Wednesday, 19 October 2016

Chapter 13 Computer Programs and Programming Languages A computer program is a series of instructions that directs a computer to perform tasks. Created by a programmer using a programming language. Low-Level Languages
  • Assembly language is the second generation of programming languages.
  • Machine language is the first generation of programming languages.
  • Only language the computer directly recognizes.
  • A source program contains the code to be converted to machine language.
Procedural language
  • In a procedural language, the programmer writes instructions that tell the computer what to accomplish and how to do it. A compiler translate an entire program before executing it. An interpreter converts and executes one code statement at a time.
  • The C programming language is used to write many of today's programs.
  • COBOL (COmmon Business-Oriented Language) is designed for business applications, but easy to read because of the English-like statements.
  • Object-Oriented Programming Languages and Program Development Tools
  • An object-oriented programming (OOP) language allows programmers the ability to reuse and modify existing objects.
  • Other advantages include: Objects can be reused, Work well in a RAD environment, Programmers create applications faster.
  • Java is an object-oriented programming language developed by Sun Microsystems.
  • XML allows Webs developers to create customized tags and use predefined tags to display content appropriately on various devices. -WML is a subset of XML and is used to design pages for microbrowsers.
  • The Microsoft .NET Framework allows almost any type of program to run on the Internet or an internal business network, as well as computers and mobile devices.
  • C++ is an extension of the C programming language.
  • C# is based on C++ and was developed by Microsoft.
  • F# combines the benefit of an object-oriented language with those of a functional language.
  • A visual programming language is a language that uses a visual or graphical interface for creating all source code.
  • PowerBuilder is a powerful program development RAD tool.
  • A 4GL (fourth-generation language) is a nonprocedural language that enables users and programmers to access data in a database.
  • An application generator is a program that creates source code or machine code from a specification of the required functionality.
  • A macro is a seriess of statements that instructs an application how to complete a task.
  • The macro are usually created in one of two ways: Record the macro with a macro recorder, Write the macro.
Web Page Development
  • HTML is a special formatting language that programmers use to format documents for display on the Web.
  • XHTML is a markup language that allows Web sites to be displayed more easily on mobile devices.
  • Two application of XML are RSS 2.0 and ATOM.
  • Web browsers can execute short programs to add interactive elements to Web pages.
  • Programmers write scripts, applets, servlets, or ActiveX controls using a variety of languages.
  • Web 2.0 allows Web sites to provide a means for users to: Share personal information, Allow users to modify Web site content, Have application software built into the site.
  • Web page authoring software can create sophisticated Web pages that include images, video, audio, animation, and other effects
Multimedia Program Development
  • Multimedia authoring software allows programmers, to combine text, graphics, animation, audio, and video in an interactive presentation.
Program Development
  • Program development consists of a series of steps programmers use to build computer programs.
Step 1 - Analyze Requirements
  • To initiate program development, programmer:
  • i) review the requirements
  • ii) meets with the system analyst and users
  • iii) identifies input, processing, and output.
Step 2- Design Solution
  • Design solution algorithm
  • In structured design, the programmer typically begins with a general design and moves toward a more detailed design.
  • Programmers use a hierarchy chart to show program modules graphically.
  • With object-oriented (OO) design, the programmer packages the data and the program into a single object.
  • The sequence control structure shows one or more actions following each other in order.
  • The selection control structures tells the program which action to take, based on a certain condition.
  • The repetition control structure enables a program to perform one or more actions repeatedly as long as a certain condition is met.
  • A program flowchart graphically shows the logic in a solution algorithm.
  • Flowcharting software makes it easy to modify and update flowcharts.
  • UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development.
Step 3 - Validate Design
  • Check for logic errors using test data.
Step 4 - Implement Design
  • Implementation of the design includes using a program development tool that assists the programmer by:
  • i) generating or providing some or all code
  • ii) Writing the code that translates the design into a computer program
  • iii) Creating the user interface.
  • Extreme programming is a strategy where programmers immediately begin coding and testing solutions as soon as requirements are defined.
Step 5 - Test Solution
  • The goal of program testing is to ensure the program runs correctly and is error free.
  • Errors include syntax errors and logic errors
  • Debugging the program involves removing the bugs
  • A beta is a program that has most or all of its features and functionality implemented.
Step 6 - Document Solution
  • In documenting the solution, the programmer performs two activities: Review the program code and all the documentation.
Chapter 12 System Development System development is a set of activities used to build an information system. A system is a set of components that interact to achieve a common goal. An information system (IS) is a collection of hardware, software, data, people, and procedures that work together to produce quality information.
-System development should follow three general guidelines:


