Thursday 20 October 2016

Chapter 14

Chapter 14 - Enterprise Computing


This will be my final blog regarding this Computer Application class. I know i hadn't been doing a great job blogging nor have I been doing anything to improve it, but I hope what's left of my work will be enough. I am truly sorry for my lack of commitment.


Enterprise computing involves the use of computers in networks, such as LAN's and WAN's, or a series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures. Types of enterprises may include retail, manufacturing, service, wholesale, government, educational, and transportation.

Enterprise information is the information gathered in the ongoing operations of an enterptise-sized organization.

Managers coordinates resources by performing four activities. Which are, planning, organizing, leading, and controlling.

Information System in the Enterprise
A human resources information system manages one or more human resources functions. Employee relationship management systems manage communication between employees and the business.

Computer-aided design uses a computer and special software to aid in engineering, drafting, and design. Computer-aided engineering however, uses computers to text product designs. Computer-aided manufacturing is the use of computers to control production equipment. Computer-integrated manufacturing uses computers to integrate the many different operations of the manufacturing process.

Material Requirements Planning uses software to help monitor and control processes related to production. Manufacturing Resource Planning II is an extension of MRP and also includes software that helps in scheduling.

Sales force automation software equips traveling salespeople with the electronic tools they need to be more productive.

Customer interaction management software manages the day-to-day interactions with customers.

Enterprise-Wide Technologies and Methodologies
A portal is a collection of links, content, and services presented on a Web page that are interesting for a particular job function. A data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions.

Web services allow business to create products and B2B interactions over the Internet.

A workflow is a defined process that identifies the specific set of steps involved in completing a particular project or business process.

A virtual private network provides mobile users, vendors, and customers with a secure connection to the company network server.

Enterprise Hardware
Enterprise hardware allows large organizations to manage and store information and data using devices geared for heavy use, maximum availability, and maximum efficiency. RAID duplicates data and implements duplication in different ways.

Network attached storage is a server that provides storage to users and information system attached to the network. A storage are network that provides storage to other servers to which it is attached. An enterprise storage system is a strategy that focuses on the availability, protection, organization, and backup of storage in a company.

A blade server packs a complete computer server on a single card rather than a system unit. A thin client is a small terminal-like computer that mostly relies on a server for data storage and processing.

High Availability, Scalability, and Interoperability
A high-availability system continues running and performing tasks for at least 99 percent of the time. May include hot-swapping and redundant components. 

Scalability is a measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands. Interoperability is the ability for an information with other information systems within an enterprise.

Backup Procedures
Continuous data protection provides automatic data backup whenever data is changed in an enterprise.

A disaster recovery plan is a written plan describe the steps a company would take to restore computer operations in the event of a disaster.

Chapter 13

Chapter 13 - Computer Programs and Programming Languages 

A computer program is a series of instructions that directs a computer to perform tasks. These instructions are created by a programmer using a programming language.

The machine language is the first generation of programming languages. This is the only language the computer directly recognize.

Assembly language is the second generation of programming languages. The programmer writes instructions using symbolic instruction code. A source program contains the code to be converted to machine language.

In a procedural language, the programmer writes instructions that tell the computer what to accomplish and how to do it. Such as the third-generation language

The C programming language is used to write many of today's programs.

COBOL (Common Business-Oriented Language) is designed for business applications, but easy to read because of the English-like statements.

Object-Oriented Programming Languages and Program Development Tools
An object-oriented programming language allows programmers the ability to reuse and modify existing objects. Other advantages include :

  • Objects can be reused
  • Programmers create applications faster
  • Work well in a RAD environment
  • Most program development tools are IDE's 
Java is an object-oriented programming language developed by Sun Micro-systems. The Just-in-time compiler converts the byte-code into machine-dependent code. 

C++ is an extension of the C programming language. 

C# is based on C++ and was developed by Microsoft. 

F# combines the benefits of an object-oriented language with those of a functional language. 

Visual Studio is Microsoft's suite of program development tools. Visual Basic is based on the BASIC programming language. Visual C++ is based on C++. Visual C# combines the programming elements of C++ with an easier, rapid-development environment. 

Power Builder is a powerful program development RAD tool. Best suited for Web-based, .NET, and large-scale enterprise object-oriented applications. 

Web Page Development
Web browsers can execute short programs to add interactive elements to Web pages. To send and receive information between your computer and a web server, these programs use the CGI. 

Programmers write scripts, applets, servlets, or ActiveX controls using a variety of languages. 

Web 2.0 allows web sites to provide a means for users to share personal information, allows users to modify web site content, and to have a application software built into the site. Most Web 2.0 uses API's. An API enables programmers to interact with an environment such as a web site or operating system. 

