CMPE-003: Computer Concepts Final exam Review of Chapters 6, 10, 12, 13, & 14 Chapter 6: Storage and Multimedia - The Facts and More Important Points: 1. 2. 3. LIST THE BENEFITS OF SECONDARY STORAGE a. Space b. Reliability c. Convenience d. Economy IDENTIFY AND DESCRIBE STORAGE MEDIA AVAILABLE FOR PERSONAL COMPUTERS a. Magnetic disk storage i. data represented in magnetic spots 1. magnetized spot = 1 (generates an electronic impulse) 2. non-magnetized spot = 0 (does not generate an electronic impulse) b. Optical disk storage i. data is written with a laser ii. read-only media iii. Write-Once, Read-Many media (WORM) iv. Magneto-Optical (MO) v. Compact Disks 1. Compact Disk Read-Only Memory (CD-ROM) 2. Compact Disk-Recordable (CD-R) 3. Compact Disk-Rewritable (CD-RW) vi. Digital Versatile Disk 1. Digital Versatile Disk Read-Only Memory (DVD-ROM) 2. Writable version of Digital Versatile Disk (DVD-RAM) c. Magnetic tape storage i. data represented in magnetic spots ii. primarily used for backup DIFFERENTIATE AMONG THE PRINCIPAL TYPES OF SECONDARY STORAGE a. Diskette i. low capacity – small files ii. portable iii. flexible Mylar coated with metallic substance iv. hard plastic jacket for protection v. 3 ½ inch vi. 1.44 MB b. High-capacity portable disks i. larger files ii. portable iii. 120/200 MB iv. zip disk – 250 MB c. Hard Disk i. various sizes 4. ii. non-portable iii. rigid platter coated with metallic substance iv. disk pack – several platters combined to handle storage needs d. Optical disk i. laser writes on metallic material spread over the surface of disk ii. technology 1. read-only media 2. WORM (Write-Once, Read-Many media) 3. Magneto-Optical (MO) • hybrid high-volume capacity • • written multiple times iii. Compact Disks (CD) 1. CD-ROM (Compact Disk Read-Only Memory) high-capacity portable • read multiple times • cannot record • 2. CD-R (Compact Disc-Recordable) high capacity • portable • write once • read multiple times • 3. CR-RW (Compact Disk-Rewritable) high capacity • portable • read multiple times • record multiple times • iv. DVD Digital Versatile Disk) 1. DVD-ROM larger capacity than CD-ROM • data is packed more densely • read multiple times • cannot record • 2. DVD-RAM writable version of DVD • e. Magnetic tape storage i. plastic tape with magnetic coating ii. inferior to disks 1. not as reliable 2. sequential access to data iii. inexpensive iv. primarily for backup DESCRIBE HOW DATA IS STORED ON A DISK a. Read/write operation i. disk drive reads and writes ii. disks rotate in the disk drive iii. access arm moves read/write head over a particular location iv. read/write operation begins and continues until complete v. data is transferred to/from memory b. Logical layout of a disk i. 5. 6. tracks 1. concentric circles ii. sector 1. pie-shaped divisions 2. holds a fixed number of bytes (512 bytes) iii. each track and sector stores the same amount of data 1. data packed densely on inner tracks 2. outer tracks do not store data as efficiently iv. zone recording 1. assigns more sectors to tracks in outer zones 2. more sectors = more data storage available v. cluster 1. adjacent sectors treated as a unit of storage 2. fixed number (two to eight sectors) 3. minimum space allocated to a file vi. cylinder 1. same track on each platter 2. files too large for one track are stored in cylinder (across multiple platters) DISCUSS THE BENEFITS OF MULTIMEDIA a. Presents information with text, illustrations, photos, narration, music, animation, film clips b. See and hear c. Support for animation d. Enhances business and education EXPLAIN HOW DATA IS ORGANIZED, ACCESSED, AND PROCESSED a. Organization i. character ii. field iii. record iv. file v. database b. Access i. sequential ii. direct iii. indexed c. Processing i. business processing 1. transaction – updates a record 2. master file – contains all the data ii. types 1. batch • collect transactions update periodically • 2. transaction processed immediately • real-time – online terminals connected to the computer that • returns results immediately immediate access to stored data • immediate updating of stored data • 3. computer system may use both processing types based upon the application Chapter 10: Security and Privacy: Computers and the Internet Important Points: 1. 2. EXPLAIN THE DIFFERENT TYPES OF COMPUTER CRIME AND THE DIFFICULTIES OF DISCOVERY AND PROSECUTION. a. Computer crime often involves stealing and using or selling company and personal data. b. Employers and individuals need to recognize the possible danger from computer systems and protect their assets. c. Data communications capabilities provide new challenges. Home computers can be used to invade computer systems. d. Computers can be used to transfer or change assets in the criminal’s favor. e. Discovery i. difficult ii. accidental iii. 85% of computer crimes are never reported f. Prosecution i. victims lack technical knowledge to understand the crime ii. computer fraud and abuse act – 1986 1. computer criminals subject to • fines jail time • confiscation of hardware • iii. computer forensics 1. uncovering computer-stored information suitable for use in