- database definition
- database management system (DBMS)
- access, oracle etc.
- Database application system (DBAS)
- student enrollment management system, enrollment management system
- data and information
- data
- unprocessed
- information
- processed
- data processing
- data integrity
- database is a valid as the correctness of the information stored and processed
- GIGO ( Garbage in Garbage Out
- data processing
- data integrity
- database is as valid as the correctness of the information stored and processed
- GIGO ( garbage in Garbage Out)
- good information characteristics
- accurate
- verifiable
- timely
- organized
- accessible
- useful and informative
- cost-effective
- data hierarchy
- data server
- database application 1
- table 1.1
- table 1,2
- record 1
- record 2
- field 1 (primary)
- field 2
- data application 2
- table 2.1
- data types
- text
- numeric
- auto number
- currency
- date
- memo
- yes/no
- hyperlink
- object
- attachment
- maintaining data
- add
- modify
- delete
- validate
- data validation
- alphabetic/numeric check
- range check
- consistency check
- completeness check
- check digit
- Evolution of database management systems
- file processing system
- hierarchical database systems
- relational database systems
- object oriented database systems
- big data systems
- new types of database system
- big data management systems
- NoSQL database management systems
- Advantages of Database Systems
- reduced data redundancy
- improved data integrity
- efficiently shared data
- relatively simple development
- access database components
- tables
- queries
- forms
- reports
- macros
- modules
- visual programming (visual basic)
- relational database
- the entity-relationship model
- entities (objects)
- students, classes etc.
- relationships
- enrollment ( student to classes)
- types of relationships
- one-to-one
- one-to-many
- a design example
- creating tables to capture a database
- querying the tables and the database
- query by example
- query language
- SQL is the most popular query language
- other database models
- objects oriented database model
- contains code and data
- multidimensional database
- in comparison, relational database is a two-dimensional database
- web database
- back end database to a fron-end web serve
- big data
- NoSQL
- database personnel
- database analyst
- database adminstrators
- database users
- big data analyst
- other database terms
- data warehouse
- data marts
- data mining
- big data
- the processing of large amount of data
- supermarket customer data
Tuesday, April 25, 2017
Databases: building solutions: databases
Data Communications
- basic components
- sender
- receiver
- communication medium
- communication channel
- communication session
- communication application
- blogs
- chat rooms
- fax
- FTP
- Instant messaging
- Internet
- Newsgroups
- RSS
- Video conferencing
- VoIP
- Web
- Web 2.0
- Web folders
- Wikis
- Internet Access Points
- Unsecure access
- secure access
- WiMAX and Wi-Fi
- Wi-Max
- longer range and service offered by a provider
- 4g,5g, etc.
- Wi-Fi
- shorter range locally managed
- Hot spots
- Wi-Di
- wireless display
- miracast
- Collaboration
- etherpad
- teamviewer
- google docs
- office 365
- others
- collaboration in cloud computing
- google apps
- google sites
- google docs
- google hangout
- google+
- office 365
- office suite
- onedrive
- sharepoint
- popular collaborative application with sharepont
- online meetings
- web conferences
- document management systems
- web technologies
- web1.0
- web 2.0
- networks
- LANs
- WLANs
- Campus Network
- MANs
- WANs
- Network Types
- Peer-to-Peer networks (p2p)
- client server networks
- internet peer-to-peer networks
- Internet may also hos a client-server network
- network topologies
- star network
- bus network
- ring network
- network technologies
- Ethernet
- token ring
- TCP/IP
- Wi-Fi
- Bluetooth
- UWB
- IrDA
- RFID
- Wi MAX
- NFC
- Communication Lines
- ISDN
- DSL
- Cable
- FTTP
- FTTH
- T1
- T3
- ATM
- OC3
- Communication Software
- FTP Client
- CuteFTP
- WS-FTP
- FileZilla
- BIt torrent
- Github
- Communication Devices
- Network Interface card
- switches
- routers
- cable and DSL
- access points
- firewalls
- Home Network Options
- Ethernet
- wired
- power line
- phone line
- wireless
- communication media
- twisted pair
- coaxial cable
- optical fiber
- wireless
- space
- microwave
- satellite
- communication path
- media
- channel
- session
- bandwith measurement
- broadband
- baseband
- space as a transmission media
- radio
- TV
- Wireless
- etc.