Web page authoring software can create sophisticated Web pages that include images, video, audio, animation, and other effects. Multimedia authoring software, however, allows programmers to combine text, graphics, animation, audio, and video in an interactive presentation. 

Program Development
Program development consists of a series of steps programmers use to build computer programs. 

Step 1 - Analyze Requirements : To initiate program development, programmer  must first review the requirements. Next, the programmer have to meet up with the systems analyst and users. And then identify the input, processing, and output. 

Step 2 - Design Solution : A solution algorithm must be designed. In structured design, the programmer typically begins with a general design and moves toward a more detailed design. Programmers often use a hierarchy chart to show program modules graphically. With object-oriented design, the programmer packages the data and the program into a single object. This is also known as encapsulation. A program flowchart graphically shows the logic in a solution algorithm.

Step 3 - Validate Design : Check for logic errors using test data. 

Step 4 - Implement Design :  Implementation of the design includes using a program development tool that assists the programmer by generating or providing some or all code, writing the code that translates the design into a computer program, or creating the user interface. 

Step 5 - Test solution : The goal of program testing is to make sure that the programs runs accordingly and that is is error free.  Errors includes syntax errors and logic errors. Debugging the program involves removing the bugs. A beta is a program that has most or all of its features and functionality implemented. 

Step 6 - Document Solution : In documenting the solution, the programmer performs two activities, which is reviewing the program code, and reviewing all the documentation. 
 

Wednesday 19 October 2016

Chapter 12

Chapter 12 - Exploring Information System Development


What is System Development? System Development is a set of activities used to build an information system. A system  is a set of components that interact to achieve a common goal. Whereas an information system is a collection of hardware, software, data, people, and procedures that work together to produce quality information. System development activities are grouped into phases, collectively called the system development life cycle. 

System development follows three general guidelines, which are :

  • Group activities or tasks into phases
  • Involve users 
  • Define standards
Project management is the process of planning, scheduling, and then controlling the activities during system development. Normally, to plan and schedule a project efficiently, the project leader should identify the project scope, the required activities, the time estimates for each activity, the cost estimates for each activity, the order of activities, and the activities that can take place at the same time. 

Feasibility is a measure of how suitable the development of a system will be to the organization. Such as the operational feasibility, schedule feasibility, technical feasibility, and economic feasibility. 

Documentation is the collection and summarization of data and information. For example a project notebook contains all documentation for a single project. Users and IT professionals normally refers to existing documentation when working with and modifying current systems. 

Planning Phase
The planning phase for a project begins when the steering commitee receives a project request. For major activities that normally takes part in the planning phase are : 
  • Review and approve the project request 
  • Prioritize the project request
  • Allocate resources 
  • Form a project development team 
Analysis Phase
The analysis phase consists of two major activities : 

-Conducting a preliminary investigation
  • Determines and defines the exact nature of the problem or improvement 
  • Interview the user who submitted the request 
-Performing detailed analysis
  • Study how the current system works
  • Determine the user's wants, needs, and requirements. 
  • Recommend a solution 
Process modeling is an analysis and design technique that describes processes that transform inputs into outputs. 

The project dictionary contains all the documentation and deliverables of a project. Structured English is style of writing that describes the steps in a process. Whereas data dictionary stores the data item's name, description, and other details about each data item. 

Design Phase
The design phase consists of two major activities. Which are to acquire the hardware and software, as well as to develop all of the details of the new or modified information system. 

A prototype is a working model of the proposed system. 
-Prototypes have inadequate or missing documentation
-Users tend to embrace the prototype as a final system
-Should not eliminate or replace activities

Implementation Phase
The purpose of the implementation phase it to construct the new or modified system and then deliver it. The program development life cycle follows certain steps, which are respectively :

  1. Analyzing the requirements 
  2. Designing the solution
  3. Validating the design
  4. Implementing the design
  5. Testing the solution
  6. Documenting the solution
Training involves showing users exactly how they will use the new hardware and software in the system. Such as practicing more one-on-one sessions, and implementing more classroom-style lectures as we as web-based training. 

Operation, Support, and Security Phase
The purpose of the operation, support, and security phase is to provide ongoing assistance for an information system and its users after the system is implemented. 

