CMPE-003: Computer Concepts

advertisement
CMPE-003: Computer Concepts
Final exam Review of Chapters 6, 10, 12, 13, & 14
Chapter 6: Storage and Multimedia - The Facts and More
Important Points:
1.
2.
3.
LIST THE BENEFITS OF SECONDARY STORAGE
a.
Space
b.
Reliability
c.
Convenience
d.
Economy
IDENTIFY AND DESCRIBE STORAGE MEDIA AVAILABLE FOR PERSONAL
COMPUTERS
a.
Magnetic disk storage
i.
data represented in magnetic spots
1.
magnetized spot = 1 (generates an electronic impulse)
2.
non-magnetized spot = 0 (does not generate an electronic impulse)
b.
Optical disk storage
i.
data is written with a laser
ii.
read-only media
iii.
Write-Once, Read-Many media (WORM)
iv.
Magneto-Optical (MO)
v.
Compact Disks
1.
Compact Disk Read-Only Memory (CD-ROM)
2.
Compact Disk-Recordable (CD-R)
3.
Compact Disk-Rewritable (CD-RW)
vi.
Digital Versatile Disk
1.
Digital Versatile Disk Read-Only Memory (DVD-ROM)
2.
Writable version of Digital Versatile Disk (DVD-RAM)
c.
Magnetic tape storage
i.
data represented in magnetic spots
ii.
primarily used for backup
DIFFERENTIATE AMONG THE PRINCIPAL TYPES OF SECONDARY STORAGE
a.
Diskette
i.
low capacity – small files
ii.
portable
iii.
flexible Mylar coated with metallic substance
iv.
hard plastic jacket for protection
v.
3 ½ inch
vi.
1.44 MB
b.
High-capacity portable disks
i.
larger files
ii.
portable
iii.
120/200 MB
iv.
zip disk – 250 MB
c.
Hard Disk
i.
various sizes
4.
ii.
non-portable
iii.
rigid platter coated with metallic substance
iv.
disk pack – several platters combined to handle storage needs
d.
Optical disk
i.
laser writes on metallic material spread over the surface of disk
ii.
technology
1.
read-only media
2.
WORM (Write-Once, Read-Many media)
3.
Magneto-Optical (MO)
•
hybrid
high-volume capacity
•
•
written multiple times
iii.
Compact Disks (CD)
1.
CD-ROM (Compact Disk Read-Only Memory)
high-capacity portable
•
read multiple times
•
cannot record
•
2.
CD-R (Compact Disc-Recordable)
high capacity
•
portable
•
write once
•
read multiple times
•
3.
CR-RW (Compact Disk-Rewritable)
high capacity
•
portable
•
read multiple times
•
record multiple times
•
iv.
DVD Digital Versatile Disk)
1.
DVD-ROM
larger capacity than CD-ROM
•
data is packed more densely
•
read multiple times
•
cannot record
•
2.
DVD-RAM
writable version of DVD
•
e.
Magnetic tape storage
i.
plastic tape with magnetic coating
ii.
inferior to disks
1.
not as reliable
2.
sequential access to data
iii.
inexpensive
iv.
primarily for backup
DESCRIBE HOW DATA IS STORED ON A DISK
a.
Read/write operation
i.
disk drive reads and writes
ii.
disks rotate in the disk drive
iii.
access arm moves read/write head over a particular location
iv.
read/write operation begins and continues until complete
v.
data is transferred to/from memory
b.
Logical layout of a disk
i.
5.
6.
tracks
1.
concentric circles
ii.
sector
1.
pie-shaped divisions
2.
holds a fixed number of bytes (512 bytes)
iii.
each track and sector stores the same amount of data
1.
data packed densely on inner tracks
2.
outer tracks do not store data as efficiently
iv.
zone recording
1.
assigns more sectors to tracks in outer zones
2.
more sectors = more data storage available
v.
cluster
1.
adjacent sectors treated as a unit of storage
2.
fixed number (two to eight sectors)
3.
minimum space allocated to a file
vi.
cylinder
1.
same track on each platter
2.
files too large for one track are stored in cylinder (across multiple
platters)
DISCUSS THE BENEFITS OF MULTIMEDIA
a.
Presents information with text, illustrations, photos, narration, music, animation, film
clips
b.
See and hear
c.
Support for animation
d.