  1.  Group activities or tasks into phases 
  2.  involve users
  3. define standards.


  • Project management is the process of planning, scheduling, and then controlling the activities during system development.
  • To plan and schedule a project efficiently, the project leader identifies: Project scope, Required activities, Order of activities.
  • Feasibility is a measure of how suitable the development of a system will be to the organization. Operational feasibility, Schedule feasibility, Technical feasibility, Economic feasibility.
  • Documentation is the collection and summarization of data and information.
  • Users and IT professionals refer to existing documentation when working with and modifying current systems.
Planning Phase
  • The planning phase for a project begins when the steering committee receives a project request.
  • Four major activities are performed for example review and approve the project requests, Prioritize the project requests, Allocate resources, Form a project development team.
Analysis Phase
  • Process modeling (structured analysis and design) is an analysis and design technique that describes processes that transform inputs into outputs.
  • An entity-relationship diagram (ERD) is a tool that graphically shows the connections among entities in a system.
  • Entities are objects in the system that have data.
  • A data flow diagram (DFD) is a tool that graphically shows the flow of data in a system.
  • The project dictionary contains all the documentation and deliverables of a project.
  • Structured English is a style of writing that describes the steps in a process.
  • The data dictionary stores the data item's name, description, and other details about each data item.
  • Object modeling combines the data with the processes that act on that data into a single unit, called an object.
  • UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development.
  • A use case diagram graphically shows how actors (users) interact with the information system.
  • The system proposal assesses the feasibility of each alternative solution.
  • The steering committee discusses the system proposal and decides which alternative to pursue.
Design Phase
  • The design phase consists of two major activities for example Acquire hardware and software, Develop all of the details of the new or modified information system.
  • Systems analysts typically develop two types of designs for each input and output.
  • A prototype (proof of concept) is a working model of the proposed system. Prototypes have inadequate or missing documentation.
Implementation Phase
  • The purpose of the implementation phase is to construct the new or modified system and then deliver it. Develop programs > Install and test the new system > Train users > Convert to the new system.
  • Various tests should be performed on the new system. Unit test - verifies that each individual program or object works by itself. Systems test - verifies that all programs in an application work together properly. Integration test - verifies that an application works with other applications. Acceptance test - checks the new system to ensure that it works with actual data.
  • Training involves showing users exactly how they will use the new hardware and software in the system.
  • One or more of four conversion strategies can be used to change from the old system to the new system.
Operation, Support, and Security Phase
  • The purpose of the operation, support, and security phase is to provide ongoing assistance for an information system and its users after the system is implemented. Perform maintenance activities > Monitor system performance > Assess system security.
  • A computer security plan should do the following: Identify all information assets of an organization. Identify all security risks that may cause an information asset loss. For each risks, identify the safeguards that exist to detect, prevent, and recover from a loss.
Chapter 14 Enterprise Computer

Enterprise computing involves the use of computers in networks,such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating systems,protocols, and network architectures

Types of enterprises
-Retail 
-Manufacturing
-Service
-Wholesale
-Government 
-Educational
-Transportation


  • Most traditional enterprises are organized in a hierarchical manner
  • In an enterprise , users typically fall into one of four categories

  1. Executive Management 
  2. Middle Management
  3. Operational Management
  4. Non management Employees

  • Enterprise information is the information is the information gathered in the ongoing operations of an enterprise-sized organization
- Business intelligence 
-Business process management
-Business process automation
  • Managers coordinate resources by performing four activties
-Planning
-Organizing
-Leading
-Controlling

Information System in the Enterprise
An information system  is a set of hardware,software,data,people, and procedures that work together to produce information
  • Functional units within an enterprise might include
-accounting and finance
-human resource
-engineering or product development
-manufacturing
-marketing 
-sales
-distribution
-customer
-information technology
  • Acounting software manages everyday transactions
  • Billing software helps the company reconcile purchases with customer payments
  • Financial software helps managers budget , forecast, and analyze
  • A human resources information system(HRIS) manages one or more human resources functions 
  • Employee relationship management systems manage communication between employees and the business 
  • Computer-aided design(CAD) uses computers and special software to aid in engineering , drafting , and design
  • Computer-aided engineering (CAE) uses computers to test product designs
  • Computer-aided manufacturing (CAM) is the use of computers to control production equipment
  • Computer-integrated manufacturing (CIM) uses computers to integrate the many different operations of the manufacturing process
  • Material Requirements Planning (MRP) uses software to help monitor and control processes related to production
  • Manufacturing Resource Planning 11 (MRP11)is an extension of MRP and also includes software that helps in scheduling
A quality control system helps an organization maintain or improve the quality of its products or services
A marketing information system serves as a central repository for the tasks of a marketing department
  • sales force automation(SFA) software equips traveling salespeople with the electronic tools they need to be more productive
Distribution system perform the following fucions
-Provide forecasting for inventory control
-Manage and track shipping of products
-Provide information and analysis on inventory in a warehouse
  • Customer interaction management (CIM) software manages the day-to-day interactions with customers
  • The information technology (IT) department makes technology decisions for the enterprise
  • Web site management programs collect data designed to help organization make informed decisions regarding their Wed presence
General purpose information systems generally fall into one of five categories
-office information system 
-transaction processing system 
-management information system
-decision support system
-expert system
  • Batch processing vs online transaction processing
Integrated Information Systems
-Customer relationship management manages information about customer,interactions with customers, past purchases and interests
-Enterprise resource planning provides centralized,integrated software to help mange and coordinate ongoing activities
-Content management system are information system that combine databases ,software, and procedures

Enter-Wide Technologies and Methodologies
Some technologies used in enterprises include
-portals
-data warehouses
-electronic data interchange
-extranets
-web services
-document management systems
-workflow
-virtual private networks
-A portal is a collection of links, content, and services presented on a Web page that are interesting for a particular job function.
-A data warehouse is a huge database that stores manages the data required to analyze historical and current transactions.
-Web services allow businesses to create products and B2B interactions over the Internet.
-A document management system (DMS) allows for storage and management of a company's documents.
-A workflow is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
-A virtual private network (VPN) provides mobile users, vendors, and customers with a secure connection to the company network server.