A computer security plan should carry out the these following activities : 
  • Identify all information assets of an organization 
  • Identify all security risk that may cause an information asset loss
  • For each risk, identify the safeguards that exist to detect, prevent and recover from a loss

Chapter 11

Chapter 11 - Manage Computing Securely, Safely and Ethically


A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. A  cyber crime basically means an online or Internet-based illegal act. These illegal act include :

  • Hackers 
  • Crackers 
  • Script Kiddies 
  • Corporate Spies
  • Unethical Employees 
  • Cyber Terrorists 
  • Cyber Extortionist 
Internet and Network Attacks
  • A botnet is a group of compromised computers connected to a network. A compromised computer may often be known as a zombie. 
  • A denial of service attack (DoS attack) disrupts computer access to Internet services. 
  • A back door is a program or set of instructions in a program that allow users to bypass security controls. 
  • Spoofing  is a technique intruders use to make their network or Internet transmission appear legitimate. 
A firewall is a hardware or software that protects a network's resources from intrusion. 
These types of hardware/software includes: 

Intrusion detection software:
  • Analyzes all network traffic 
  • Assesses system vulnerabilities 
  • Identifies any unauthorized intrusions 
  • Notifies network administrators of suspicious behavior patterns or system breaches. 
Honeypot: 
  • Vulnerable computer that is set up to entice an intruder to break into it. 
Unauthorized Access and Use
Unauthorized access is the use of a computer or network without permission. Whereas Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities. 

Access controls define who can access a computer, when they can access it, and what actions that can take. 
 
A bio-metric device  authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer. 

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks. Many areas use digital forensics, like the law enforcement, the criminal prosecutors, military intelligence, insurance agencies, and information security departments. 

Software Theft
Software theft usually occurs if someone steals software media, intentionally erases programs, illegally copies a program or even illegally registers or activities a program. 

A single-user license agreement typically contains certain conditions. Which is that they are permitted to install the software on one computer, make one copy of the software, or remove the software from your computer before giving it away or selling it. They are not permitted to install the software on a network, give copies to friends or colleagues while continuing to use the software, export the software, or rent or lease the software. 

Information Theft
Information theft occurs only when someone steals personal or confidential information. Encryption  is the process of converting readable data into unreadable characters to prevent unauthorized access. 

A digital signature is an encrypted code that a person, website, or even an organization attaches to an electronic message to verify the identity of the sender. Popular security techniques includes: 
  • Digital certificates 
  • Transport Layer Security 
  • Secure HTTP 
  • VPN
System Failure
A system failure is the prolonged malfunction of a computer. A variety of factors can lead to system failure, including: 
-Aging hardware
-Natural disasters
-Electrical power problems such as noise, under-voltages, and over-voltages. 
-Errors in computer programs. 

Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies.  

Ethics and Society
Computer ethics are the moral guidelines that govern the use of computers and information systems. Information accuracy is a concern. Because not all information on the Web is correct. 

Intellectual property rights are the rights to which creators are entitled for their work. A copyright protects any tangible form of expression. 

An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical. 

Green computing involves reducing the electricity and environmental waste while using a computer. 

Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. A cookie  is a small text file that a Web server stores on your computer. 

Spam  is an unsolicited e-mail message or newsgroup posting. E-mail filtering  blocks e-mail messages from designated sources. Anti-spam programs  attempts to remove spam before it reaches your inbox. 

Social engineering  is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety. 
Employee monitoring  involves the use of computers to observe, record, and review an employee's use of a computer. 
 

Chapter 10

Chapter 10 - Managing a Database
September 29th, 2016. Thursday. 


Database - A collection of data organized in a manner that allows access, retrieval, and use of that data. 

Data - A collection of unprocessed items. Such as text, numbers, images, audio, and video. 

Information -  Processed data. Examples: documents, audio, images, and video. 

The database software, often also known as a database management system, allows users to create a computerized  database, sort and retrieve data, create forms and reports from the data, as well as to add, modify, and delete data. 

Valuable information normally would have numerous characteristics, such as the accuracy, verifiable, timely, accessibility, the cost-effectiveness, and many more. 

The Hierarchy of Data
A character is one byte. For example, numbers, letter, space, punctuation marks, and other symbols. 

A field is a combination of one or more related characters. Such as the field name, field size, and data type. 

A  record  is a group of related fields. Normally, A primary key uniquely identifies each record. A data file is a collection of related records. 

Maintaining Data
File maintenance refers to the procedures that keep data current. These procedures may refer to adding records, modifying records, or even deleting records. 

Validation compares data with a set of rules or values to find out if the data is correct. Rules as such may include alphabetic or numeric check, range check, consistency check, completeness check, check gift, and other checks. 

Database Management Systems
A data dictionary contains data about each file in the database and each field in those files. A DBMS provides several tools that allow users and programs to retrieve and maintain data in the database. 

