Final Review

Document Sample
Final Review Powered By Docstoc
Tools for an Information Age

Final Review -- Chapters 6, 10, 12, 13, 14
Secondary Storage

   Separate from the computer itself
   Software and data stored on a semi-
    permanent basis
           Unlike memory, not lost when power is lost

9/29/2012                                                2
Benefit: Space

   Store a roomful of data on disks smaller than
    the size of a breadbox
           Diskette contains equivalent of 500 printed pages
           Optical disk can hold equivalent of 500 books

9/29/2012                                                       3
Benefit: Reliability

   Data in secondary storage is relatively safe
           Secondary storage is highly reliable
           More difficult for untrained people to tamper with
            data stored on disk

9/29/2012                                                        4
Benefit: Convenience

   Authorized users can easily and quickly
    locate data stored on the computer

9/29/2012                                     5
Benefit: Economy

   Several factors create significant savings in
    storage costs
           Less expensive to store data on disks than to buy
            and house filing cabinets
           Reliable and safe data is less expensive to
           Greater speed and convenience in filing and
            retrieving data

9/29/2012                                                   6

   The circular portion of the disk
    surface that passes under the
    read/write head
           Floppy diskette has 80 tracks on
            each surface
           Hard disk may have 1,000 or
            more tracks on each surface of
            each platter

9/29/2012                                      7

   A fixed number of adjacent sectors that are
    treated as a unit of storage
           Typically two to eight sectors, depending on the
            operating system

9/29/2012                                                      8
Seek Time

   The time it takes the access arm to get into
    position over a particular track
           All access arms move as a unit
           All simultaneously in position over a set of tracks
            that make up a cylinder

9/29/2012                                                         9
Optical Disk Storage

   Provides inexpensive and compact storage with
    greater capacity
   Laser scans disk and picks up light reflections from
    disk surface
   Categorized by read/write capability
           Read-only media - user can read from, but not write to disk
           Write-once, read-many (WORM) - user can write to disk
           Magneto-optical - combines magnetic and optical

9/29/2012                                                             10
Compact Disks

   CD-ROM - drive can only read data from
           CD-ROM stores up to 700 MB per disk
           Primary medium for software distribution
   CD-R - drive can write to disk once
           Disk can be read by CD-ROM or CD-R
   CD-RW - drive can erase and record over
    data multiple times
           Some compatibility problems trying to
            read CD-RW disks on CD-ROM drives

9/29/2012                                              11
Digital Versatile Disk (DVD)

   Short wavelength laser can read densely
    packed spots
           DVD drive can read CD-ROMs
           Capacity up to 17GB
           Allows for full-length movies
           Sound is better than on audio CDs
   Several versions of writable and rewritable
    DVDs exist

9/29/2012                                         12
Redundant Array of Independent Disks
   A group of disks that work
    together as one
           Raid level 0 spreads data from a
            single file over several drives
                Called data striping
                Increases performance
           Raid level 1 duplicates data on
            several drives
                Called disk mirroring
                Increases fault tolerance

9/29/2012                                      13
Organizing and Accessing Stored Data

   Character
   Field
   Record
   File
   Database

9/29/2012                              14

   A set of related characters
   Describes one characteristic of a person,
    place, or thing
           For a university, a student’s first name would be
            stored in a field
   Key field - a unique identifier for a record

9/29/2012                                                       15

   A collection of related fields
           For the university, all of the fields for one student
            constitute one record

9/29/2012                                                           16
Tools for an Information Age

Chapter 10
Security and Privacy:
Computers and the Internet
Security and Privacy

   Security – data stored on computer must be
    kept safe
   Privacy – private data must be kept from
    prying eyes

9/29/2012                                        18
Methods Computer Criminals Use

   Bomb                   Scavenging
   Data diddling          Trapdoor
   Denial of service      Trojan horse
    attacks                Zapping
   Piggybacking
   Salami technique

9/29/2012                                  19
Denial of Service Attack

   Hackers bombard a site with more requests
    than it can possibly handle
           Prevents legitimate users from accessing the site
           Hackers can cause attacks to come from many
            different sites simultaneously

9/29/2012                                                       20

   A set of illicit instructions that
    passes itself on to other files
           Transmitting a virus
           Can cause tremendous damage
            to computer and data files
           Can be prevented
           Common computer myths

9/29/2012                                 21

   Mass advertising via e-mail
           Can overflow your e-mail inbox
           Bogs down your e-mail server, increasing the cost
            of e-mail service
   Preventing spam

9/29/2012                                                   22

   A small text file stored on your hard drive
   File is sent back to the server each time you visit
    that site
           Stores preferences, allowing Web site to be customized
           Stores passwords, allowing you to visit multiple pages
            within the site without logging in to each one
           Tracks surfing habits, targeting you for specific types of