Virtualization and cloud Computing
-Virtualization is the practice of sharing or pooling computing resources.
-Server virtualization: Provides the capability to divide a physical server logically into many virtual servers.
-Storage virtualization: Provides the capability to create a single logical storage device from many physical storage devices.

Enterprise Hardware
-Enterprise hardware allows large organizations to manage and store information and data using devices geared for: Heavy use, Maximum availability, Maximum efficiency.
-RAID duplicates data and implements duplication in different ways.
-Network attached storage (NAS) is a server that provides storage to users and information systems attached to the network.
-A storage area network (SAN) is a high-speed network that provides storage to other servers to which it attached.
-An enterprise storage system is a strategy that focuses on the availability, protection, organization, and backup of storage in a company.
-A blade server packs a complete computer server on a single card rather than a system unit.
-A thin client is a small terminal-like computer that mostly relies on a server for data storage and processing.
-The processing for a  thin client usually is done on a server.

High Availability, Scalability, and Interoperability
-A high-availability system continues running and performing tasks for at least 99% of the time.
-Scalability is a measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.
-Interoperability is the ability for an information system to share information with other information systems within an enterprise.

Backup Procedures
-Continuous data protection provides automatic data backup whenever data is changed in an enterprise.
-A disaster recovery plan is a written plan describing the steps a company would take a restore computer operations in the event of a disaster.
-Contains four major components: Emergency plan, Backup plan, Recovery plan, Test plan.

Chapter 11 Manage Computing Securely,Safely                     and Ethically

Computer Security Risks

  • a computer security risk is any event or action that could cause a loss of or damage to computer hardware , software , data , information , or processing cability
  • A cybercrime is an online or Internet-based illegal act for example hackers , crackers , script kiddies , corporate spie and etc
Internet and Network Attacks

  • Information transmitted over networks has a higher degree of security risk than information kept on an organization premises
  • an online security service is web site that evaluates our computer to check for Internet and e-mail vulerabilities
Computer virus-affects a computer negatively by altering the way                               the computer works
Worm -copies itself repeatedly , using up resources and possibly                   shutting down the computer or network 
Trojan horse-a malicious program that hides within or looks like a                         legitimate program
Rootkit-program that hides in a computer and allows someone from               a remote location to take full control

An infected computer has one or more of the following symptoms

  • Operating system runs much slower than usual 
  • Available memory is lee than expected 
  • files becomes corrupted 
  • Screen displays unusual message or image
  • Music or unusual sound plays randomly
  • Existing programs and files disappear 
  • Programs or files do not work properly 
  • Unknown programs or files mysteriously appear
  • System properties change 
  • Operating system does not start up 
  • Operating system shuts down unexpectedly


User can take several precautions to protect their home and work computers and mobile devices from these malicious infections

  • a botnet is a group of compromised computers connected to a network 
  • a denial of service attack (DoS attack)disrupts computer access to Internet services
  • a back door is a program or set of instructions in a program that allow user to bypass security controls
  • spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
  • a firewall is hardware or software that protect a network resources from intrusion 
Intrusion detection software

  • analyzes all network traffic 
  • assesses system vulnerabilities
  • identifies any unauthorized intrusions 
  • notifies network administrators of suspicious behavior patterns or system breaches
Honeypot

  • vulnerable computer that is set up to entice an intruder too break into it
Unauthorized Access and Use
Unauthorized access is the use of a computer or network without permission 
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities

  • organizations take several measures to help prevent unauthorized access and use
-acceptable use policy 
-disable file and printer sharing
-firewall
-intrusion detection software

  • access control define who can access it, and what action they can take for example two-phase processes called identification and authentication , user name , password ,passphrase and CAPTCHA
  • A possessed object is any item that we must carry to gain access to a computer or computer facility
  • A biometric device authenticates a person identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  • digital forensics is the discovery, collection, and analysis of evidence found on computers and network 
  • Many areas use digital forensics for example law enforcement ,criminal prosecutors , military intelligence , insurance agencies and information security departments 

Hardware Theft and Vandalism

Hardware theft is the act of stealing computer equipment
Hardware vandalism is the act of defacing or destroying computer equipment

  • to help reduce the chances of the theft,companies and use a variety of security measures
For example
-physical access control 
-alarm system
-cables to lock equipment 
-real time location system
-password,possessed object,and biometrics 

Software Theft
software theft occurs when someone steals software media,intentionally erases programs, illegally copies a program and illegally registers and activates a program

A single-user license agreement typically contains the following conditions
Permitted to
-Install the software on one computer 
-make one copy of the software
-Remove the software from our computer before giving it away or selling it

Not permitted to
-Install the software on a network
-give copies to friends or while continuing to use the software 
-export the software
-rent or lease the software


  • copying, loaning , borrowing , renting , or distributing software can be a violation of copyright law
  • some software requires product activation to function fully
Information Theft
Information theft occurs when someone steals personal or confidential information

  • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access
  • a digital signature is an encrypted code that a person , wed site , or organization attaches to an electronic message to verify the identity of the sender
  • Web browsers and Web sites use encryption techniques
  • popular security techniques include digital certificates , transport layer security(TLS) , secure HTTP and VPN
System Failure

  • A system failure is the prolonged malfunction of a computer 
  • a variety of factors can lead to system failure including
  • -aging hardware                                                                             -natural disasters                                                                           -electrical power problems                                                            -errors in computer programs
  • two ways to protect from system failures cauesd by electrical power variations include surge protectors and uninterruptable power supplies (UPS)
Backing Up- The Ultimate Safeguard 

  • a backup is a duplicate of a file , program , or disk that can be used if the original is lost , damaged or destroyed 
  • Offsite  backups are stored in a location separate from the computer site
  • two categories of backup - full backup , selective backup
  • three-generation backup policy
Wireless Security 

  • wireless access poses additional security risks -about 80 percent of wireless network have no security protection
  • war driving  allows individual to detect wireless network while driving a vehicle through the area
  • in additional to using firewall some safeguards improve security of wireless network
  • -a wireless access point should not broadcast an SSID                -change the default SSID                                                              -configure a WAP so that only certain devices can access it        -use WPA or WPA2 security standards
Ethics and Society 

  • Computer ethics are the moral guidelines that govern the use of computers and information systems.
  • Information accuracy is a concern.
  • Intellectual property rights are the rights to which creators are entitled for their work.
  • An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical.
  • Green Computing involves reducing the electricity and environmental waste while using a computer.
  • Information privacy refers to the right of individuals and companies to deny or restrict the collection nad use of information about them.
  • Huge databases store data online.
  • It is important to safeguard your information.
  • a cookie is a small text file that a web server stores on our computer
  • spam is an unsolicited e-mail message or newsgroup posting
  • E-mail filtering blocks e-mail messages from designated sources
  • Anti-spam programs attempt to removes spam before it reaches our inbox
  • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain our personal and financial information 
  • Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
  • Content filtering is the process of restricting access to certain material on the Web
  • Web filtering software restricts access to specified Wed sites
Chapter 10 Managing a Database

Database is a collection of data organized in a manner that allows access, retrieval, and use of that data.
Data is a collection of unprocessed item for example text , number , images , audio and video
Information is processed data

Database , Data and Information 

  • Database software as we called a database management system (DBMS) it allow user to -create a computerized database                                                   -add,modify and delete data                                                         -sort and retrieve data                                                                   -create forms and reports from the                                                 data 
  • Data integrity identifies the quality of the data 
  • Garbage in ,garbage out(GIGO) points out the accuracy of a computer output depends on the accuracy of the input
  • For information should have the following characteristic that is accurate , verifiable,timely,organized,accessible,useful andcost-effective
The Hierarchy of Data

  • a character is one byte for the number , letters ,space punctuation marks or other symbols
  • a field is a combination of one or more related characters for example field name , field size and data type
  • common data types include text , numeric , AutoNumber , currency , date , memo , yes/no , hyperlink , object and attachment
  • a record is a group of related fields-a primartkey uniquely identifies each record 
  • a data file is a collection of related record
Maintaining Data

  • File maintenance refers to the procedures that keep data current -adding records,modifying records and deleting records
  • users add new records to a file when they obtain new data
  • user modify a record to correct inaccurate data or update olad data
  • Validation compares data with a set of rules or values to find out if the data is correct -alphabetic/numeric check ,range check , consistency check , completeness check , check digit and other checks
File processing Versus Databases 
File processing system

  • each department has its own set of files 
  • used for many years
  • have data redundancy 
  • isolate data
Database approach

  • programs and users share data 
  • reduce data redundancy
  • improve data integrity 
  • share data
  • allows easier access
  • reduces development time 
  • can be more vulnerable
Database Management Systems

  • a data dictionary contains data about each file in the database and each field in those files
  • a DBMS provides several tools that allow user and programs to retrieve and maintain data in the database 
  • a query language consists of simple , English -like statements that allow users to specify the data to display, print, or store
  • query by example (QBE) provides a GUI to assist users with retrieving data
  • A dorm is a window on the screen that provides areas for entering or modifying data in a database
  • a report generator allows users to design a report on the screen , retrieve data into the report design , and then display or print the report
  • A DMS provides means to ensure that only authorized users access data at permitted times - access privileges                                                                          -principle of least privilege
  • A DMBS provides a variety of techniques to restore the database to a usable form in case it is damaged or destroyed         -backup          -log       -recovery utility     -continuous backup
Relational, object-Oriented, and multidimensional Databases

  • a data model consists of rules and standards that define how the database organizes data
  • A relational database stores data in tables that consist of row and columns .each row has a primary key and each column has a unique name

  • a relationship is a link within the data 
  • structured query language (SQL) is a query language that allows users to manage, update,and retrieve data
  • an object-oriented database (OODB) stores data in objects 
  • examples of applications appropriate for an object-oriented database include multimedia database , groupware database , computer aided design database and hypertext database
  • a multidimensional database can store data in more than two dimensions of data
  • a data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions
Wed Databases
  • databases on the web allow you to
   -shop for products or                                                                              services
   -buy or sell stocks 
   -search for a job
   -make airline reservations
   -register for college classes
   -check semester grades

Database Administration 
  • it is important have have a carefully designed database
  • Database Analyst(DA)-decides on proper filed placement,defines data relationship ,and identifies users access privileges
  • Database Administrator (DBA)-creates and maintains the data dictionary ,manages security , monitors performance and checks backup and recovery procedures
  • Employees shold learn how to use the data in the database effectively-interact with database                                                                  -identify new data for the database                                              -maintain the database

Tuesday, 18 October 2016

Chapter 9 Network and Communications
Communications
Computer communications describes a process in whch two or more computers or devices transfer data, instructions,and information

(sending  device) - (communications channel)-( receiving device)

User of Computer Communications
user can send and receive wireless messages using wireless messaging services


1.Text messaging  (SMS) allows users to send and receive short text messages on a phone or other mobile device or computer
2.Picture messaging allows users to send pictures and sound files
3.Video messaging allows users to send short video clips
4.Wireless instant messaging allows wireless users to exchange real-time messages with one or more other users 

Wireless Internet access points allow people to connect wirelessly to the internet from home,work,school,and in many public locations

A cybercafe is a location for people to use computer to access internet

A global positioning system (GPS) is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order tp determine the Gps receiver's geographic location

Groupware-helps groups of people work together on projects and                   share information over a network 
                  -Component of work group computing
                  -Major feature is a group scheduling
Voice mail-is allows someone to leave a voice message for one or                more people 
                  -computer in voice mail system converts an analog                       voice message into digital form
                  -a voice mailbox is a storage location on a hard disk int                he voice mail system
Many programs provide a means to collaborate, or work online ,with other users connected to a server
Collaboration software includes tools that enables users to share documents via online meeting and communicate with other connected users for example online meeting ,web conferences and document management systems
Web services enable programmers to create applications that communications with other remote computer over the Internal or on an internal business network 
A mashup is a web application that combines services from two or more sorces

Networks
A network is a collection of computers and devices connected together via communications devices and transmission media. Advantages of a network include: Facilitating communications, Sharing hardware and software, Transferring funds, Sharing data and information.
A local area network (LAN) is a network that connects computers and devices in a limited geographical area. A wireless LAN (WLAN) is a LAN that uses no physical wires. A metropolitan area network (MAN) connects LANs in a metropolitan area. A wide are network (WAN) is a network that covers a large geographical area.
The design of computers, devices, and media on a network is sometimes called the network architecture. P2P descirbes an Internet network on which users access each other's hard disks and exchange files directly over the Internet. A network topology refers to the layout of the computers and devices in a communications network. An intranet is an internal network that uses Internet technologies. An extranet allows customers or suppliers to access part of its intranet. 

Network Communications Standards
Ethernet is a network standard that specifies no computer controls when data can be transmitted. 
The token ring standard specifies that computers and  devices on the network share or pass a special (token). 
TCP/IP is a network standard that defines how messages are routed from one end of a network to another.
Wi-Fi identifies any network based on the 802.16 standard that facilitates wireless communication.
Sometimes referred to as wireless Ethernet.
Bluetooth defines how two Bluetooth devices use short-range radio waves to transmit data.
UWB (ultra-wideband) specifies how two UWB devices use short-range radio waves to communicate at high speeds.
IrDA transmits data wirelessly via infrared (IR) light waves.
RFID uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
Communications software consists of programs that: Helps users establish a connection to another computer or network. Manage the transmission of data, instructions, and information.

Communications Over the Telephone Network
The public switched telephone network (PSTN) is the worldwide telephone system.
A communicaation device is any type of hardware capable of transmitting data, instructionsm and information between a sending device and a receiving device.
A dial-up modem converts signals between analog and digital.
A digital modem sends and receives data and information to and from a digital line.
A wireless modem uses the cell phone network to connect to the Internet wirelessly from a notebook computer, a smart phone, or other mobile device.
A network card enables a computer or device to access a network.
Available in a variety of styles.
Wireless network cards often have an antenna.

Communications Devices
A wireless access point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to a wired network.
A router connects multiple computers or other routers together and transmits data to its correct destination on a network.
Many are protected by a hardware firewall.
A hub or switch connects several devices in a network together.

Home Networks
Home networks provide computers with the following capabilities: Connect to the Internet at the same times, Play multiplayer games, Connect game consoles to the Internet.

Communications Channel
the amount of data that can travel over a communications channel sometimes is called the bandwidth.
Latency is the time it takes a signal to travel from one location to another on a network.
Transmission media carries one or more signals.
Broadband media transmit multiple signals simultaneously.

Wireless Transmission Media
Cellular radio is a form of broadcast radio that is used widely for mobile communications.
Microwaves are radio waves that provide a high-speed signal transmission.
A communications satellite is a space station that receives microwave signals from an earth-based station, amplifies it, and broadcasts the signal over a wide area.


Chapter 8 Types of storage
Storage 
Storage its holds data,instructions and information for future use.
A storage medium is the physical material on which computer keeps data, instructions and information.

  • Capacity is the number of bytes a storage medium can hold. For example kilobyte(KB) ,Megabyte (MB) ,Gigabyte (GB) ,Terabyte(TB) 
  • a storage device is the computer hardware that records or retrieves items to and from storage media
  • reading is the process of transferring items from a storage medium into memory
  • writing is the process of transferring item from memory to a storage medium
  • Access time measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
Hard disks

  • a hard disk that contains one more inflexible , circular platters that use magnetic particles to store data , instructions , and information
  • hard disk can store data by using longitudinal recording or perpendicular recording
  • the characteristics of a hard disk include capacity ,platters,read/write heads ,cylinders , sectors and tracks ,revolutions per Minute ,transfer rate and access time
  • Formatting is the process of diving the disk into tracks and sectors so that the operating system can store and locate data and information
  • the hard disk arms move the read and write head which reads items and writes item in the drive
  • A head crash occurs when a read and write head touches the surface of a platter 
  • and always keep a backup of our hard disk
  • RAIN is a group of two or more integrated hard disks
  • A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage 
  • a disk controller consists of a special-purpose chip and electronic circuits that control the transfer of data,instructions,and information from a disk to and from the system bus and other components of the computer
  • SATA , EIDE , SCSI , SAS
Flash Memory Storage
Flash memory chips are a type of solid state media and contain no moving parts
Solid state drives (SSDs)have several advantages over magnetic hard disk for example faster success time , faster transfer rates , generate less heat and consume less power and last longer 
  • a memory card is a removable flash memory device that you insert and remove from a slot in a computer, mobile device , or card reader/writer for example compact flash (CF) ,secure digital (SD) , secure digital high capacity (SDHC) ,microSD , microSDHC ,picture card , memory stick and memory stick micri(M2)
  • USB flash drives plug into a USB port on a computer or mobile device
  • an Express Card module is a removable device that fits in an Express Card slot 
  • Developed by the PCMCIA
  • Commonly used in notebook computers
Cloud storage
cloud  storage is an Internet service that provides storage to computer users

Optical Discs
an optical disc consists of a flat,round,portable disc made of metal,plastic and lacquer that is written and read by a laser 
  • it store software,data ,digital photos,movies and music
  • it commonly store items in a single track that spirals from the center of the disc to the edge
  • Track is divided into evenly sized sectors
  • Archive disc-stores photo from online photo center                                         -resolution usually is 7200 pixels per photo                                 -cost is determined by the number of photos that                            being stored
  • picture CD - single-session CD-ROM that stores digital                                   versions of film                                                                          -it uses a 1024 x 1536 resolution                                                  -many photo centers offer Picture CD dervices
Other types of storage 
  • tape is a magnetically coated ribbon of pla stic capable of storing large amounts of data and information
  • tape drive is reads and writes data and information on a tape
  • a magnetic stripe card contains a magnetic sripe that stores information 
  • a smart card stores data on a thin microprocessor embedded in the card
  • Microfilm and microfiche store microscopic images of documents on a roll or sheet film
Chapter 7 Understanding Output

Output is a data that has been processed into a useful form. An output device is any type of hardware component that conveys information to one or more people. For example monitor , printers , speakers ,headphone ,earbuds ,data projectors , and etc.

Display Devices

  • A display device is conveys text , graphics and video information
  • for monitor is a packaged as separate peripheral
  • Liquid crystal display (LCD) is a liquid compound to present information on a display device 
  • the quality of an LCD depends primarily on resolution , response time ,brightness ,dot pitch and contrast ratio
Printers

  • A printer is produces text and graphics on a physical medium 
  • it printed information that we called a hard copy or printout
  • A nonimpact printer forma characters and graphics on a piece of paper without actually striking the paper for example ink-jet printers , photo printers , laser printers , thermal printers , mobile printers , label and postage printers ,plotters and large-format printers.
  • an ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper 
  • a photo printer produces color photo-lab-quality pictures
  • laser is high-speed , high-quality , black and white and color
  • a multifunction peripheral(MFP) is a single device that prints , scans , copies , and in some cases , faxes 
  • a thermal printer generates images by pushing electrically heated pins against the heat-sensitive paper 
  • a mobile printer is a small, lightweight , battery-powered printer that allows a  mobile user to print from a notebook computer , smart phone , or other mobile device
  •  a label printer is a small printer that prints on adhesive-type material
  • plotters are used to produce high-quality drawings
  • large-format printers create photo-realistic quality color prints on a larger scale
  • impact printers form characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper 
  • a dot-matrix printer produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon 
  • a line printer prints an entire line at a time
Speakers, headphones , and earbuds
An audio output device produces music , speech , or other sounds 
most of the computer users attach speakers to their computer to generate higher-quality sound for playing games,  listen to music and watching movie

  • headphone are a type of speakers that cover or are placed outside of the ear
  • earbuds that also called earphone rest inside the ear canal
  • some of the speakers are specifically designed to play audio from a portable media player
voice output occurs when you hear a person's voice or when the computer talks to our through the speakers 

other output device are available for specific uses and applications.For example ,data projectors , interactive whiteboards , force-feedback game controllers and tactile output


  • a data projector is a device that takes the text and images displaying on a computer screen and projects them on a larger screen 
  • an interactive whiteboard is a touch-sensitive device, resembling a dry-erase board ,that displays the image on connected computer screen 
  • force-feedback sends resistance to the device in response to actions of the user 
  • tactile output provides the user with a physical response from the device

Sunday, 16 October 2016

Chapter 6 Understanding lnput
Impute is any data and instructions entered into the memory of a computer

  • the instructions that can be entered into the computer in the form of programs,commands and user responeses
An input device is any hardware component that allows users to enter data and instructions into a computer . For example, keyboard, mouse ,pen input and etc.

Keyboard

  • keyboard is an input device that contains keys that uses press to enter data and instructions into a computer
  • for the insertion point is a symbol on the screen that indicates where the next character you type will apper
Mouse

  • A mouse is a pointing device that fits under the palm of our had comfortably
  • some  of the mouse is wired or wireless
Other Pointing Devices

  • for the other pointing devices trackball is a stationary pointing device with a ball on top or side
  • beside that, a touchpad is a small , flat ,rectangular pointing device that is sensitive to pressure and motion
  • a pointing stick is a pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a keyboard
 Pen Input

  • with pen input that touch a stylus or digital pen on a slat surface to write , draw , or make selections
Game controllers

  • video games and computer games use a game controller as the input device that directs movements and actions of on-screen objects
  • for example gamepads , joysticks and wheels ,light guns , dance pads and motion-sensing controllers
Digital cameras

  • a digital camera is a mobile device that allows users to take pictures and store them digitally into the memory card 
Voice Input 

  • voice input is the process of entering input by speaking into a microphone
  • voice recognition is the computer capability of distinguishing spoken words
  • audio input is the process of entering any sound into the computer, for example  speech , music and sound effects
  • music production software allows users to record compose, mix , and edit music and sound
Video input

  • video input is the process of capturing full-motion images and storing them into a computer storage medium
  • for example web cam is a typeof digital video camera that enables a use to capture video and  still images , send e-mail messages with video attachments , add live images to instant messages ,broadcast live images over the interm]net and make video telephone calls
  • video conference is a meeting between two or more people by using internet
Scanners ad reading devices is also one of a input device

Chapter 5 
Types of Utility Programs and Operating Systems

System Software

  • System software consists or the programs that control or maintain the operations of the computer and its device
  • Operating systems and Utility Programs

Operating system 

  • An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
-start and shut sown a computer 
-provider a user interface 
-manage progams
-manage memory
-coordinate task
-establish an internet connection
-monitor performance
-provide utilities
-automatically update
-control a network 
-administer security

Operating system functions

  • the process of starting or restarting a computer is called booting 
cold boot-is turning on a computer that has been powered off                            completely
Warm boot-is using the operating system to restart a computer

  • it includes various shut down options
-sleep mode saves any open documents and programs to RAM, turn off all unneeded functions, and then places the computer in a low-power state
-hibernate saves any open documents and programs to a hard disk before removing power from the computer

  • a user interface is to controls how to enter data and instructions and how information is displayed on the screen
  • with a graphical user interface(GUI), you interact with menus and visual images
  • with a command-line interface is a user uses the keyboard and to enter data and instructions to CPU



  • How an operating system handles programs directly affects your productivity such as single user and multiuser ,single tasking and multitasking , Foreground and background,preemptive multitasking and multiprocessing
  • Memory management optimizes the use of RAM 
  • Virtual memory is a portion of a storage medium functioning as additional RAM
  • A performance monitor is a program that assesses and reports information about various computer resources and devices
  • operating systems often provide users with the capability of 
-managing files 
-searching for files 
-viewing images 
-securing a computer
- uninstalling programs 
-cleaning up disks
-defragmenting disks
-diagnosing problems
-backing up files and disks 
-setting up screen savers

  • Automatic update automatically provides updates to the program
  • some of the operating systems are designed to work with a server on a network
  • a network administrator uses the server operating system to add and remove users,computers and other devices or install software and administer network security
  • a server operating system organizes and coordinates how multiple users access and share resources on a network
  • a user name or user ID identifies a specific user
  • a password is a private combination of characters associated with the user name
Stand-Alone Operating Systems 
  • a stand-alone operating system is a complete operating system that work on a desktop computer or other computing device 
  • for example window 7 , mac os x ,UNIX and Linux
Embedded Operating Systems
  • An embedded operating system resides on a ROM chip on a mobile device or consumer electronic device
  • for example window Embeddes CE, Windows phone 7,Palm OS,iPhone OS,BlackBerry,Google Android,Embedded Linux and Symbian OS
Utility Programs
  • A utility program is a type of system software that allows a user to perform maintenance-type tasks
  • A file manager is a utility that perform functions related to file ,it will displaying a list of files ,organizing files in folders,copying,renaming,deleting,moving,and sorting files and folders and creating shortcuts
  • A search utility is a program that attempts to locate a file o your computer based on criteria our specify
  • for an image viewer is to allow user to display,copy and print the contents of a graphics file
  • uninstaller is to removes a program that associated entries in the system files
  • A disk cleanup utility searches for and removes unnecessary files
  • A disk defragmenter reorganizes the files and unused space on a computer'shard disk so that the operating system accesses data more quickly and programs run faster
  • A backup untility is to copy files to another storage medium
  • restore utility is to reverses the process and returns backed up files to their original form
  • screem saver cause the display device's screen to show a moving image or blank screen if no activity occurs for a specified time 
  • personal firewall is to detects and protects a computer form unauthorized intrusions
  • media player is to view images and animation ,listen to audio, and watch video files on computer
  • disc burning software is to copy the data recordable or rewritable optical disc
  • personal computer maintenance utility identifies and fixes operating system problem, detects and repairs disk problem, and includes the capability ofimproving a computer performance 