Enhances business and education
EXPLAIN HOW DATA IS ORGANIZED, ACCESSED, AND PROCESSED
a.
Organization
i.
character
ii.
field
iii.
record
iv.
file
v.
database
b.
Access
i.
sequential
ii.
direct
iii.
indexed
c.
Processing
i.
business processing
1.
transaction – updates a record
2.
master file – contains all the data
ii.
types
1.
batch
•
collect transactions
update periodically
•
2.
transaction
processed immediately
•
real-time – online terminals connected to the computer that
•
returns results immediately
immediate access to stored data
•
immediate updating of stored data
•
3.
computer system may use both processing types based upon the
application
Chapter 10: Security and Privacy: Computers and the Internet
Important Points:
1.
2.
EXPLAIN THE DIFFERENT TYPES OF COMPUTER CRIME AND THE DIFFICULTIES
OF DISCOVERY AND PROSECUTION.
a.
Computer crime often involves stealing and using or selling company and personal
data.
b.
Employers and individuals need to recognize the possible danger from computer
systems and protect their assets.
c.
Data communications capabilities provide new challenges. Home computers can be
used to invade computer systems.
d.
Computers can be used to transfer or change assets in the criminal’s favor.
e.
Discovery
i.
difficult
ii.
accidental
iii.
85% of computer crimes are never reported
f.
Prosecution
i.
victims lack technical knowledge to understand the crime
ii.
computer fraud and abuse act – 1986
1.
computer criminals subject to
•
fines
jail time
•
confiscation of hardware
•
iii.
computer forensics
1.
uncovering computer-stored information suitable for use in course of
law
DESCRIBE THE DIFFERENT ASPECTS OF SECURING CORPORATE DATA,
INCLUDING SOFTWARE AND DATA SECURITY, DISASTER RECOVERY PLANS,
AND SECURITY LEGISLATION.
a.
Protect a computer system and data from deliberate or accidental damage
b.
Provide access to authorized individuals only
i.
what you have
ii.
what you know
iii.
what you do
iv.
what you are
c.
Disaster recovery plan
i.
restoring computer processing operations and data files if operations are halted
or files are damaged by major destruction
ii.
approaches
1.
use manual services temporarily
2.
purchase time from a service bureau
3.
mutual aid pact
4.
consortium
d.
Software security
i.
company ownership if programmer is employee
ii.
3.
contractual agreement governs ownership if the programmer is not an
employee
iii.
software can be copyrighted
e.
Data security
i.
secured waste
ii.
internal controls
iii.
auditor checks
iv.
applicant screening
v.
passwords
vi.
built-in software protection
f.
Personal computer security
i.
physical security with locks and cables
ii.
surge protector
iii.
uninterruptible power supply (UPS)
iv.
back up files regularly and systematically
g.
Privacy Legislation
i.
Fair Credit Reporting Act (1970)
ii.
Freedom of Information Act (1970)
iii.
Federal Privacy Act (1974)
iv.
Video Privacy Protection Act (1988)
v.
Computer Matching and Privacy Protections Act (1988)
vi.
Health Insurance Portability and Accountability Act (1966)
DESCRIBE IN GENERAL TERMS HOW VIRUSES WORK, THE DAMAGE THEY CAN
CAUSE, AND PROCEDURES USED TO PREVENT THIS DAMAGE.
a.
What is a virus?
i.
set of illicit instructions embedded in a file that passes itself onto other files
when it comes into contact with them
b.
more dangerous than a worm
c.
can be “killed” with a vaccine or antivirus computer program
b.
c.
d.
How is a virus transmitted?
i.
inserted in popular computer games
ii.
via infected diskettes
iii.
via e-mail
iv.
via host program’s own macros
1.
Melissa Word macros virus
What damage can a virus cause?
i.
can cause serious damage by deleting or destroying important data
ii.
can also be pranks
How to prevent a virus attack
i.
use antivirus programs
1.
Symantec
2.
McAfee
ii.
update the antivirus program from the Web site of the company that published
it
iii.
scan any file or document before loading it onto your hard disk
iv.
avoid using programs with unclear origin
4.
EXPLAIN THE THREATS TO PERSONAL PRIVACY POSED BY COMPUTERS AND
THE INTERNET. DESCRIBE ACTIONS YOU CAN TAKE TO MAXIMIZE YOUR
PRIVACY.
a.
Your boss is monitoring your activities – monitoring software
i.
screens
ii.
e-mail
iii.
keystrokes per minute
iv.
length of breaks
v.
which computer files are used and for how long
b.
Monitoring by Web sites
i.
records personal statistics and browsing information
ii.
cookies
iii.
your browser needs to be set to refuse all cookies or to warn you when a site
attempts to store a cookie on your computer
iv.
Platform for Privacy Preference Project (P3P)
c.
Junk e-mail
i.
software that makes mass advertising – spamming
ii.
ways to minimize junk e-mail
1.
use filter software
2.
use a separate name when surfing the Internet
3.
do not fill in online registration forms on Web sites that do not
guarantee your privacy
4.
do not reply to messages promising to remove your name from an email list
Chapter 12: Spreadsheets and Business Graphics: Facts and Figures
Important Points:
1.
2.
3.
DESCRIBE THE ADVANTAGES OF SPREADSHEETS
a.
Labor saving
b.
Plan ahead
c.
Make the computer do the work
d.
See the results of change
e.
Error-free calculations
f.
Store to be used again
g.
Automatic recalculation
h.
“What-if” analysis
LIST SEVERAL APPLICATIONS FOR SPREADSHEETS
a.
Keep track of performance
i.
budgeting
ii.
expense sheets
iii.
stock market
iv.
college fund
b.
What-if analysis
i.
allows user to test hypothetical situations
i
what if we reduce the price by 5%?
ii.
what if we buy a home and the mortgage rate increases by .5%?
EXPLAIN THE UNDERLYING PRINCIPLES OF ELECTRONIC SPREADSHEET USE
a.
b.
c.
d.
e.
f.
g.
h.
i.
4.
5.
6.
Rows and columns
Screen – window that shows the spreadsheet
Cell, active cell (current cell)
Label
Value
Formula
Function
Range
Formatting and graphics
i.
column width
ii.
row height
iii.
headings
iv.
number symbols and styles
v.
justification
vi.
text font and style
j.
Printing
k.
Protect cells – create passwords
l.
Decorate cells with borders, color, and clip art
m.
Business graphics
DESCRIBE HOW TO SET UP AND MODIFY A SPREADSHEET
a.
Plan
b.
Create draft
i.
enter labels, values, and formulas into cells
c.
Edit and proofread
i.
ensure data is correct
ii.
verify formulas are accurate
d.
Format
e.
Save
f.
Print
g.
Add graphics
DESCRIBE THE ADVANTAGES OF BUSINESS GRAPHICS
a.
Generate and sustain the interest of an audience
b.
Make a lesson, report, or business document more attractive
c.
Help get a point across
d.
Can reveal a trend that would be lost in a column of numbers
e.
Presenter appears more prepared and organized
DIFFERENTIATE BETWEEN ANALYTICAL GRAPHICS AND PRESENTATION
GRAPHICS
a.
Analytical graphics (analysis-oriented graphics)
i.
help users analyze and understand specific data
ii.
use a spreadsheet or database to construct and display chart graphs
1.
line
2.
bar
3.
pie
iii.
Some basic graph formatting available
b.
Presentation graphics (business-quality graphics)
i.
edit and enhance charts created by other programs
ii.
create charts, diagrams, drawing, and text slides
iii.
use clip art
iv.
support animated effects
v.
add sounds
7.
IDENTIFY THE ELEMENTS OF STANDARD CHARTS AND GRAPHS
a.
X-axis – units of time
b.
Y-axis – measured values or amounts
c.
Plot area – space above and to the right of the axes
d.
Data point – each dot or symbol
e.
Data – set of values
f.
Variables – category of data
g.
Labels – identify the categories on the x-axis and the units on the y-axis
h.
Chart title
i.
Axes titles
Chapter 13: Database Management – Getting Data Together
Important Points:
A.
B.
C.
D.
E.
DESCRIBE THE HIERARCHY OF DATA
1.
Field
2.
Record
3.
File
EXPLAIN THE DIFFERENCES BETWEEN FILES AND DATABASES
1.
File processing
a.
data redundancy
b.
collection of related records
2.
Database
a.
table is a file
b.
collection of related tables
c.
avoids duplication
LIST THE FOUR DATABASE MODELS
1.
Hierarchical
2.
Network
3.
Relational
4.
Object-oriented
DESCRIBE THE CONCEPT OF DATA INTEGRITY
1.
Degree to which data is accurate and reliable
2.