course of law DESCRIBE THE DIFFERENT ASPECTS OF SECURING CORPORATE DATA, INCLUDING SOFTWARE AND DATA SECURITY, DISASTER RECOVERY PLANS, AND SECURITY LEGISLATION. a. Protect a computer system and data from deliberate or accidental damage b. Provide access to authorized individuals only i. what you have ii. what you know iii. what you do iv. what you are c. Disaster recovery plan i. restoring computer processing operations and data files if operations are halted or files are damaged by major destruction ii. approaches 1. use manual services temporarily 2. purchase time from a service bureau 3. mutual aid pact 4. consortium d. Software security i. company ownership if programmer is employee ii. 3. contractual agreement governs ownership if the programmer is not an employee iii. software can be copyrighted e. Data security i. secured waste ii. internal controls iii. auditor checks iv. applicant screening v. passwords vi. built-in software protection f. Personal computer security i. physical security with locks and cables ii. surge protector iii. uninterruptible power supply (UPS) iv. back up files regularly and systematically g. Privacy Legislation i. Fair Credit Reporting Act (1970) ii. Freedom of Information Act (1970) iii. Federal Privacy Act (1974) iv. Video Privacy Protection Act (1988) v. Computer Matching and Privacy Protections Act (1988) vi. Health Insurance Portability and Accountability Act (1966) DESCRIBE IN GENERAL TERMS HOW VIRUSES WORK, THE DAMAGE THEY CAN CAUSE, AND PROCEDURES USED TO PREVENT THIS DAMAGE. a. What is a virus? i. set of illicit instructions embedded in a file that passes itself onto other files when it comes into contact with them b. more dangerous than a worm c. can be “killed” with a vaccine or antivirus computer program b. c. d. How is a virus transmitted? i. inserted in popular computer games ii. via infected diskettes iii. via e-mail iv. via host program’s own macros 1. Melissa Word macros virus What damage can a virus cause? i. can cause serious damage by deleting or destroying important data ii. can also be pranks How to prevent a virus attack i. use antivirus programs 1. Symantec 2. McAfee ii. update the antivirus program from the Web site of the company that published it iii. scan any file or document before loading it onto your hard disk iv. avoid using programs with unclear origin 4. EXPLAIN THE THREATS TO PERSONAL PRIVACY POSED BY COMPUTERS AND THE INTERNET. DESCRIBE ACTIONS YOU CAN TAKE TO MAXIMIZE YOUR PRIVACY. a. Your boss is monitoring your activities – monitoring software i. screens ii. e-mail iii. keystrokes per minute iv. length of breaks v. which computer files are used and for how long b. Monitoring by Web sites i. records personal statistics and browsing information ii. cookies iii. your browser needs to be set to refuse all cookies or to warn you when a site attempts to store a cookie on your computer iv. Platform for Privacy Preference Project (P3P) c. Junk e-mail i. software that makes mass advertising – spamming ii. ways to minimize junk e-mail 1. use filter software 2. use a separate name when surfing the Internet 3. do not fill in online registration forms on Web sites that do not guarantee your privacy 4. do not reply to messages promising to remove your name from an email list Chapter 12: Spreadsheets and Business Graphics: Facts and Figures Important Points: 1. 2. 3. DESCRIBE THE ADVANTAGES OF SPREADSHEETS a. Labor saving b. Plan ahead c. Make the computer do the work d. See the results of change e. Error-free calculations f. Store to be used again g. Automatic recalculation h. “What-if” analysis LIST SEVERAL APPLICATIONS FOR SPREADSHEETS a. Keep track of performance i. budgeting ii. expense sheets iii. stock market iv. college fund b. What-if analysis i. allows user to test hypothetical situations i what if we reduce the price by 5%? ii. what if we buy a home and the mortgage rate increases by .5%? EXPLAIN THE UNDERLYING PRINCIPLES OF ELECTRONIC SPREADSHEET USE a. b. c. d. e. f. g. h. i. 4. 5. 6. Rows and columns Screen – window that shows the spreadsheet Cell, active cell (current cell) Label Value Formula Function Range Formatting and graphics i. column width ii. row height iii. headings iv. number symbols and styles v. justification vi. text font and style j. Printing k. Protect cells – create passwords l. Decorate cells with borders, color, and clip art m. Business graphics DESCRIBE HOW TO SET UP AND MODIFY A SPREADSHEET a. Plan b. Create draft i. enter labels, values, and formulas into cells c. Edit and proofread i. ensure data is correct ii. verify formulas are accurate d. Format e. Save f. Print g. Add graphics DESCRIBE THE ADVANTAGES OF BUSINESS GRAPHICS a. Generate and sustain the interest of an audience b. Make a lesson, report, or business document more attractive c. Help get a point across d. Can reveal a trend that would be lost in a column of numbers e. Presenter appears more prepared and organized DIFFERENTIATE BETWEEN ANALYTICAL GRAPHICS AND PRESENTATION GRAPHICS a. Analytical graphics (analysis-oriented graphics) i. help users analyze and understand specific data ii. use a spreadsheet or database