9/29/2012                                                                23
Preventing Spam

   Many ways you can minimize junk e-mail
           Be careful how you give out your e-mail address
           Filtering software allows you to block messages or send
            them to designated folders
           Don’t register at Web sites without a promise the Web site
            will not sell your information
           NEVER respond to spam
   Anti-spamming legislation is being proposed in
    many states

9/29/2012                                                                24
A Firewall

   A combination of hardware and
    software that sits between an
    organization’s network and the
           All traffic between the two goes
            through the firewall
           Protects the organization from
            unauthorized access
           Can prevent internal users from
            accessing inappropriate Internet

9/29/2012                                      25
White-Hat Hackers

   Hackers that are paid by a company to break
    into that company’s computer systems
           Expose security holes and flaws before criminals
            find them
           Once exposed, flaws can be fixed

9/29/2012                                                      26
Computer Forensics

   Uncovering computer-stored information suitable
    for use as evidence in courts of law
           Restores files and/or e-mail messages that someone
            has deleted
   Some experts are available for hire, but most are
    on the staffs of police departments and law firms

9/29/2012                                                        27
A Disaster Recovery Plan

   A method of restoring computer processing
    operations and data files in the event of major
   Several approaches
           Manual services
           Buying time at a service bureau
           Consortium
   Plan should include priorities for restoring programs,
    plans for notifying employees, and procedures for
    handling data in a different environment

9/29/2012                                                28
Freedom of Information Act

   Allows ordinary citizens to have access to
    data gathered about them by federal

9/29/2012                                        29
Tools for an Information Age

Chapter 12
Spreadsheets and Business Graphics:
Facts and Figures
Electronic Spreadsheets

   A computerized version of a
    paper spreadsheet
   Benefits
           Eliminates much of the
           Calculations are error-free
           Worksheet is automatically
            recalculated when you
            change one value or
           Performs “what-if” analysis

9/29/2012                                 31
Cells and Cell Addresses

   Spreadsheet is divided into rows
    and columns
   A cell is the intersection of a row
    and a column
           Cell is known by its address
                Address consists of column
                 letter, followed by row number,
                 for example B7
           Active cell - the cell available to
            be edited at a given time

9/29/2012                                          32
Contents of Cells

   Label – provides descriptive text information about
    entries in the spreadsheet
   Value – an actual number that is entered into a cell
   Displayed value – what is displayed in the cell
           Formula – an instruction to the program to calculate a
           Function – a preprogrammed formula

9/29/2012                                                            33
Cell Contents: Formula

           Calculation instruction
           Contains
               Cell address
               One or more arithmetic operators
               Functions
           Result appears in the cell containing the formula
           Calculation appears in the formula bar

9/29/2012                                                       34

      A group of one or more
       adjacent cells occurring
       in a rectangular shape
           The program treats the
            range as a unit
           A range is referred to by
            its upper-left and lower-
            right cells, for example

9/29/2012                               35
Spreadsheet Features

   Security
           Cells can be protected so the user doesn’t
            accidentally destroy complex formulas
           Password protection can prevent anyone from
            making changes to the worksheet
   Decoration
           Add borders or colors to cells or ranges
           Change the color of fonts
           Add clip art

9/29/2012                                                 36
Planning the Spreadsheet

   Create a sketch of the
           Show how labels and data
            should appear
           Specify any formulas
            and/or functions needed

9/29/2012                              37
Business Graphics

   Graphics that represent data in a
    visual, easily understood format
           Generate and sustain interest
           Graphs easily reveal trends that
            could be lost if buried in long
            columns of numbers
   Two types:
           Analytical graphics
           Presentation graphics

9/29/2012                                      38
Line Graphs

   Illustrate multiple
   Data is plotted in plot
    area, then connected
    by a line

9/29/2012                     39
Tools for an Information Age

Chapter 13
Database Management Systems:
Getting Data Together
The Hierarchy of Data

   Field – a group of one or more characters that has a
    specific meaning
           The smallest meaningful unit of data
           Describes one characteristic of a person, place, or thing
   Record – the set of fields containing data about a person,
    place, or thing
   File – a collection of related records

9/29/2012                                                               41
Primary Key

   A field that uniquely identifies a record
           SalesID can be a primary key for the Salesperson
           Once a SalesID appears in the table, no other
            salesperson can have that ID

9/29/2012                                                  42
Relational Model

   Data organized in table
           Columns represent fields
           Rows represent records
   Tables related by
    primary/foreign key
   Most current database
    development uses this

9/29/2012                              43
Integrity Constraints

   Define acceptable values for a field
           For example, the value of a month cannot be
            greater than 12
   Primary keys cannot be duplicated
   Foreign keys cannot be used unless they
    exist as a primary key
           A SalesID that is used in the customer table must
            exist as a primary key in the salesperson table