Integrity constraints (rules) must be enforced when data is entered or data is unreliable
a.
acceptable values for a field
b.
primary key values
c.
foreign keys
DESCRIBE THE FUNCTIONS OF A DATABASE MANAGEMENT SYSTEM
1.
Data dictionary
a.
stores data about tables and fields within database
b.
specifies validation rules
c.
maintains relationships among tables
2.
Data maintenance
a.
add new data
b.
modify existing data
c.
delete data
3.
Retrieve information from the database
a.
queries
i.
Structure Query Language (SQL)
F.
G.
H.
ii.
query-by-example (QBE)
b.
reports
4.
Concurrency control
a.
record locking
5.
Security
a.
read-only privilege
b.
update privilege
6.
Backup and recovery
DESCRIBE THE PROCESS OF CREATING A DATABASE IN GENERAL TERMS
1.
Plan
2.
Create table structure
a.
field name
b.
field type
c.
field width
3.
Enter and verify data
4.
Use the database
a.
list
b.
query
c.
add/modify/delete
COMPARE AND CONTRAST RELATIONAL AND OBJECT-ORIENTED DATABASES
1.
Relational database management systems (RDBMS)
a.
link tables based upon primary and foreign keys
b.
primarily support data
i.
text
ii.
numeric
c.
Object Relational Database Management Systems (O/RDBMS)
i.
larger RDBMS that have incorporated some of the features of
OODBMS
•
Oracle9
•
DB2
2.
Object-oriented database management systems (OODBMS)
a.
manipulate object-oriented databases
b.
object – represents a real-world entity
i.
supports data
•
audio
•
video
•
graphics
•
complex types
•
text
•
numeric
ii.
operations that work the data
3.
Relational (RDBMS) vs. object-oriented (OODBMS)
a.
OODBMS
i.
more complex
ii.
steeper learning curve
iii.
require skilled employees who earn high pay
EXPLAIN WHAT A DATA WAREHOUSE IS AND HOW IT DIFFERS FROM A
DATABASE
1.
Databases designed to support ongoing operations rather than process transactions
2.
Data warehouse
a.
b.
data is captured from the database and external sources in summary form on a
scheduled basis
two methods for analyzing data
i.
online analytical processing (OLAP)
data mining
ii.
Chapter 14: Systems Analysis and Design: The Big Picture
Important Points:
A.
B.
C.
D.
E.
F.
DEFINE THE TERMS “SYSTEM,” “ANALYSIS,” AND “DESIGN”
1.
System – organized set of related components established to accomplish certain tasks
2.
Analysis – process of studying an existing system to determine how it works and how it
meets user needs
3.
Design – process of developing a plan for an improved system, based upon the results
of the systems analysis
DESCRIBE THE PRINCIPAL FUNCTIONS OF THE SYSTEMS ANALYST
1.
Coordination
a.
schedules
b.
system-related tasks
c.
personnel
2.
Communication
a.
oral – presentations
b.
written – documentation
3.
Planning and design
a.
plan and design new system
b.
involved from beginning of project through final implementation of the system
LIST AND DESCRIBE THE PHASES OF THE SYSTEMS DEVELOPMENT LIFE CYCLE
1.
Preliminary investigation – determining the problem
2.
Analysis – understanding the existing system
3.
Design – planning the new system
4.
Development – doing the work to bring the new system into being
5.
Implementation – converting to the new system
DESCRIBE THE VARIOUS DATA-GATHERING AND ANALYSIS TOOLS
1.
Data gathering
a.
written documents
b.
interviews
c.
questionnaires
d.
observation
e.
sampling
2.
Analysis
a.
data flow diagram (DFD)
b.
decision tables
DESCRIBE A SELECTION OF SYSTEMS DESIGN TOOLS
1.
CASE tools – computer-aided software engineering
a.
supports specific analysis and design tasks
b.
integrated environment that supports the entire systems development process
2.
Printer spacing chart/screen report
3.
System flowchart
EXPLAIN THE CONCEPT OF PROTOTYPING
1.
G.
Limited working system or part of a system that gives the user an idea of how the
system will look
EXPLAIN THE ROLE OF THE MAINTENANCE TASK IN THE SYSTEMS
DEVELOPMENT LIFE CYCLE
1.
Ongoing for the life of the system
2.
Monitoring
3.
Necessary adjustments
a.
revisions
b.
additions
Download