CIS 1200
Wednesday, April 10, 2019
statements of cash flow
- usefulness of the statements of cash flows
- provides information to help asses
- entity ability to generate future cash flows
- entity ability to pay dividends and meet obligatclaions
- reasons for difference between net income and net cash provided (used) by operating activities
- cash investing and financing transactions during the period
- classification of cash flows
- operating activities
- investing activities
- financing activities
- cash flow from operating activities
- net income -$145k
- any dep, amouunts, depletion, add back +$9000
- any loss or going ( do the opposite) +$3000
- any increase or decrease in accounts receivable (asset) do the same
- BS of 2015 and 2016
- Current Asset - Accounts Receivable $3500
- change decrease of 10000
- B/S; any increase or decrease in A/R do the deposit +$10000
- BS; any increase or decrease in current liability (do the same ) +$16000
- current liability A/P 10000 - 26000
- CS 100k 120k change of 20k
- cash 33k
Tuesday, April 25, 2017
Databases: building solutions: databases
- database definition
- database management system (DBMS)
- access, oracle etc.
- Database application system (DBAS)
- student enrollment management system, enrollment management system
- data and information
- data
- unprocessed
- information
- processed
- data processing
- data integrity
- database is a valid as the correctness of the information stored and processed
- GIGO ( Garbage in Garbage Out
- data processing
- data integrity
- database is as valid as the correctness of the information stored and processed
- GIGO ( garbage in Garbage Out)
- good information characteristics
- accurate
- verifiable
- timely
- organized
- accessible
- useful and informative
- cost-effective
- data hierarchy
- data server
- database application 1
- table 1.1
- table 1,2
- record 1
- record 2
- field 1 (primary)
- field 2
- data application 2
- table 2.1
- data types
- text
- numeric
- auto number
- currency
- date
- memo
- yes/no
- hyperlink
- object
- attachment
- maintaining data
- add
- modify
- delete
- validate
- data validation
- alphabetic/numeric check
- range check
- consistency check
- completeness check
- check digit
- Evolution of database management systems
- file processing system
- hierarchical database systems
- relational database systems
- object oriented database systems
- big data systems
- new types of database system
- big data management systems
- NoSQL database management systems
- Advantages of Database Systems
- reduced data redundancy
- improved data integrity
- efficiently shared data
- relatively simple development
- access database components
- tables
- queries
- forms
- reports
- macros
- modules
- visual programming (visual basic)
- relational database
- the entity-relationship model
- entities (objects)
- students, classes etc.
- relationships
- enrollment ( student to classes)
- types of relationships
- one-to-one
- one-to-many
- a design example
- creating tables to capture a database
- querying the tables and the database
- query by example
- query language
- SQL is the most popular query language
- other database models
- objects oriented database model
- contains code and data
- multidimensional database
- in comparison, relational database is a two-dimensional database
- web database
- back end database to a fron-end web serve
- big data
- NoSQL
- database personnel
- database analyst
- database adminstrators
- database users
- big data analyst
- other database terms
- data warehouse
- data marts
- data mining
- big data
- the processing of large amount of data
- supermarket customer data
Data Communications
- basic components
- sender
- receiver
- communication medium
- communication channel
- communication session
- communication application
- blogs
- chat rooms
- fax
- FTP
- Instant messaging
- Internet
- Newsgroups
- RSS
- Video conferencing
- VoIP
- Web
- Web 2.0
- Web folders
- Wikis
- Internet Access Points
- Unsecure access
- secure access
- WiMAX and Wi-Fi
- Wi-Max
- longer range and service offered by a provider
- 4g,5g, etc.
- Wi-Fi
- shorter range locally managed
- Hot spots
- Wi-Di
- wireless display
- miracast
- Collaboration
- etherpad
- teamviewer
- google docs
- office 365
- others
- collaboration in cloud computing
- google apps
- google sites
- google docs
- google hangout
- google+
- office 365
- office suite
- onedrive
- sharepoint
- popular collaborative application with sharepont
- online meetings
- web conferences
- document management systems
- web technologies
- web1.0
- web 2.0
- networks
- LANs
- WLANs
- Campus Network
- MANs
- WANs
- Network Types
- Peer-to-Peer networks (p2p)
- client server networks
- internet peer-to-peer networks
- Internet may also hos a client-server network
- network topologies
- star network
- bus network
- ring network
- network technologies
- Ethernet
- token ring
- TCP/IP
- Wi-Fi
- Bluetooth
- UWB
- IrDA
- RFID
- Wi MAX
- NFC
- Communication Lines
- ISDN
- DSL
- Cable
- FTTP
- FTTH
- T1
- T3
- ATM
- OC3
- Communication Software
- FTP Client
- CuteFTP
- WS-FTP
- FileZilla
- BIt torrent
- Github
- Communication Devices
- Network Interface card
- switches
- routers
- cable and DSL
- access points
- firewalls
- Home Network Options
- Ethernet
- wired
- power line
- phone line
- wireless
- communication media
- twisted pair
- coaxial cable
- optical fiber
- wireless
- space
- microwave
- satellite
- communication path
- media
- channel
- session
- bandwith measurement
- broadband
- baseband
- space as a transmission media
- radio
- TV
- Wireless
- etc.