9/29/2012                                                   44
Creating the Database

   Consider your needs
           Reports you will need
           Inquiries you will want to make

9/29/2012                                     45
Setting Up the File Structure

   Design the structure for
    each table
           Define the table
           Define each field in the table
           Define primary key
   Set up the table in design

9/29/2012                                    46
Entering the Data

   Enter data into the tables in
    datasheet view
   Enter data into the tables by
    using a graphical form

9/29/2012                           47
Data Retrieval

   Involves extracting the desired data
   Two primary forms of data retrieval
           Queries
           Reports

9/29/2012                                  48

   You present a set of criteria; the DBMS
    selects matching data from the database
   Use a query language
           Structured Query Language (SQL) is supported
            by most relational databases
           Query-by-example (QBE) uses a graphical
            interface to generate the SQL
           Display results in a table-like grid

9/29/2012                                                  49
Data Warehouses

   Contain data that has been captured in
    company databases
           Can contain data that has been gathered from
            external sources
   Use a variety of analytical tools

9/29/2012                                                  50
Analytical Tools

   Online analytical processing (OLAP) software
           Analyzes data from all databases in the data
           Provides different “views” of the same data
   Data mining uses sophisticated statistical and
    artificial intelligence techniques
           Looks for previously unrecognized patterns,
            relationships, and trends among the data

9/29/2012                                                  51
Tools for an Information Age

Chapter 14
Systems Analysis and Design:
The Big Picture
The Systems Development Life Cycle
Phases for Developing a System:
 Preliminary investigation

 Analysis

 Design

 Development

 Implementation

9/29/2012                            53
Preliminary Investigation: Defining the
   Two points that must be
    agreed upon
           The nature of the problem
           The scope (boundaries) of the
   Agreeing on the problem
    helps define the objectives of
    the system

9/29/2012                                   54
Systems Analysis

   Studying an existing system to determine how it
    works and how it meets users’ needs
           Typically happens as a result of some impetus for change,
            combined with the authority to make the change

9/29/2012                                                           55
Individuals Involved in Systems Analysis

   Systems analyst – performs analysis and
           Not programming (but may on occasion)
   Client – the person or organization
    contracting to have the work done
   User – the people who will have contact with
    the system

9/29/2012                                           56
Data Gathering

   A number of techniques can be used
           Written documents
           Interviews with users and managers
                Structured interview – includes only questions that
                 have been written out in advance
                Unstructured interview – interviewer has a general
                 goal but few, if any questions prepared
           Questionnaires
           Observation
           Sampling

9/29/2012                                                              57
System Requirements

   A detailed list of things the
    system must be able to do
           The design of the new system
            will be based on these
           Analyst and management must
            come to a clear agreement on

9/29/2012                                  58
Key Decisions
   Write custom software or buy a software
    package (make or buy decision)
           Software packages will often need to be
   Outsource software development or create
           In-house design requires client to have technical
   Develop alternatives (candidates)
           All candidates meet the client’s requirements but
            with variations in features and cost

9/29/2012                                                       59
Systems Design

   The process of developing a plan for an improved
    system, based on the result of the systems analysis

9/29/2012                                                 60
Systems Design

   Develop detailed design specifications that
    will satisfy requirements
           Output requirements
           Input requirements
           Files and databases
           System processing
           System controls and backups

9/29/2012                                         61

   Building a model of the system
           Typically a limited working system or subset of a system
           Developed very quickly
           Designed to give the user an idea of what the system will
            look like
   Computer-aided software engineering (CASE) tools
           Automate many of the tasks of the development process

9/29/2012                                                               62
System Development

   Schedule and monitor the two principal activities
           Programming
           Testing
   There are several project scheduling tools

9/29/2012                                               63

   Unit testing – verifies that individual program
    units work
           Perform testing with test data
   System testing – determines whether all
    program units work together as planned
   Volume testing – uses real data in large
           Determines whether the system can handle a
            large volume of data

9/29/2012                                                64

   Steps involved in starting the new system
           Training
           Equipment conversion
           File conversion
           System conversion
           Auditing
           Evaluation
           Maintenance

9/29/2012                                       65
System Conversion

   Four approaches
           Direct conversion – the user simply stops using the old
            system and starts using the new one
           Phased conversion – the system is implemented one part
            at a time
           Pilot conversion – the entire system is used by a
            designated set of users
           Parallel conversion – the old and new systems are both
            used until users are satisfied the new system works

9/29/2012                                                             66

   Teach users how to use the system
           The system will do no better than the people
            using it
           Develop user’s manual to aid users who are not
            familiar with the system
           Hands-on training is best

9/29/2012                                                    67

Shared By: