CIT120 Common Final - the CLC Faculty and Staff Web Pages

advertisement
Common Final Review Topics
Ch 1 - Overview
Computers are ubiquitous
Used in home, education, work, on the go
Smart appliances
Data – text, sound, image, video
All data maintained in files
File systems have folders (directories) and files
Hierarchical structure
NTFS – recommended for XP, Vista, Win 8
FAT32 – still used on some external devices
Computers process binary data
Convert data to information
Computer System: input -> process -> output with storage and communication
Input converts data to binary to be processed by computer
Output converts binary to be processed by human beings
Input devices – keyboard, mouse, microphone, digital camera, webcam
Output devices – monitor, printer, projector, speaker via sound card
System box contains
motherboard, and motherboard holds processor, memory slots,
expansion slots, buses, control circuitry
internal hard drives, optical drives, power system unit, connectors
Software – system vs application
Computers need Oss
Modern OSs – Windows XP, Vista, 7, and soon 8; Apple OS X; Linux
Mobile OSs – iOS and Android
System programs help manage computer devices and resources
OSs and utilities
User interface of OS often uses a desktop paradigm
Application programs do something useful for the user
Games still dominant application sector
Productivity software such as word processing, spreadsheets and presentation pkgs
Written in high level programming languages – C++, Java, C#, VB, Python
Computers always follows instructions laid out in the software
Different sizes of computers
Embedded
Mobile
Personal – handheld (ultra mobile PC),tablet, netbook, ultrabook,
laptop, desktop, workstation, all-in-one
Mid-range – 100s of users, small and medium businesses
Mainframe – 1000s of users, schools, businesses, web search sites
Supercomputer – few users, extremely high processing
Modeling applications
Large numbers of processors tied together through high speed bus
High end super computers process in the peta flops
Grid computing
Computer users
John North
1
CIT120
Common Final Review Topics
Programmers, analysts, operators, administrators, end users
Networking
Nodes
Wired and wireless
Ethernet
Hot spots
Sharing – data, printing, communication
Internet considered largest network
Internet and Web
Internet uses TCP/IP protocol
Internet connects computer networks throughout the world
Web – a collection of publicly available web pages
ISPs provide access to the internet for most people, typically at a small charge
Different protocols
http – transmits hypertext
smtp & pop – handles emails
asynchronous communication
xmpp – IM
ftp – file transfers
Web sites
Home page
Web pages
.html, .asp, .jsp, .php, .cgi – static vs dynamic web pages
Hyperlinks
Favorites / bookmarks
Browser software used to process HTML (display language for Web pages)
Address bar
Search sites
Addressing
IP address:
225.129.30.18
Domain name: google.com; clcillinois.edu
Domain name server
URL: protocol, domain, directory(s), webpage name
http://home.clcillinois.edu/bdv603
Email addresses: username@domain.name
Society Issues with Computing
Malware – viruses, worms
Identity Theft – a major concern for most users as we move to the cloud
Scams
Privacy
Addiction
Changing personal and work habits / procedures
Higher productivity
Availability of answers
Opening up new solutions
John North
2
CIT120
Common Final Review Topics
Ch 2 – Processing
First electronic computer created in 1946
Transistors are the key element in the microprocess – currently 10-core Zeon has 2.6 billion
CPU
Arithmetic and Logic Unit
Control Unit
Address Register – next instruction
Instruction Register – decodes instruction
Registers – manipulates the binary data
Instruction steps – fetch, decode, execute, store
Prefetch unit
Cache memory levels
Most cache memory has been moved onto the processor chip rather than external
Pipelining used to do concurrent steps for instructions; used to speed up process
Main CPU manufacturers
Intel, AMD, ARM, IBM (PowerPC, Cell)
Common desktop processors have 4 cores
High end desktop and workstation processors have 6 and 8 cores
Mid priced laptops have 2 cores
Processors capable of giga ops
Main GPU
Nvidia, ATI
Newer APU (Accelerated Processing Unit) integrates CPU and GPU functionality
Used for lower end desktops, laptops
System clock – crystal on mother board
Multipliers for processor, memory, front side bus (data)
Synchronizes operations between components
The clocks are measured in hertz – cycles per second; CPUs currently run around 2 to 3 GHz
Memory
ROM – boot
Flash – non-volatile
RAM – volatile (needed for fast changes of state from 0 to 1 and back), also called main memory
Physical memory vs virtual memory (implemented on hard drive)
Physical is a million times faster than virtual
Number systems
Decimal – based on powers of 10; has range of 0 – 9
Binary – based on powers of 2; has range of 0 – 1
Binary representation of 11 is 1011 – 8 + 0 + 2 + 1
Hexadecimal – based on powers of 16; based on range of 0 – 9, a, b, c, d, e, f
Types of data – all must be represented in binary for computer to manipulate
Text – encoding standards – ANSI (8-bit), EBCDIC (8-bit), Unicode (16 or 32-bit)
Sound or audio– frequency represented in 16-bits; sampled 44,100 times/second
Image – pixels represented by 24 or 32 bits typically
Video – Images at 24 or 30 frames per second; usually includes sound
Bits, Bytes, and Nibbles
A byte is 8 bits or able to represent values between 0 and 255 for a total of 256 different values
Buses often measured by throughput or bandwidth
John North
3
CIT120
Common Final Review Topics
Buses on mother board
Data
Address
Control
Power
External buses
USB: 2.0 speed 480 Mbps; 3.0 speed 5 Gbps
Firewire: 400 Mbps, 800 Mbps – used often for video esp by Apple
Intel Thunderbolt: 10 Gbps; Apple uses it in newer PCs
SCSI
Wireless connections: WiFi, WiMax, Bluetooth
Important numbers
Kilobytes
milliseconds
Megabytes
microseconds
Gigabytes
nanoseconds
Terabytes
Petabytes
Exabytes
John North
4
CIT120
Common Final Review Topics
Ch 3 – Storage – persistant, non-volatile storage
Most data is stored as random access data – retrieve data from any location directly
Tape drives are the typical sequential access device
Removable media vs fixed media
Medium vs device
Magnetic
HD, floppy, zip/jazz drives, portable drives, external hard drives
Data stored as polarity
Tracks, sectors, cylinders, clusters
Low cost, high density
HD capacity – 3 to 4 TB
HD speed – 166 MBps
Tape – sequential storage
Backup and logging
Optical
CD, DVD, BluRay
Uses lasers
ROM – lands and pits
R, RW – reflective and non-reflective
Removable
Cheap media
Solid State
RAM disk
RAM memory, hard drive, UPS
Expensive, but extremely fast
Solid State Drives (SSDs)
Based on using flash memory
5th generation
Extremely fast – 550 MBps
Other
Smart cards – has memory and possibly processor
Potentially add biometric data for security purposes
Holographic storage, a 3-D device –but is it just a vaporware device?
Online storage – often called Cloud storage
Storage drives usually given letters in Windows – C: drive most often hard drive and contains OS
Physical drives can be partitioned into logical drives
Vendor systems often come with a small partition called the recovery partition
NAS vs SAN
RAID disk implementation
Striping, mirroring, striping with redundancy
Hot-swappable
Often use RAID (redundant array of independent disks) to provide fault tolerance and increased
John North
5
CIT120
Common Final Review Topics
read speeds
John North
6
CIT120
Common Final Review Topics
Microsoft Word
Word processor
Word wrap
Paragraphs and paragraph styles
Formatting
Fonts
Alignment
Indents
Spacing
Tabs
Short-cut key
Header / Footer sections
Body section
Tables
Table styles
Normal.dotm
John North
7
CIT120
Common Final Review Topics
1) Chapter 4 – Input and Output
a) Two most common input devices
b) Keyboards
i) Qwerty vs Dvorak
ii) Ergonomic keyboard
iii) Mobile device keyboards
c) Keyboard layout
i) Alphanumeric/cursor movement/numeric pad/function key/modifier keys
ii) Esc/Window/Scroll/delete/backspace/insert
d) Mice
i) Mechanical mouse – rolling ball
ii) Optical mouse
iii) Trackball/joystick/game pad
e) Other input devices
i) Microphone
ii) Digital camera/page scanner/barcode scanner – resolution/storage
iii) Graphics tablets – stylus
iv) Touch screens
v) RFID tracking
vi) Biometric reader – unique physical characteristics of a person
vii) Optical character recognition
viii) Magnetic ink
f) Common output devices
i) Monitor – pixel/RGB/dot pitch
(1) CRT
(2) Flat-panel – most PC monitors are LCD, some use LED, smart phones may use AMOLED
ii) Printer – monochrome/color:KCYM; measured in dots per inch
(1) Ink-jet – spray ink
(2) Laser-jet - uses layer to charge drum that picks up toner and rolls it onto paper
(3) Impact printers – can make multiple copies in a single pass via carbons
(4) Thermal printers – more stable but more expensive
iii) Projectors – LCD vs DLP which use nanotechology MEMs (mirrors)
iv) Plotters – large format documents such as architectural drawings, mechanical drawings,
posters
John North
8
CIT120
Common Final Review Topics
2) Chapter 5 – System Software – helps manage hardware and software on system
a) OS
i) Devices that need OSs – all
ii) Functionality of OS
(1) User interface
(a) Command line
(b) GUI
(i) Desktop
(ii) Ribbon
(2) File management
(3) Services
(4) Kernel
(5) Device drivers – tailored programs to communicate and interact with devices
(6) Boot
(7) Virtual memory – where/speed
iii) Common products
(1) Windows
(a) DOS/Windows 1.0, 2.0, 3.0,3.1
Single user, single task
(b) Windows 95/98/98 SE/ME – called the Windows 9x series
Single user, multiple tasks
(c) Windows XP/Vista/7/8 – 8 is still beta and not in production
(d) Windows NT/Windows 2000/Windows 2003 Server/Windows 2008 R2 Server
Servers are multi-user, multiple processors (multiprocessing), multiple tasks,
parallel processing used in HPC (supercomputers)
(e) Mobile/Embedded/Auto/Compact
iOS, Android, Symbian, Palm
(2) Mac
(a) OS X – Tiger/Leopard/Snow Leopard/Lion/Mountain Lion
(3) Linux
(a) LAMP – open source software to build a web server
(i) Linux
(ii) Apache Web server – most used web page server
(iii) MySQL – full featured open source relational DB
(iv) PHP
(b) Most common distributions - Red Hat/Fedora/SUSE/Ubuntu/Debian
(4) UNIX – late 1960s by Bell Labs
(5) IBM mainframe – System 390 z/OS
(6) Netware – first file servers
b) Utilities
i) File management
(1) Scan/defragmentation/compression/encryption
John North
9
CIT120
Common Final Review Topics
ii) Security –
(1) Anti-virus/spam/spyware/intrusion
(2) Firewall
John North
10
CIT120
Common Final Review Topics
3) Ch 6 - Application Software – what is useful for user/specific tasks
a) Acquiring software
i) Software license
(1) Commercial – shrinkwrap/site licenses
(2) Shareware – try before you buy; honor system
(3) Freeware – use “as is”
(4) Public Domain – abandoned; modified, distributed
(5) Open Source – source + executable
ii) DVD/Online/Bloatware
John North
11
CIT120
Common Final Review Topics
b) Local vs remote software and data
i) Cloud computing
ii) SaaS, PaaS, IaaS
iii) ASPs are the main purveyors of SaaS
c) Software suites
i) Bundled components
ii) Common interface/interaction
iii) Lower price
iv) MS Office, graphic packages, ERPs
d) Productivity
i) Word processing – character/paragraph/page/document
(1) Enter key  paragraph
(2) Tables
(3) Point sizes – 72 points in an inch
ii) Spreadsheets – column/row/cell/worksheet/chart sheet/workbook
(1) Absolute vs relative addressing - $ used to indicate absolute
(2) Fill down/across
(3) Ranges – C14:F14, B5:B10, A5:E10
iii) Databases – field(attribute)/row(record)/table/database
(1) Forms and reports
John North
12
CIT120
Common Final Review Topics
(2) Queries – questions posed to the DB
(3) Most common today - relational
iv) Presentation software – frame/slide/slideshow
(1) Slide transitions
(2) Custom animations
e) Communication
i) IM – synchronous
ii) Email – asynchronous
iii) Text messaging
iv) Twitter – Internet text messaging
f) Searching
g) Social networking software
h) Graphics packages
i) Paint programs – bmp type files
ii) Draw programs – vector graphics
iii) Photo-manipulation programs
iv) CAD
John North
13
CIT120
Common Final Review Topics
4) Ch 7 - Networking
a) Nodes
b) FCC controls allocation of the electromagnetic spectrum – radio, electricity, light, and
microwaves
c) Packet vs circuit switching/transmission
Internet uses packet switching
d) Types – computer/internet/telephone/TV & Radio/Monitoring/GPS/sensors for monitoring
i) Dual-mode phones
(1) 3G or 4G/WiFi
(2) CDMA / GSM / LTE /
(3) Cellular / Satellite
e) Applications – Videoconferencing/Collaborative/Telecommuting/Telemedicine/Multimedia
f) Topologies (physical arrangement of nodes) – Star/Ring/Bus/Mesh
g) Architecture – Client/Server & P2P
h) Network Size and Coverage
i) PAN – blue tooth networks
ii) TAN – home networks
iii) LAN – small geographical area; used by schools, companies
iv) CAN - campus
v) MAN – metropolitan; vendor leases bandwidth
vi) WAN – wide area
i) Wired connections
i) Twisted pair – phone lines
ii) Coax – cable TV
iii) Fiber optic – Uses one or more lasers to pulse light down fiber, not affected by
electromagnetic interference
j) Wireless
i) Cellular radio
ii) BlueTooth
iii) WiFi
iv) WiMax
v) Microwave – towers(stations)/satellite
vi) Infrared
k) Devices
i) Hub
ii) Switch
iii) Router
iv) Gateway
v) Bridge
vi) Multiplexor/Concentrator
vii) Repeaters/Range Extenders
viii) WAP – wireless access point; think Starbucks
John North
14
CIT120
Common Final Review Topics
l)
m)
n)
o)
p)
Common usage
i) Internet
ii) Intranet
iii) Extranet
(1) VPN
(2) Telecommuters/Salespeople/Executives/Suppliers/Customers
Serial vs parallel transmission
Simplex, half-duplex, and full-duplex
Synchronous vs asynchronous messages
Satellites
LEO, MEO, geosynchronous
John North
15
CIT120
Common Final Review Topics
Chapter 8 – The Internet and the World Wide Web












ARPANET, NSFNET, Internet 2
o ICANN – domain name assignments
o Internet2 – consortium developing advanced networking technologies
Access providers, ISPs, internet backbone providers, content providers
ASP providers, SAAS, IAAS, PAAS
Modem (POTS) vs broadband
o Voice-grade lines
o Cable, DSL, WiMax, Satellite, 3G/4G data plans
 Cable most widely used
o Fiber to the Premise (FTTP), Broadband over Fiber (BoF)
Hotspots
Portals
Searching
o Key-word searches
 Web-crawlers / search engines
o Directories
o Phrases, Booleans, Advanced searching
Types of Services
o Synchronous
 IM
 Skype
 Teleconferencing, videoconferencing, webconferencing
 VOIP – voice over data lines
o Asynchronous
 Email
 Text messaging
o Telecommuting
Distance learning
o Web-based training
o Online classes, online testing
o Podcast
o Webinars
o Wikis, blogs, e-portfolios
Push technologies
o RSS
Censorship
Privacy
o Presence technology
o Tracking
John North
16
CIT120
Common Final Review Topics
o
John North
Cookies
17
CIT120
Common Final Review Topics
Chapter 9 – Network and Internet Security













Hacking, white-hat vs black-hat
Cybercrime
o Scams, dot cons
o Identity theft
o Data loss
o Cyberbullying
o Cyberstalking
o Anonimity
o Computer sabotage
Malware
o Virus, Trojan horse, computer worm
o Computer sabotage
o Bots and botnets
Internet security packages
o Anti-virus, anti-spam, anti-spyware, firewall, intrusion detection
Spoofing, phishing, spear phishing, pharming
Cyberbullying / cyberstalking
Denial of service attacks
WiFi for business or home
o Default security
o WEP, WPA, WPA2
o MAC addresses
o SSID
War-driving vs WiFi Piggybacking
Cookie
o First-party vs third-party
Private-key vs Public-key encryption
o VPN
Authorization vs authentication
o Possessed knowledge
o Possessed object
 Biometric access
o Two-factor authentication
USA Patriot Act of 2001
o Obtain real identity of Internet user
o Intercept Internet communications
o Impact on data records for public schools
John North
18
CIT120
Common Final Review Topics
Chapter 10 – Multimedia and the Web







Different learning styles – visual, auditory, kinesthetic
Large web docs should be available as .doc or .pdf
Fonts – serif (headlines) vs san serif (large amounts of text)
Image formats
o BMP
 GIF – 256 colors, line art, smallest size, animation, logos, banners
 JPEG/JPG – most common for photos, lossy, quality vs compression specified,
true-color
 PNG – lossless compression, true-color
 TIFF – favored by pro photographers, lossless
 Paint programs
 Thumbnails
o Vector-based
 CAD
 Clipart
 Resizable
 Drawing programs
 Scalable vector graphics
o Photomanipulation
 Photoshop
 Multi-layered
Animation
o Java applets
o Animated GIFs
o Javascript
o Flash / Silverlight
Video
o Formats – MS: avi, wmv; Apple – mov (QuickTime); Movie Pictures Group: mp2, mp4
Internet based languages – most are based on some markup language
o HTML, XHTML, DHTML, WML
 Specifies formatting webpage to browser
o AJAX
o Web authoring software
 Adobe Dreamweaver
 MS Expression Web
o Plug-ins
 Flash
 Adobe reader
 Shockwave
 Link to plugin source
John North
19
CIT120
Common Final Review Topics


Website development
o Storyboards, flowcharts, page layouts
o Navigational elements
o Site maps
Streaming data – buffered before actually playing
John North
20
CIT120
Common Final Review Topics
Chapter 11 – E-commerce






What is E-commerce
Online stores (dot-coms), brick & mortar, and click and mortar
Advantages vs disadvantages
o Comparison shopping web sites – shopping bots
E-commerce models
o B2C – eTailers such as Walmart, Amazon, NewEgg, BestBuy
o B2B
 Expected to surpass B2C market
o C2C (P2P)
o B2G
o Brokerage sites
 Intermediary hub model
 Horizontal vs Vertical hubs
 Bring buyers and sellers together
 Dynamic pricing sites – Priceline.com
Software for web site development
o eCRM – order status, tracking links, downloads, technical support
o Storefront software
o Shopping cart software
 Shopping cart abandonment
o Payment collection
 Online payment services: PayPal (owned by E-bay), Google Checkout
 Digital wallets
 Gift cards, coupons
 One time password
o Marketing
 Sponsored links
 Banner ads
 Rich media ads
 Behavioral targeting
o Search site optimization (SSO)
Security
o Secure transactions
o Secure documents / files
o Authentication
John North
21
CIT120
Common Final Review Topics
Access



DB vs DBMS
Structure – field, record, table, database
Critical Objects
o Table
 Fields and data types
 Text vs memo
 Number – byte, integer, long integer, single, double, currency
 Boolean (yes/no)
 OLE objects
 Attachments, hyperlinks
 Indexes
 Primary key – key symbol
o Composite or concatenated
 Secondary keys
 Foreign keys
 Properties
 Validation rules and messages
 Default values
 Required fields
 Format / masks
o Relationships 1-1, 1-M, M-M
 Intersection table
 Referential integrity
 Cascade update/delete
o Forms – one record at a time
 Single record at a time
 Master / Child forms
 Hybrid forms
o Queries – answering a question about the data
 Joins
 Aggregate (Totals)
 Wildcards - * and ?
 Criteria
 Parameterized queries
o Reports
 Formalized tables and queries
 Detail / Summary
 Calculated fields
 Group breaks
John North
22
CIT120
Common Final Review Topics
Chapters 12 and 13 – Information System and Application Development
Information systems consist of hardware, software, data, people, and procedures
MS .NET Framework and Sun/Oracle Java both provide virtual machines and thus are portable
Java applets run inside webpages and often provide animation on these web pages
Object-oriented development  encapsulates both state (data or attributes) and behavior (methods or
functions or processes) which manipulates the state
Expert Systems are one aspect of AI and consist of 3 major components: knowledge base (rules and
data), inference engine, and a user interface (to ensure knowledge transfer)
AI uses neural networks as a mechanism similar to the human brain
System Types –
 Office –
o Document Management System
o Content Management System
o Communication System
 Transaction Processing System
o Non-management users typically
o Deals with action right now
o Provided biggest bang for the development buck
o Payroll, inventory control examples
 Management Information Systems
o Short range – hour, day, week, month
o Intended for low to middle management for controlling purposes
o Often uses planned reports, queries, forms
 Decision Support Systems
o Intended for middle to upper level management
o Planning purposes
o Uses statistical packages
o Often done on data warehouse corporate data rather than transaction processing
systems
 Executive Information Systems
o Adds external data sources to DSS above
System Development Life Cycle – provides checkpoints for the current phase and documentation for the
next phase
 Preliminary investigation – feasibility
 System Analysis – determining the what
 System Design – determining the how
 System Acquisition – make or buy
 Implementation – deliver installation package, conversion, documentation
 Maintenance – fix broken items and gather information for next release
John North
23
CIT120
Common Final Review Topics
Conversions are done
 Direct
 Parallel
 Phased
 Pilot
Programs written in specialized languages – programming languages
Statements must follow rules that constitute valid statements – the syntax of a programming language
invalidly constructed program statements are considered syntax errors and logic errors occur when
what was expected did not occur
Programs have three types of control structures
 Sequential flow statements
 Selection or decision statements – if and select case
 Repetition or looping statements – while, for
Program development uses an integrated development environment that provides for
 Editor to record program instructions
 Compiler to convert a specific programming language into machine code or intermediate
language (.NET and Java for their virtual machines)
 Linker to combine programmer’s code with code from libraries or assemblies
 Loader to load program for testing
 Test generators to develop and run tests
 Debuggers to help isolate programming logic errors
Interpreters convert one line of code at a time to executable machine code while a compiler converts
the whole program into object code that will be executed as machine code when the program is run
 Interpreters good for debugging code
 Compilers can optimize code
Language generations
1. Machine code
2. Assembly languages – intro to mnemonics for instruction codes and variable names for memory
addresses
Note: Machine code and assembly languages are referred to as low-level languages
3. Third generation languages – process oriented or functional decomposition
Cobol, Fortran, PL/1, Pascal, Basic, C
Object-oriented languages mistakenly included in this generation – Smalltalk, C++, Java, C#,
Objective-C, Python
4. Fourth generation languages – generative languages
especially DBMS software such as forms, queries, and reports to access databases
Web based programs developed with Dreamweaver or MS Expression Web
Specialized 4th generation languages – Progress, Focus
5. Fifth generation languages – logic based
Prolog, LISP, Scheme, Expert Systems, Automated Reasoning
John North
24
CIT120
Common Final Review Topics
Application Lifecycle Management (ALM) deals with an application from creation to shelving
Patches are sent out to fix bugs, security leaks, or misinterpreted procedures
John North
25
CIT120
Common Final Review Topics
Chapter 14 – Databases
Databases built to provide sharing of data
Evolution of structured databases – hierarchical, network, relational, object-oriented, multi-dimensional
The Web has made unstructured data more common today, primarily through its search engines
Database consists of fields collected into a record, records collected into a table, tables collected into a
database
Fields in structured databases require both a field name and a data type
Database data types include text, memo, number, autonumber or autoincrement, boolean or yes/no,
date/time, objects, hyperlinks, attachments, and lookup
Numbers include both integer – byte, integer, long
decimal – single, double, decimal
currency
Tables are almost always given a primary key – a field or collection of fields that can uniquely define a
record
Secondary keys are used to speed up searches and sorting of data
Database designers use normalization to remove redundancy from the data tables
Desktop to small workgroup databases include the dominant MS Access, Corel Paradox, and Lotus
Approach, and Open Office Base
Enterprise databases include dominant Oracle, IBM’s DB2 and Informix, MS SQL Server, Sybase, CA’s
Ingres, open source MySQL and Postgres
Queries are questions posed to the database looking for specific data that meet certain criteria
People involved in databases include
 Data architects
 Data analysts
 Database administrators
 Application Programmers
 Users
 DP Director
Database types
 Single user
 Client – server
 Multi-tiered
 Distributed – needs replication of shared data
John North
26
CIT120
Common Final Review Topics
Moving from one version to another or changing database management software forces use to migrate
the data from the old to the new database.
John North
27
CIT120
Common Final Review Topics
Chapter 15 – Protection and Privacy
Brownouts and blackouts
Surge protectors, uninterruptable power supplies (UPS), and generators
Dropping, spilling liquids, dust, static electricity
Protecting the physical computers for individuals as well as data centers
Ruggedized PCs – OLPC’s XO computer for kids in developing countries
Green computing and the energy star rating scheme
Specialized software for recovery of lost or stolen PCs
Clearing a browser’s cache when working on a public computer
Taking care of spam and spyware – Internet security packages, email filters
Vaporware – software that never made it off the drawing boards
Encryption software for files, logical disks, whole disks
Wiping data off a disk drive removes any trace of it
Information privacy – the rights of individuals or companies to control how information about them is
collected and used.
Electronic profiling of a person – marketing
Identity theft
Presence technology
Digital surveillance
Employee monitoring –employers tracking employee activity on the job
Proximity cards – uses smart cards or RFID enabled cards to track location as well as video
surveillance
Throw-away email address for junk mail
Besides backup/recovery procedures, companies need disaster recovery planning
Off-site storage of critical data
Recovery facilities – within organization or specialized companies
John North
28
CIT120
Common Final Review Topics
Chapter 16 – Intellectual Property
Copyrights – good for 70 years after person’s death
Google books
Project Gutenburg
Digital watermarks
Anticounterfeiting systems
Holograms
Traceless – system using invisible chemical markers that
DRM software
Trademarks: Registered, trademark, servicemark – good for 10 years but can be renewed
Patents – most are good for 20 years
can be read by special device
Domain name squabbles can use WIPO (World Intellectual Property Organization) to resolve
Plagiarism
Fair use of copyrighted material – commentaries, news reporting, research, education
Ethics vs law
Code of conduct – written rules on what can and cannot be done
Code of ethics – usually industry or organization based rules – Engineers, lawyers, doctors
Whistle blowers
Cheating and falsifying information
Cheating is rampant; MBAs lead the way
Resume padding vs Job requirements padding
Computer hoaxes
Digital manipulation
Doctored photos
US Gov releases new cash bills every 7 to 10 years to prevent counterfeiting
Ethical Business practices
Fraudulent reporting
Pulling up sales
Ethically questionable products
Age verification
Vaporware
Workplace monitoring
Cultural considerations
Digital divide occurs in both developed and developing countries
OLPC is attempting to address the digital divide through its XO computer for children;
Intel is providing the Classmate computer as an alternative to the XO
John North
29
CIT120
Common Final Review Topics
Ergonomics
Repetitive Stress Syndrome and carpal tunnel syndrome
Stress, burnout, addiction are emotional concerns with computer usage
Green computing
Energy Star rating
More energy efficient processors, monitors
Alternative energy – solar energy, fuel cells
Getting rid of computer hardware and software
Increased paper use
e-trash - Toxic material needs to be recovered
Assistive technologies provide accessibility to computers for users with disabilities
Being driven by the Americans with Disabilities Act
Legislation
US Anticybersquatting Consumer Protection Act
Digital Millennium Copyright Act – illegal to bypass DRM protection
John North
30
CIT120
Download