to construct and display chart graphs 1. line 2. bar 3. pie iii. Some basic graph formatting available b. Presentation graphics (business-quality graphics) i. edit and enhance charts created by other programs ii. create charts, diagrams, drawing, and text slides iii. use clip art iv. support animated effects v. add sounds 7. IDENTIFY THE ELEMENTS OF STANDARD CHARTS AND GRAPHS a. X-axis – units of time b. Y-axis – measured values or amounts c. Plot area – space above and to the right of the axes d. Data point – each dot or symbol e. Data – set of values f. Variables – category of data g. Labels – identify the categories on the x-axis and the units on the y-axis h. Chart title i. Axes titles Chapter 13: Database Management – Getting Data Together Important Points: A. B. C. D. E. DESCRIBE THE HIERARCHY OF DATA 1. Field 2. Record 3. File EXPLAIN THE DIFFERENCES BETWEEN FILES AND DATABASES 1. File processing a. data redundancy b. collection of related records 2. Database a. table is a file b. collection of related tables c. avoids duplication LIST THE FOUR DATABASE MODELS 1. Hierarchical 2. Network 3. Relational 4. Object-oriented DESCRIBE THE CONCEPT OF DATA INTEGRITY 1. Degree to which data is accurate and reliable 2. Integrity constraints (rules) must be enforced when data is entered or data is unreliable a. acceptable values for a field b. primary key values c. foreign keys DESCRIBE THE FUNCTIONS OF A DATABASE MANAGEMENT SYSTEM 1. Data dictionary a. stores data about tables and fields within database b. specifies validation rules c. maintains relationships among tables 2. Data maintenance a. add new data b. modify existing data c. delete data 3. Retrieve information from the database a. queries i. Structure Query Language (SQL) F. G. H. ii. query-by-example (QBE) b. reports 4. Concurrency control a. record locking 5. Security a. read-only privilege b. update privilege 6. Backup and recovery DESCRIBE THE PROCESS OF CREATING A DATABASE IN GENERAL TERMS 1. Plan 2. Create table structure a. field name b. field type c. field width 3. Enter and verify data 4. Use the database a. list b. query c. add/modify/delete COMPARE AND CONTRAST RELATIONAL AND OBJECT-ORIENTED DATABASES 1. Relational database management systems (RDBMS) a. link tables based upon primary and foreign keys b. primarily support data i. text ii. numeric c. Object Relational Database Management Systems (O/RDBMS) i. larger RDBMS that have incorporated some of the features of OODBMS • Oracle9 • DB2 2. Object-oriented database management systems (OODBMS) a. manipulate object-oriented databases b. object – represents a real-world entity i. supports data • audio • video • graphics • complex types • text • numeric ii. operations that work the data 3. Relational (RDBMS) vs. object-oriented (OODBMS) a. OODBMS i. more complex ii. steeper learning curve iii. require skilled employees who earn high pay EXPLAIN WHAT A DATA WAREHOUSE IS AND HOW IT DIFFERS FROM A DATABASE 1. Databases designed to support ongoing operations rather than process transactions 2. Data warehouse a. b. data is captured from the database and external sources in summary form on a scheduled basis two methods for analyzing data i. online analytical processing (OLAP) data mining ii. Chapter 14: Systems Analysis and Design: The Big Picture Important Points: A. B. C. D. E. F. DEFINE THE TERMS “SYSTEM,” “ANALYSIS,” AND “DESIGN” 1. System – organized set of related components established to accomplish certain tasks 2. Analysis – process of studying an existing system to determine how it works and how it meets user needs 3. Design – process of developing a plan for an improved system, based upon the results of the systems analysis DESCRIBE THE PRINCIPAL FUNCTIONS OF THE SYSTEMS ANALYST 1. Coordination a. schedules b. system-related tasks c. personnel 2. Communication a. oral – presentations b. written – documentation 3. Planning and design a. plan and design new system b. involved from beginning of project through final implementation of the system LIST AND DESCRIBE THE PHASES OF THE SYSTEMS DEVELOPMENT LIFE CYCLE 1. Preliminary investigation – determining the problem 2. Analysis – understanding the existing system 3. Design – planning the new system 4. Development – doing the work to bring the new system into being 5. Implementation – converting to the new system DESCRIBE THE VARIOUS DATA-GATHERING AND ANALYSIS TOOLS 1. Data gathering a. written documents b. interviews c. questionnaires d. observation e. sampling 2. Analysis a. data flow diagram (DFD) b. decision tables DESCRIBE A SELECTION OF SYSTEMS DESIGN TOOLS 1. CASE tools – computer-aided software engineering a. supports specific analysis and design tasks b. integrated environment that supports the entire systems development process 2. Printer spacing chart/screen report 3. System flowchart EXPLAIN THE CONCEPT OF PROTOTYPING 1. G. Limited working system or part of a system that gives the user an idea of how the system will look EXPLAIN THE ROLE OF THE MAINTENANCE TASK IN THE SYSTEMS DEVELOPMENT LIFE CYCLE 1. Ongoing for the life of the system 2. Monitoring 3. Necessary adjustments a. revisions b. additions