A query language consists of simple, English-like statements that allow users to specify the data to display, print, or store. Query by example (QBE) provides a GUI to assist user with retrieving data. 

A form  is a window on the screen that provides area for entering or modifying data in database. A report generator however allows users to design a report on the screen, retrieve data into the report design, and then display or print the report. 

A DBMS provides means to ensure that only authorized users access data at permitted times. 

Relational, Object-Oriented, and Multidimensional Databases
A data model  consists of rules and standards that define how the database organizes data. A relational database on the other hard stores data in tables that consists of rows and columns. Each row normally would have a primary key whereas each column has a unique name instead. A relationship is a link within the data. 

Structured Query Language is a type of query language that allows users to manage, update, and retrieve data. 

An object-oriented database stores data in objects.  Examples of applications appropriate for an object-oriented database include multimedia database, groupware database, computer-aided design database, and hypertext database. 

A multidimensional database can store data in more than two dimensions of data. Sometimes these are also known as a hyper-cube that can consolidate data much faster than a relational database. 

A data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions. 

Chapter 8

Chapter 8 - Types of Storage 
September 22nd, 2016. Thursday. 


Today in class Ms.Wan taught a new chapter. This chapter is quite an interesting chapter. Storage holds data, instructions, and information for future use. A storage medium is the physical material on which a computer keeps data, instructions, and information.

Capacity is the number of bytes a storage medium can hold. Storage are separated into Terms.These Terms may be referred in kilobytes, megabytes, gigabytes, terabytes, and many more.

A storage device is the computer hardware that records or retrieves items to and from storage media. Two functions often carried out by this storage device are reading and writing. Reading is the process of transferring items from a storage medium into memory. Whereas writing is the process of transferring items from memory to a storage medium.

The access time of a storage device is the amount of time it takes to locate an item on a storage medium. The access time may also be referred to as the time required to deliver an item from its memory to the processor.

Hard Disk
A  hard disk contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. A hard disk could store data using longitudinal recording or perpendicular recording.

There are many characteristics of a hard disk, some includes the capacity, the platters, the revolutions per minute, the access time, and many more.

Formatting is the process of dividing the disk into tracks and sectors so that operating system can store and locate data and information on the disk.

RAID (redundant array of independent disks) is a group or two or more integrated hard disks. A network attached storage (NAS) device is a server connected to a network with the sole purpose of providing storage.

There are different types of hard disk, such as an external hard disk, which is a separate free-standing hard disk that connects to your computer with a cable or wirelessly. A removable hard disk on the other hand, is a hard disk that you insert and remove from a drive. Note that internal and external hard disk are available in miniature sizes.

Flash Memory Storage
Flash memory chips are a type of solid state media and contain no moving parts. Solid state drives (SSDs) have several advantages over hard disks, such as a faster access time, faster transfer rates, last longer, generate less heat and consumes less power.

A memory card is a removable flash memory device that could be inserted and removed from a slot in a computer, mobile device, or card reader/writer.

An Express-card module is a removable device that fits in an Express-card slot. This  device is developed by thhe PCMCIA, most commonly used in notebook computers.

Cloud Storage
Cloud storage is an Internet service that provides storage to computer users.



Optical Discs
An optical disc consists or a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser. Typically store software, data, digital photos, movies, and music.

This laser reads on an optical disc based on 3 simple steps. Step 1, a laser diode shines a light beam toward the disc. Step 2, if light strikes a pit, it scatters. If light strikes a land, it is reflected back toward the laser diode. And for the final step, the reflected light is deflected to a light-sensing diode, which sends a digital signal of 1 to the computer. Absence of reflected light is read as a digital signal of 0.

Optical discs commonly store items in a single track that spirals from the center of the disc to the edge. The track is normally divided into evenly sized sectors.



Other Types of Storage

  • A magnetic stripe card contains a magnetic stripe that stores information. A smart card stores data on a thin microprocessor embedded in the card. 
  • Microfilm and microfiche store microscopic images of documents on a roll or sheet film. 
  • Enterprise storage stores huge volumes of data and information for large business. 

Monday 17 October 2016

Chapter 7

Chapter 7 - Understanding Output 
September 20th, 2016. Tuesday. 


An output is the data that has been processed into a useful form. An output device is any type of hardware component that conveys information to one or more people.

What about a display device? A display device visually conveys text, graphics, and video information. A monitor  however, is packaged as a separated peripheral. These may also be referred to as a LCD monitor or a widescreen.

A liquid crystal display  (LCD) uses a liquid compound to present information on a display device. The quality of an LCD monitor or LCD screen depends primarily on :

  • Resolution 
  • Response  time
  • Brightness 
  • Dot pitch
  • Contrast ratio
The resolution of a display device it the number of horizontal and vertical pixels present in it. A higher resolution basically uses a greater number of pixels. 