System Unit:Computing Components
- Module Contents
- describe the system units
- motherboard components
- processor
- memory expansion slots and cards
- ports
- power supply
- Objective
- familiarize with the system components to help make a wise decision whe buying and using computers
- Components of the system unit
- motherboard
- processor
- memory
- hard disk
- expansion bus
- video cards
- ports
- other drives and devices
- the motherboard
- processor socket
- intel and other processors
- memory slots
- chip set
- ports
- expansion slots
- processor
- intel
- Pentium dual core
- Pentium quad core
- i3,i5,i7
- Atom
- AMD
- Nvidia
- ARM
- Qualcomm
- Motorola
- processor components
- ALU
- registers
- not often shown or mentioned, but present in thee CPU
- Control Unit
- Cache
- L1, L2 etc.
Saturday, April 22, 2017
Digital Security and Ethics
- Risks
- Hacker
- Cracker
- Script Kiddie
- Corporate spies
- Unethical employees
- Cyber-extortionist
- cyber-terrorists
- Types of Risks
- Virus
- Antivirus
- Worm
- Trojan Hose
- Anti-spyware
- Anti-malware
- Rootkit
- Anti-Virus
- Ransomware
- Risks Explained
- Computer Virus
- Affects a computer negatively by altering the way the computer works
- Worm
- copies itself repeatedly, using up resources and possibly shutting down the computer or network
- Trojan Horse
- A malicious program that hides within or looks like a legitimate program
- Rootkit
- Program that hides in a computer and allows someone from a remote location to take full control
- Symptoms
- OS running slow, stops intermittently or does not start
- Less memory available
- Corrupt files and programs
- Programs do not operate properly
- Unknown programs are activated
- Tools
- Hardware firewall
- Software firewall
- Anti-virus
- Virus definition and signature
- Quarantine
- Anti-malware
- Malware removal tool
- Windows update
- Service Packs
- Internet security
- Hardware Firewalls
- Used for blocking access to ports on computers behind a firewall
- Hides the IP address behind a private IP address
- Built into many routers
- In particular, into wireless routers
- Hardware Firewall Brands
- Wireless routers from the following brands have built-in firewalls
- D-Link, Linksys and NetGear
- Software Firewall
- Blocks access to ports on individual computers
- Example:
- Windows Firewall
- Zone Alarm Pro
- Software Firewalls are also built into security suites such as Norton Internet Security and McAfee Internet Security suites
- http://www.toptenreviews.com/software/privacy/best-personal-firewall-software/
- Barrier Against Intruders
- Hardware firewall
- Software firewall
- Likely Source of Viruses
- This is the most likely source of viruses entering a computer
- Removable disks, or flash disks in general
- Booting with removable disks
- Macros in Programs
- Executing scripts in Web pages
- Forced Execution
- Some website would force the execution of a script
- ctrl-alt-del and ending the task would provide a way out of executing the script
- In some cases, closing the website would be a way out of executing the script
- Preventing attacks
- tips for preventing virus and other malware
- never start a computer with removable media inserted in the drives or plugged in te ports, unless the media are uninfected
- Never open an e-mail attachment unless you are expecting it and it is from a trusted source
- Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it
- Install an antivirus program on all of your computers. update the software and the virus signature files regularly
- scan all downloaded programs for viruses and other malware
- if the antivirus program flags and e-mail attatchment as infected, delete or quarantine the attatchment immediately