Friday, 14 October 2016

Chapter 4

System Unit Components

System unit

  • The system i\unit is a case that contains electronic computer used to process data
  • The inside of the system unit on a desktop personal computer includes:

  1. Drive bay(s)
  2. power supply
  3. Sound card
  4. Video card
  5. Processor
  6. Memory
  • The motherboard is the main circuit board of the system unit    -A computer chip contains integrated circuits 
Processor
  • The processor,also called the central processing unit(CPU),interprets and carries out the basic instructions that operate a computer                                                                        -contain a control unit and an arithmetic logic unit (ALU)
  1. Multi-core processor
  2. Dual-core processor
  3. Quad-coreprocessor


  •  The control unit is the component of the processor that directs and coordinates most of the operations in the computer
  • The arithmetic logic unit (ALU) performs arithmetic,comparison,and other operations
  • For every instruction,a processor repeats a set of four basic operations,which comprise a machine cycle  
  •  Most current personal computers support pipelining                   -Processor begins fetching a second instruction before it completes the machine cycle for the first instruction

The processor contains registers,that temporarily hold data and instructions
The system clock controls the timing of all computer operations

  • The pace of the system clock is called the clock speed,and is measured in gigahertz(GHz)
  • The leading manufacturers of personal computer processor chips are Intel and AMD
  • Determine how you plan to use a new computer before slecting a aprocessor
  • A processor chip generates heat that could cause the chip to burn up
  • Require additional cooling                                                              -Heat sinks                                                                                    -Liquid cooling technology
  • Parallel processing uses multiple processors simultaneously to execute a single program or task                                                   -Massively parallel processing involves hundreds or thousands of processor                                      
Data representation

  1.  Analog signals are continuous and vary in strength and quality
  2. Digital signals are in one of two states:on or off


  • Most computers are digital
  • The binary system uses two unique digits(0 and 1)
  • Bits and bytes
A computer circuit represents the 0 or the 1 electronically by the presence or absence of an electrical charge
             
Eight bits grouped together as a unit are called a byte.A byte represents a single character in the computer 


  • ASCII (American Standard Code for Information Interchange) is the most widely used coding scheme to represent data



Memory

  • Memory consists of electronic components that store instructions waiting to be executed by the processor,data needed by those instructions, and the result of processing the data 
  • Stores three basic categories of item:

  1. The operating system and other system software
  2. Application programs
  3. Data being processed and the resulting information
  • Each location in memory has an address
  • Memory size is measured in kilobytes (KB or K),megabytes (MB),gigabytes (GB),or terabytes (TB)
  • The system unit contains two types of memory:
  1. Volatile memory-Loses its contents when power is turned off                                -Example includes RAM
  2. Nonvolatile memory-Does not lose contents when power is                                          removed                                                                                      -Examples include ROM,flash                                                        memory,and CMOS
  • Three basic types of RAM chip exist:
  1. Dynamic RAM (DRAM)
  2. Static RAM (SRAM)
  3. magnetoresistive RAM(MRAM)
  • RAM chips usually reside on a memory module and are inserted into memory slots
  • The amount of RAM necessary in a computer often depends on the types of software you plan to use
  • Memory cache speeds the processes of the computer because it stores frequently used instructions and data
  • Firmware-Read-only memory (ROM)refers to memory chips storing permanent data and instructions
  • EEPROM can be erased- A PROM (programmable read-only memory)chip is a blank ROM chip that can written to permanently
  • Flash memory can be erased electronically and rewritten           -CMOS technology provides high speeds and consumes little power
  • Access time is the amount of time it takes the processor to read from the memory 
Expansion slots and Adapter Cards
  •  An expansion slot is a socket on the motherboard that can hold an adapter card
  • An adapter card enhances functions of a component of the system unit and/or provides connections to peripherals
  • With Plug and Play, the computer automatically can configure adapter cards and other peripherals as you install them
  • Removable flash memory -Memory cards,UUSB flash drives, and PCcards 
Ports and connectors
-A port is the point at which a peripheral attaches to or communicates with a system unit
-A connector joins a cable to aport

Buses
  • Expansion slots connect to expansion buses
  • Common types of expansion buses include
      -PCIbus
      -PCI Express bus 
      -Acclerated Graphics Port
      -USB and FireWirebus
      -PC Card bus
Bays
  • A bay is an opening inside the system unit in which you can install additional equipment 
Power Supply
-the power supply conversts the wall outlet AC power into DC power 
-Some external peripherals have an Ac adapter, which is an external power supply