System Unit:Computing Components
- Module Contents
- describe the system units
- motherboard components
- processor
- memory expansion slots and cards
- ports
- power supply
- Objective
- familiarize with the system components to help make a wise decision whe buying and using computers
- Components of the system unit
- motherboard
- processor
- memory
- hard disk
- expansion bus
- video cards
- ports
- other drives and devices
- the motherboard
- processor socket
- intel and other processors
- memory slots
- chip set
- ports
- expansion slots
- processor
- intel
- Pentium dual core
- Pentium quad core
- i3,i5,i7
- Atom
- AMD
- Nvidia
- ARM
- Qualcomm
- Motorola
- processor components
- ALU
- registers
- not often shown or mentioned, but present in thee CPU
- Control Unit
- Cache
- L1, L2 etc.
Saturday, April 22, 2017
Digital Security and Ethics
- Risks
- Hacker
- Cracker
- Script Kiddie
- Corporate spies
- Unethical employees
- Cyber-extortionist
- cyber-terrorists
- Types of Risks
- Virus
- Antivirus
- Worm
- Trojan Hose
- Anti-spyware
- Anti-malware
- Rootkit
- Anti-Virus
- Ransomware
- Risks Explained
- Computer Virus
- Affects a computer negatively by altering the way the computer works
- Worm
- copies itself repeatedly, using up resources and possibly shutting down the computer or network
- Trojan Horse
- A malicious program that hides within or looks like a legitimate program
- Rootkit
- Program that hides in a computer and allows someone from a remote location to take full control
- Symptoms
- OS running slow, stops intermittently or does not start
- Less memory available
- Corrupt files and programs
- Programs do not operate properly
- Unknown programs are activated
- Tools
- Hardware firewall
- Software firewall
- Anti-virus
- Virus definition and signature
- Quarantine
- Anti-malware
- Malware removal tool
- Windows update
- Service Packs
- Internet security
- Hardware Firewalls
- Used for blocking access to ports on computers behind a firewall
- Hides the IP address behind a private IP address
- Built into many routers
- In particular, into wireless routers
- Hardware Firewall Brands
- Wireless routers from the following brands have built-in firewalls
- D-Link, Linksys and NetGear
- Software Firewall
- Blocks access to ports on individual computers
- Example:
- Windows Firewall
- Zone Alarm Pro
- Software Firewalls are also built into security suites such as Norton Internet Security and McAfee Internet Security suites
- http://www.toptenreviews.com/software/privacy/best-personal-firewall-software/
- Barrier Against Intruders
- Hardware firewall
- Software firewall
- Likely Source of Viruses
- This is the most likely source of viruses entering a computer
- Removable disks, or flash disks in general
- Booting with removable disks
- Macros in Programs
- Executing scripts in Web pages
- Forced Execution
- Some website would force the execution of a script
- ctrl-alt-del and ending the task would provide a way out of executing the script
- In some cases, closing the website would be a way out of executing the script
- Preventing attacks
- tips for preventing virus and other malware
- never start a computer with removable media inserted in the drives or plugged in te ports, unless the media are uninfected
- Never open an e-mail attachment unless you are expecting it and it is from a trusted source
- Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it
- Install an antivirus program on all of your computers. update the software and the virus signature files regularly
- scan all downloaded programs for viruses and other malware
- if the antivirus program flags and e-mail attatchment as infected, delete or quarantine the attatchment immediately
- before using any removable media, scan the media for malware/ Follow the procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users
- Install a personal firewall program
- stay informed about new virus alerts and virus hoaxes
- Import Considerations in Preventing Attacks
- Avoid booting a computer with a removable media
- disable the execution of macros in office documents such as word and excel documents and outlook emails
- Cookies
- cookies are stored on computers by website
- Information stored in cookies are accessed by the website each time the site is visited
- cookies can be and possibly should be removed as soon as possible, if not, periodically
- types of cookies
- authentication cookies
- cookies stored by websites
- third-party tracking cookies
- Firefox examples
- Types of Attack
- botnets
- denial of service
- back doors
- spoofing
- spamming
- firewalls
- Linksys firewall
- D-link WBR 1310
- NetGear
- Software firewalls
- Windows firewall example
- Authorizing Access
- password
- access auditing
- possessed object
- PINs
- Biometric devices
- Authentication
- One factor
- Two Factor
- Three Factor
- Four Factor
- Certification
- A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity on the sender
- A digital certificate is a notice that guarantees a user or a Web site is legitimate
- Issued by a certificate authority
- Investigating Computer Evidence
- digital forensics
- Theft
- safeguarding against theft
- software and hardware theft
- data protection
- encryption
- word example
- using encryption program
- TrueCrypt - now discontinued
- VeraCrypt - an alternative to TrueCrypt
- BitLocker encryption
- BitLocker and VeraCrypt
- BitLocker usually encrypts the whole drive
- It can also encrypt folders
- VeraCrypt can encrypt part of a drive
- Encrypting Folders and files
- selectively encrypting folders
- Encrypting Office 2013 documents
- Systems Safeguard
- UPS
- Backup
- Hot-pluggable devices
- Hot-swappable devices
- RAID
- Wireless LANs
- SSID
- Broadcasting SSID
- Avoid fro security reason
- Encryption
- Wireless Encryption
- WEP
- WPA
- 802.11i
- WPA2-Personal
- WPA2-Enterprise
- Securing your wireless connection
- Health Concerns
- displays
- repeated typing
- Ergonomics
- Ethics and Accuracy
- ethics
- accuracy
- green computing
- Code of Conduct
- Sample IT Code of Conduct
- Technology may not be used to ham other people
- employees may not meddle in others files
- employees may use technology only for purposes in which they have been authorized
- technology may not be used to steal
- technology may not be used to bear fake witness
- employees may not copy or use software illegally
- employees may not use others' technology resources without authorization
- employees may not use others' intellectual property as their own
- employees shall consider the social impact of programs and systems they design
- employees always should use technology in a way that demonstrates consideration and respect for fellow humans
- Copyright
- copyright
- open source
- freeware
- shareware
- http://download.cnet.com/windows/
- audacity
- Information Privacy
- electronic profiles
- cookies
- removing cookies
- spyware and adware
- spam
- phishing
- social engineering
- Privacy and other IT laws
- IT Law
- Content Filtering and Blocking
- Limited access to certain parts of the website
- ex: access to library database requires a password
- prevent access to certain websites
- Security Concerns
- Phishing
- Spyware
- Adware
- Social Engineering
Application Software: Programs and Apps
- Types of Software
- System Software
- OS
- Utilities
- Application Software
- Application toos (excel)
- Application development software (Access C#, Java etc.)
- Applications (GET)
- Cloud Software
- The new trend is to offer Software as a service
- example:
- office 365
- SaaS will be the trend of the future for all types of software
- Personal productivity software and business application software
- Cloud software examples
- office 365
- Salesforce.com
- QuickBooks online
- ERP software
- EPICOR
- Microsoft Dynamics
- SAP
- Advantage of Cloud software
- Maintaining, updating and securing the software are the responsibility of the software service provider
- The user pays for the service based on time and resource usage
- Example: Pay for time usage and power of the virtual computer configured
- Software User Interface
- Graphical User Interface
- Command Line
- cmd command examples
- Run as an administrator option
- Categories off Application Software
- Business
- word processing
- spreadsheet
- database
- presentation
- note taking
- personal information manager (PIM)
- Business Software for photos
- Business Software Suite
- Project management
- Accounting
- Document Managements
- Enterprise Computing
- Graphics and Multimedia
- Computer Aided Design (CAD)
- Desktop Publishing ( for the Professional)
- Paint/image Editing ( for the professional)
- Photo Editing ( for the Professional)
- Video and Audio Editing ( for the Professional)
- Multimedia Authoring
- Web Page Authoring
- Home/Personal/Educational
- Software Suite (for Personal Use)
- Personal Finance
- Legal
- Tax Preperation
- Desktop Publishing (for Personal Use)
- Paint/Image Editing ( for Personal Use )
- Photo Editing and Photo Management ( for personal Use)
- Clip Art/Image Gallery
- Video and Audio Editing ( for Personal Use)
- Home Design/ Landscaping
- Travel and Mapping
- Reference and Educational
- Entertainment
- Business Software
- Word Processing
- Spreadsheet
- Database
- Presentation
- Note taking
- Personal information management
- Business software for phones
- Business software suites
- Project management
- Accounting
- Document management
- Enterprise application software
- Software for Students
- Dream Sparks
- CIS majors
- Office
- Office.com
- Other free software
- Free and Trial Software
- www.download.com
- a good free audio editing software
- Audacity
- Software training and Tutorial for Students
- http://lynda.calstatela.edu
- an excellent collection of software and other tutorials available free of charge for students
- Sample Software Applications
- project management software
- accounting software
- document management software
- google docs
- office 365
- enterprise computing software
- enterprise resource planning
- Enterprise Resource Planning (ERP)
- Human Resources
- Accounting
- Distribution
- Marketing
- Engineering
- Sales
- Customer Service
- Graphics and Multimedia Software
- Popular Graphics and Multimedia Software
- Application Software
- Computer-Aided Design
- Desktop Publishing ( for the Professional)
- Paint/ Image Editing ( for the Professional)
- Photo Editing ( for the Professional)
- Manufacturer
- Autodesk
- Chief Architect
- Microsoft
- Adobe
- Corel
- Quark
- Adobe
- Corel
- Microsoft
- Adobe
Arcadia - Nik Software
- Program Name
- AutoCAD
- Chief Architect
- Visio
- InDesign
- Ventura
- QuarkXPress
- Illustrator
- Painter Expression Design
- Photoshop
- PhotoPerfect Ultimate
- Nik Professional Suite
Subscribe to:
Comments (Atom)

