookies
    • Firefox examples
  • Types of Attack
    • botnets
    • denial of service
    • back doors
    • spoofing
    • spamming
  • firewalls
    • Linksys firewall
    • D-link WBR 1310
    • NetGear
  • Software firewalls
    • Windows firewall example
  • Authorizing Access
    • password
    • access auditing
    • possessed object
    • PINs
    • Biometric devices
  • Authentication
    • One factor
    • Two Factor
    • Three Factor
    • Four Factor
  • Certification
    • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity on the sender
    • A digital certificate is a notice that guarantees a user or a Web site is legitimate
      • Issued by a certificate authority
  • Investigating Computer Evidence
    • digital forensics
  • Theft
    • safeguarding against theft
    • software and hardware theft
  • data protection
    • encryption
    • word example
    • using encryption program
      • TrueCrypt - now discontinued
      • VeraCrypt - an alternative to TrueCrypt
      • BitLocker encryption
  • BitLocker and VeraCrypt
    • BitLocker usually encrypts the whole drive
    • It can also encrypt folders
    • VeraCrypt can encrypt part of a drive
  • Encrypting Folders and files
  • Systems Safeguard
    • UPS
    • Backup
    • Hot-pluggable devices
    • Hot-swappable devices
    • RAID
  • Wireless LANs
    • SSID
    • Broadcasting SSID
      • Avoid fro security reason
    • Encryption
  • Wireless Encryption
  • Health Concerns
    • displays
    • repeated typing  
    • Ergonomics
  • Ethics and Accuracy
    • ethics
    • accuracy
    • green computing
  • Code of Conduct
    • Sample IT Code of Conduct
      • Technology may not be used to ham other people
      • employees may not meddle in others files
      • employees may use technology only for purposes in which they have been authorized
      • technology may not be used to steal
      • technology may not be used to bear fake witness
      • employees may not copy or use software illegally
      • employees may not use others' technology resources without authorization
      • employees may not use others' intellectual property as their own
      • employees shall consider the social impact of programs and systems they design
      • employees always should use technology in a way that demonstrates consideration and respect for fellow humans
  •  Copyright
  • Information Privacy
    • electronic profiles
    • cookies
      • removing cookies
    • spyware and adware
    • spam
    • phishing
    • social engineering
  •  Privacy and other IT laws
  • Content Filtering and Blocking
    • Limited access to certain parts of the website
      • ex: access to library database requires a password
    • prevent access to certain websites
  • Security Concerns
    • Phishing
    • Spyware
    • Adware
    • Social Engineering

Application Software: Programs and Apps

  • Types of Software
    • System Software
      • OS
      • Utilities
    • Application Software
      • Application toos (excel)
      • Application development software (Access C#, Java etc.)
      • Applications (GET)
  • Cloud Software
    • The new trend is to offer Software as a service
    • example:
      • office 365
    • SaaS will be the trend of the future for all types of software
      • Personal productivity software and business application software
  • Cloud software examples
    • office 365
    • Salesforce.com
    • QuickBooks online
    • ERP software
      • EPICOR
      • Microsoft Dynamics
      • SAP
  • Advantage of Cloud software
    • Maintaining, updating and securing the software are the responsibility of the software service provider
    • The user pays for the service based on time and resource usage
    • Example: Pay for time usage and power of the virtual computer configured
  • Software User Interface
    • Graphical User Interface
    • Command Line
      • cmd command examples
      • Run as an administrator option
  • Categories off Application Software
    • Business
      • word processing
      • spreadsheet
      • database
      • presentation
      • note taking
      • personal information manager (PIM)
      • Business Software for photos
      • Business Software Suite
      • Project management
      • Accounting
      • Document Managements
      • Enterprise Computing
    • Graphics and Multimedia
      • Computer Aided Design (CAD)
      • Desktop Publishing ( for the Professional)
      • Paint/image Editing ( for the professional)
      • Photo  Editing ( for the Professional)
      • Video and Audio Editing ( for the Professional)
      • Multimedia Authoring
      • Web Page Authoring
    • Home/Personal/Educational
      • Software Suite (for Personal Use)
      • Personal Finance
      • Legal
      • Tax Preperation
      • Desktop Publishing (for Personal Use)
      • Paint/Image Editing ( for Personal Use )
      • Photo Editing and Photo Management ( for personal Use)
      • Clip Art/Image Gallery
      • Video and Audio Editing ( for Personal Use)
      • Home Design/ Landscaping
      • Travel and Mapping
      • Reference and Educational
      • Entertainment
  • Business Software
    • Word Processing
    • Spreadsheet
    • Database
    • Presentation
    • Note taking
    • Personal information management
    • Business software for phones
    • Business software suites
    • Project management
    • Accounting
    • Document management
    • Enterprise application software
  • Software for Students
  • Free and Trial Software
  • Software training and Tutorial for Students
  • Sample Software Applications
    • project management software
    • accounting software
    • document management software
      • google docs
      • office 365
    • enterprise computing software
      • enterprise resource planning
  • Enterprise Resource Planning (ERP)
    • Human Resources
    • Accounting
    • Distribution
    • Marketing
    • Engineering
    • Sales
    • Customer Service
  • Graphics and Multimedia Software
    • Popular Graphics and Multimedia Software
      • Application Software
        • Computer-Aided Design
        • Desktop Publishing ( for the Professional)
        • Paint/ Image Editing ( for the Professional)
        • Photo Editing ( for the Professional)
      • Manufacturer
        • Autodesk
        • Chief Architect
        • Microsoft
        • Adobe
        • Corel
        • Quark
        • Adobe
        • Corel
        • Microsoft
        • Adobe
          Arcadia
        • Nik Software
      • Program Name
        • AutoCAD
        • Chief Architect
        • Visio
        • InDesign
        • Ventura
        • QuarkXPress
        • Illustrator
        • Painter Expression Design
        • Photoshop
        • PhotoPerfect Ultimate
        • Nik Professional Suite