Plasma monitors are display devices that use gas plasma technology and offer screen sized up to 150 inches. 

A CRT monitor  is a desktop monitor that contains a cathode-ray tube. It has a much larger footprint compared to LCD monitors. 

Printers
A printer  produces text and graphics on a physical medium. Printed information is called a hard copy, or printout. There are two ways of printing, either in landscape or portrait orientation. 

A non-impact printer forms character and graphics on a piece of paper without actually striking the paper. These types of printers includes ink-jet printers, photo printers, laser printers, thermal printers, mobile printers, and many more. 

An ink-jet printer forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper. It can be printed in color or in black-and-white. 

A photo printer produces color photo-lab-quality pictures. Software such as PictBridge allows you to print photos directly from a digital camera. Photo printers may also print from a memory card and preview photos on a built-in LCD screen. Most photo printer uses the ink-jet technology. 





A multi-function peripheral (MFP) is a single device that prints, scans, copies, and in some cases, faxes. Sometime also known as an all-in-one device. 

Impact printers form characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper. Impact printers may be categorized into two types, which is the dot-matrix printer and the line printer. 

A dot-matrix printer produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon. 

A line printer prints an entire line at a time. 

Speakers, Headphones, and Earbuds
An  audio output device produces music, speech, or other sounds. Most computer users attach speakers to their computers to generate higher-quality sounds for playing games, to interact with multimedia presentations, listen to music, and to watch movies. 

Headphones are speakers that cover or are placed outside of the ear. Whereas earbuds, rest inside the ear canal. 

Voice output occurs when you hear a person's voice or when the computer talks to you through the speakers. Some web sites dedicate themselves to providing voice output. 

Other Output Devices
Other output devices are available for specific uses and applications, such as data projectors, interactive whiteboards, force-feedback game controllers, and tactile output. 

A data projector is a device that takes the text and images displaying on a computer screen and projects them on a larger screen. LCD projector and digital light processing (DLP) projector are examples of data projector. 

An interactive whiteboard is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen. 

Sunday 16 October 2016

Chapter 5

Chapter 5 - Types of Utility Programs and Operating Systems
September 14th, 2016. Wednesday.


System Software consists of the programs that control or maintain the operations of the computer and its device. System software are such as operating systems and utility programs.

An operating system or other words also known as (OS) is a set of programs containing instructions that work together to coordinate all the activities that work together to coordinate all the activities among computer hardware resources. These activities includes the starting and the shut down of a computer, the management of the memories and programs in the computer, task coordination, internet connection establishment, monitor performance, administer security, and so on.

Operating System Functions
The process of starting or restarting a computer is called booting. This booting may be specified into two different groups, which are cold booting and warm booting. Cold booting is when you are turning on a computer that has been powered off completely. Whereas warm booting you are using the operating system to restart the computer.

A boot drive is the drive from which your computer starts. You may also boot from a boot disk.  A recovery disk contains a few system files that will start the computer.

A user interface controls how you enter data and instructions and how information is displayed on the screen. With a graphical user interface (GUI), you interact with menus and visual images.
Memory management optimizes the use of RAM.  Virtual memory is a portion of a storage medium functioning as additional RAM.



A performance monitor is a program that assesses and reports information about various computer resources and devices.

Stand-Alone Operating Systems
Windows 7 provides programs such as Windows Firewall, Windows DVD Maker, WIndows Media Player, Desktop Gadget Gallery, and many more. These are examples of stand-alone operating systems.

The Macintosh operating system has set the standard for operating system ease of use. Latest version of such is the Mac OS X.

Utility Programs
A utility program is a type of system software that allows a user to perform maintenance-type tasks.

A file manager is a utility that performs functions related to file management. Such as displaying a list of files, organizing files in folders, and creating shortcuts.

A search utility is a program that attempts to locate a file on your computer based on criteria you specify.

Disk defragmenter reorganizes the files and unused space on a computer's hard dish so that the operating system accesses data more quickly and programs run faster. This process is known as defragmenting. 

Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user. Note that a spyware remover could detect and delete spywares and other similar programs.

Adware displays on online advertisement is a banner or pop-up window. An adware remover  is a program that detects and deletes adware.

A media player allows you to view images and animation, listen to audio , and watch video files on your computer.


Disc burning software writes text, graphics, audio, and video files on a recordable or rewritable optical disc.

A personal computer maintenance utility identifies and fixes operating system problems, detect and repairs disk problems, and includes the capability of improving a computer's performance.