- before using any removable media, scan the media for malware/ Follow the procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users
- Install a personal firewall program
- stay informed about new virus alerts and virus hoaxes
- Import Considerations in Preventing Attacks
- Avoid booting a computer with a removable media
- disable the execution of macros in office documents such as word and excel documents and outlook emails
- Cookies
- cookies are stored on computers by website
- Information stored in cookies are accessed by the website each time the site is visited
- cookies can be and possibly should be removed as soon as possible, if not, periodically
- types of cookies
- authentication cookies
- cookies stored by websites
- third-party tracking cookies
- Firefox examples
- Types of Attack
- botnets
- denial of service
- back doors
- spoofing
- spamming
- firewalls
- Linksys firewall
- D-link WBR 1310
- NetGear
- Software firewalls
- Windows firewall example
- Authorizing Access
- password
- access auditing
- possessed object
- PINs
- Biometric devices
- Authentication
- One factor
- Two Factor
- Three Factor
- Four Factor
- Certification
- A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity on the sender
- A digital certificate is a notice that guarantees a user or a Web site is legitimate
- Issued by a certificate authority
- Investigating Computer Evidence
- digital forensics
- Theft
- safeguarding against theft
- software and hardware theft
- data protection
- encryption
- word example
- using encryption program
- TrueCrypt - now discontinued
- VeraCrypt - an alternative to TrueCrypt
- BitLocker encryption
- BitLocker and VeraCrypt
- BitLocker usually encrypts the whole drive
- It can also encrypt folders
- VeraCrypt can encrypt part of a drive
- Encrypting Folders and files
- selectively encrypting folders
- Encrypting Office 2013 documents
- Systems Safeguard
- UPS
- Backup
- Hot-pluggable devices
- Hot-swappable devices
- RAID
- Wireless LANs
- SSID
- Broadcasting SSID
- Avoid fro security reason
- Encryption
- Wireless Encryption
- WEP
- WPA
- 802.11i
- WPA2-Personal
- WPA2-Enterprise
- Securing your wireless connection
- Health Concerns
- displays
- repeated typing
- Ergonomics
- Ethics and Accuracy
- ethics
- accuracy
- green computing
- Code of Conduct
- Sample IT Code of Conduct
- Technology may not be used to ham other people
- employees may not meddle in others files
- employees may use technology only for purposes in which they have been authorized
- technology may not be used to steal
- technology may not be used to bear fake witness
- employees may not copy or use software illegally
- employees may not use others' technology resources without authorization
- employees may not use others' intellectual property as their own
- employees shall consider the social impact of programs and systems they design
- employees always should use technology in a way that demonstrates consideration and respect for fellow humans
- Copyright
- copyright
- open source
- freeware
- shareware
- http://download.cnet.com/windows/
- audacity
- Information Privacy
- electronic profiles
- cookies
- removing cookies
- spyware and adware
- spam
- phishing
- social engineering
- Privacy and other IT laws
- IT Law
- Content Filtering and Blocking
- Limited access to certain parts of the website
- ex: access to library database requires a password
- prevent access to certain websites
- Security Concerns
- Phishing
- Spyware
- Adware
- Social Engineering
Application Software: Programs and Apps
- Types of Software
- System Software
- OS
- Utilities
- Application Software
- Application toos (excel)
- Application development software (Access C#, Java etc.)
- Applications (GET)
- Cloud Software
- The new trend is to offer Software as a service
- example:
- office 365
- SaaS will be the trend of the future for all types of software
- Personal productivity software and business application software
- Cloud software examples
- office 365
- Salesforce.com
- QuickBooks online
- ERP software
- EPICOR
- Microsoft Dynamics
- SAP
- Advantage of Cloud software
- Maintaining, updating and securing the software are the responsibility of the software service provider
- The user pays for the service based on time and resource usage
- Example: Pay for time usage and power of the virtual computer configured
- Software User Interface
- Graphical User Interface
- Command Line
- cmd command examples
- Run as an administrator option
- Categories off Application Software
- Business
- word processing
- spreadsheet
- database
- presentation
- note taking
- personal information manager (PIM)
- Business Software for photos
- Business Software Suite
- Project management
- Accounting
- Document Managements
- Enterprise Computing
- Graphics and Multimedia
- Computer Aided Design (CAD)
- Desktop Publishing ( for the Professional)
- Paint/image Editing ( for the professional)
- Photo Editing ( for the Professional)
- Video and Audio Editing ( for the Professional)
- Multimedia Authoring
- Web Page Authoring
- Home/Personal/Educational
- Software Suite (for Personal Use)
- Personal Finance
- Legal
- Tax Preperation
- Desktop Publishing (for Personal Use)
- Paint/Image Editing ( for Personal Use )
- Photo Editing and Photo Management ( for personal Use)
- Clip Art/Image Gallery
- Video and Audio Editing ( for Personal Use)
- Home Design/ Landscaping
- Travel and Mapping
- Reference and Educational
- Entertainment
- Business Software
- Word Processing
- Spreadsheet
- Database
- Presentation
- Note taking
- Personal information management
- Business software for phones
- Business software suites
- Project management
- Accounting
- Document management
- Enterprise application software
- Software for Students
- Dream Sparks
- CIS majors
- Office
- Office.com
- Other free software
- Free and Trial Software
- www.download.com
- a good free audio editing software
- Audacity
- Software training and Tutorial for Students
- http://lynda.calstatela.edu
- an excellent collection of software and other tutorials available free of charge for students
- Sample Software Applications
- project management software
- accounting software
- document management software
- google docs
- office 365
- enterprise computing software
- enterprise resource planning
- Enterprise Resource Planning (ERP)
- Human Resources
- Accounting
- Distribution
- Marketing
- Engineering
- Sales
- Customer Service
- Graphics and Multimedia Software
- Popular Graphics and Multimedia Software
- Application Software
- Computer-Aided Design
- Desktop Publishing ( for the Professional)
- Paint/ Image Editing ( for the Professional)
- Photo Editing ( for the Professional)
- Manufacturer
- Autodesk
- Chief Architect
- Microsoft
- Adobe
- Corel
- Quark
- Adobe
- Corel
- Microsoft
- Adobe
Arcadia - Nik Software
- Program Name
- AutoCAD
- Chief Architect
- Visio
- InDesign
- Ventura
- QuarkXPress
- Illustrator
- Painter Expression Design
- Photoshop
- PhotoPerfect Ultimate
- Nik Professional Suite
Sunday, April 16, 2017
The Internet and the WWW Connecting and Communicating
- History and Structure
- ARPANET
- Department of Defense
- Collection of networks of computers
- Client
- Server
- World Wide Web Consortium (W3C) managed
- Consumer Internet Ramps
- Cable
- DSL
- FTTP Fiber
- Wi-Max
- Fixed Wireless
- Wi-Fi
- Cellular radio network
- Satellite
- Business Internet Ramps
- T1-T3
- OC1,OC3 etc.
- ATM
- OC Speeds
- Access Providers
- Internet Service Providers
- Online Access Providers
- Wireless Internet Service Providers
- 4g and 3g
- Internet backbone
- High speed network
- http://computer.howstuffworks.com/internet/basics/internet-infrastructure4.htm/printable
- Important
- From the Article
- POP, ISP,NAP
- Backbone
- Router, Switch
- Internet Protocol
- IP address
- IP DNS
- URL
- clients and servers
- protocols and ports
- Internet Address
- IP address
- Domain name
- DNS translation
- IP Commands
- Ping Command
- IPconfig command
- IP config
- Understanding the output from ipconfig/all
- IP address
- Host name
- Domain name
- Full name
- MAC address
- DNS, DHCP etc.
- Domains
- Top level domains
- Domain registration example
- Godaddy.com
- Domain Identification
- Whois.com database
- Top level domain
- Create your own domain
- Example: .csula
- Requires $180000 ( 2011 price)
- need to demonstrate the ability to maintain a DNS server locally
- Sample addresses
- cis.csula
- Worldwide Web
- Web servers
- web sites
- web pages
- home page
- Web technologies
- Web 1.0
- Download only
- Web 2.0
- upload and download
- technology that gave birth to social media
- web 3.0??
- Web addresses
- URL
- Protocol
- Domain
- Path
- Web Page
- Browsers/ Search engines
- Firefox
- IE
- edge
- google chrome
- bing
- yahoo
- dogpile
- etc.
- types of websites
- portal
- news blogs
- wikis
- etc.
- Social Networking
- Twitter, Facebook, LinkedIn etc.
- Creating your LinkedIn profile
- Multimdia on the website
- Text
- Image
- jpg, gif, png
- Video
- mp4
- Audio
- mp4
- hosting multimedia
- audio and video
- compression and streaming
- Image
- Compression
- Video Formats
- avi
- raw file format
- .mp4
- compressed and streaming file format
- .wmv
- compressed and streaming file format
- Audio Formats
- .wav
- raw file format
- .mp3
- compressed file format
- .mp4
- compressed and streaming file format
- .wma
- compressed and streaming file format
- Image format
- .jpg
- web usage
- .gif
- web usage
- .png
- web usage
- ,bmp
- raw file format
- managing plug-ins
- plug-ins in browsers
- an example
- creating a website
- plan a website
- analyze and design a website
- create a website
- deploy a website
- maintain a website
- e-commerce websites on the web
- business-to-consumer (b2c)
- Chat Rooms
- VOIP
- FTP
- Some Enterprise Computing Applications
- enterprise requirements planning (ERP)
- SAP
- PeopleSoft
- Dynamics
- Business Intelligence
- Business Data Analytics
- More to follow in a later chapter
- Cloud Computing
- Hardware and software as a service concept
- Amazon EC2
- Microsoft Azure
- Google Apps
- computer literacy
- essential for all at varying degrees
- professionals in many fields
- college graduates
- IT professionals etc.
- computers purpose
- compute, process and convey raw data as information
- communicate information
- text, image, audio and video information
- data and information
- data
- raw data
- information
- processed data that could be used for inference and decision making
- information
- big data
- ETL
- data warehouse
- data marts
- data analysis
- data visualization
- business intelligence
- information processing in perspective
- input
- store
- process
- store
- output
- information systems
- a system
- a collection of objects that work together to achieve a defined end result
- examples: transportation system, school system etc.
- information systems
- a system that deals with the processing of information
- examples: GET
- Purpose of Information Systems
- processing of raw data into information
- What's Raw Data
- collection of numbers, text etc
- What is Information
- useful processed data
- operational components of an information systems
- hardware
- physical and virtual
- system and networking hardware
- software and applications
- system
- application
- people
- users
- developers
- administrators
- system engineers
- auditors
- procedures
- data
- raw data
- information
- Communication Links
- Hardware
- Physical and Virtual Computers
- Physical Commuters
- Virtual Computers
- Cloud Computers
- Saas
- Paas
- Iaas
- Types of Physical Computers
- tablets
- laptops
- desktops
- all-in-ones
- servers
- smartphones
- wearable devices
- gaming devices
- Other Computers
- mainframe Computers
- Super Computers
- Embedded computers
- explore a tablet
- surface pro 3
- processor
- operating system
- connecting devices
- ports
- pen
- hardware components
- components
- input
- output
- system unit
- storage
- communication
- expansion devices
- input
- keyboard
- mouse
- pen
- web cam
- microphone
- output
- display
- LCD
- LED
- Digital TV
- Printer
- Laser jet
- Inkjet
- Thermal
- Others
- System Unit
- processor
- memory
- chipset
- storage
- expansion slots
- processor
- Intel
- Atom
- Celeron
- Dual Core
- Quad Core
- i3
- i5
- i7
- AMD
- Motorola
- NVidia
- ARM
- Storage
- Memory (RAM)
- Disk Storage ( Local)
- fixed and removable
- Cloud Storage
- Memory
- SDRAM types
- DDR
- DDR2
- DDR3
- DDR4
- SDRAM speed
- 800 MHz
- 400MHz
- Hard Drive
- Types
- PATA
- SATA
- SAS
- Speed
- 3 giga bits/ second
- USB Drives
- Flash
- 128 G byte
- 64 G byte
- Mini Hard Disks
- 300 G Bytes
- Solid state drives
- 128 G Bytes
- USB Standards and Connectors
- USB 1.0,2.0,3.0
- Type A, Type B etc.
- Other Disk Storages
- writeable and rewriteable CDs
- Writeable and rewritable DVDs
- Cloud Storage
- One Drive
- Google drive
- Drop Box
- Top ten online storages
- Installing Hardware
- USB devices
- follow the instructions
- OR
- First install the devices software
- then connect the device for automatic installation
- Networking
- Wired networks
- Wireless networks
- Connecting to a network
- wired and wireless connections
- peer-to-peer ad client-server networks
- Communication Devices
- Analog Modems
- DSL routers
- Cable Routers
- Wireless Routers
- Fiber Routers
- Expansion Devices
- Sound Card
- Video Card
- Others
- Software and Applications
- System Software
- Operating System
- Utilities
- Application Software
- Personal Software or software tools
- Word, PowerPoint etc.
- Application Development Software tools
- Oracle
- Application software
- GET system
- Windows 10 operating system
- editions
- home, pro, enterprise, education
- core experiences and business experience
- https://www.microsoft.com/en-us/WindowsForBusiness/Compare
- Windows 8.1
- Editions
- Windows 8.1 Pro
- Windows 8.1
- Windows 8.1 Enterprise
- Windows RT - Less powerful version
- https://en.wikipedia.org/wiki/Windows_8_editions
- Other operating Systems
- Unix
- Linux
- Android
- IOS - Apple
- Android
- Interacting with Software
- Using command line
- msconfig example
- Ip config/ all
- Using GUI's
- Graphical User Interface (GUI)
- Utilities
- Security
- Anti-Virus
- Malware
- Firewalls
- ports and protocols
- Installing Software
- Simple process
- The concept of restore and images
- Application Software Categories
- Productivity
- Graphic and media
- Personal Interest
- Communications
- Security
- File system, and disk management
- Best Free Software
- Software development
- system analyst
- programmer
- languages
- C#, C++, visual basic
- application development suites
- The cloud
- Software as a Service (SaaS)
- Cloud-based development, implementation and management
- The Web
- Web server
- Web sites
- Web Pages
- Home page
- Web Browsers
- Firefox
- Open
- Edge
- Microsoft
- Chrome
- Safari
- Apple
- Search Engines
- Google, Bing, Yahoo Search, Ask
- Top search engines
- Popular search engines
- Setting a default search engine
- Sample Online Applications
- Government
- Retail
- Entertainment
- Healthcare
- Travel
- Publishing
- Some Web Terminology
- Web server
- Web site
- Web page
- Blog
- Podcasting
- Web 2.0
- Advantages of Computers
- Speed
- Reliability
- Storage space
- Communication capability
- Computational intensity
- Disadvantage of Computers
- Security
- Health Concerns
- Violation of privacy
- Outsourcing
- Week Tasks
- Explore Google Apps
- Google mail
- Google Docs
- Google Sites
- Explore OneDrive
- Outlook mail, calendar and contact
- storage
- Office 365
- Digital Home
- What are some digital applications for home automation
Subscribe to:
Comments (Atom)