Computers - classes.soe.ucsc.edu · Salami technique Scavenging Trapdoor Trojan horse Zapping....

67
Computers: Tools for an Information Age Final Review -- Chapters 6, 10, 12, 13, 14

Transcript of Computers - classes.soe.ucsc.edu · Salami technique Scavenging Trapdoor Trojan horse Zapping....

Computers:Tools for an Information Age

Final Review -- Chapters 6, 10, 12, 13, 14

12/4/2003 2

Secondary Storage

Separate from the computer itselfSoftware and data stored on a semi-permanent basis

Unlike memory, not lost when power is lost

12/4/2003 3

Benefit: Space

Store a roomful of data on disks smaller than the size of a breadbox

Diskette contains equivalent of 500 printed pagesOptical disk can hold equivalent of 500 books

12/4/2003 4

Benefit: Reliability

Data in secondary storage is relatively safeSecondary storage is highly reliableMore difficult for untrained people to tamper with data stored on disk

12/4/2003 5

Benefit: Convenience

Authorized users can easily and quickly locate data stored on the computer

12/4/2003 6

Benefit: Economy

Several factors create significant savings in storage costs

Less expensive to store data on disks than to buy and house filing cabinetsReliable and safe data is less expensive to maintainGreater speed and convenience in filing and retrieving data

12/4/2003 7

Track

The circular portion of the disk surface that passes under the read/write head

Floppy diskette has 80 tracks on each surfaceHard disk may have 1,000 or more tracks on each surface of each platter

12/4/2003 8

Cluster

A fixed number of adjacent sectors that are treated as a unit of storage

Typically two to eight sectors, depending on the operating system

12/4/2003 9

Seek Time

The time it takes the access arm to get into position over a particular track

All access arms move as a unitAll simultaneously in position over a set of tracks that make up a cylinder

12/4/2003 10

Optical Disk Storage

Provides inexpensive and compact storage with greater capacityLaser scans disk and picks up light reflections from disk surfaceCategorized by read/write capability

Read-only media - user can read from, but not write to diskWrite-once, read-many (WORM) - user can write to disk onceMagneto-optical - combines magnetic and optical capabilities

12/4/2003 11

Compact Disks

CD-ROM - drive can only read data from CDs

CD-ROM stores up to 700 MB per diskPrimary medium for software distribution

CD-R - drive can write to disk onceDisk can be read by CD-ROM or CD-R drive

CD-RW - drive can erase and record over data multiple times

Some compatibility problems trying to read CD-RW disks on CD-ROM drives

12/4/2003 12

Digital Versatile Disk (DVD)

Short wavelength laser can read densely packed spots

DVD drive can read CD-ROMsCapacity up to 17GBAllows for full-length moviesSound is better than on audio CDs

Several versions of writable and rewritable DVDs exist

12/4/2003 13

Redundant Array of Independent Disks (RAID)

A group of disks that work together as one

Raid level 0 spreads data from a single file over several drives

Called data stripingIncreases performance

Raid level 1 duplicates data on several drives

Called disk mirroringIncreases fault tolerance

12/4/2003 14

Organizing and Accessing Stored Data

CharacterFieldRecordFileDatabase

12/4/2003 15

Field

A set of related charactersDescribes one characteristic of a person, place, or thing

For a university, a student’s first name would be stored in a field

Key field - a unique identifier for a record

12/4/2003 16

Record

A collection of related fieldsFor the university, all of the fields for one student constitute one record

Computers:Tools for an Information Age

Chapter 10Security and Privacy:Computers and the Internet

12/4/2003 18

Security and Privacy

Security – data stored on computer must be kept safePrivacy – private data must be kept from prying eyes

12/4/2003 19

Methods Computer Criminals Use

BombData diddlingDenial of service attacksPiggybackingSalami technique

ScavengingTrapdoorTrojan horseZapping

12/4/2003 20

Denial of Service Attack

Hackers bombard a site with more requests than it can possibly handle

Prevents legitimate users from accessing the siteHackers can cause attacks to come from many different sites simultaneously

12/4/2003 21

Virus

A set of illicit instructions that passes itself on to other files

Transmitting a virusCan cause tremendous damage to computer and data filesCan be preventedCommon computer myths

12/4/2003 22

Spamming

Mass advertising via e-mailCan overflow your e-mail inboxBogs down your e-mail server, increasing the cost of e-mail service

Preventing spam

12/4/2003 23

Cookies

A small text file stored on your hard driveFile is sent back to the server each time you visit that site

Stores preferences, allowing Web site to be customizedStores passwords, allowing you to visit multiple pages within the site without logging in to each oneTracks surfing habits, targeting you for specific types of advertisements

12/4/2003 24

Preventing Spam

Many ways you can minimize junk e-mailBe careful how you give out your e-mail addressFiltering software allows you to block messages or send them to designated foldersDon’t register at Web sites without a promise the Web site will not sell your informationNEVER respond to spam

Anti-spamming legislation is being proposed in many states

12/4/2003 25

A Firewall

A combination of hardware and software that sits between an organization’s network and the Internet

All traffic between the two goes through the firewallProtects the organization from unauthorized accessCan prevent internal users from accessing inappropriate Internet sites

12/4/2003 26

White-Hat Hackers

Hackers that are paid by a company to break into that company’s computer systems

Expose security holes and flaws before criminals find themOnce exposed, flaws can be fixed

12/4/2003 27

Computer Forensics

Uncovering computer-stored information suitable for use as evidence in courts of law

Restores files and/or e-mail messages that someone has deleted

Some experts are available for hire, but most are on the staffs of police departments and law firms

12/4/2003 28

A Disaster Recovery Plan

A method of restoring computer processing operations and data files in the event of major destructionSeveral approaches

Manual servicesBuying time at a service bureauConsortium

Plan should include priorities for restoring programs, plans for notifying employees, and procedures for handling data in a different environment

12/4/2003 29

Freedom of Information Act

Allows ordinary citizens to have access to data gathered about them by federal agencies

Computers:Tools for an Information Age

Chapter 12Spreadsheets and Business Graphics:Facts and Figures

12/4/2003 31

Electronic Spreadsheets

A computerized version of a paper spreadsheet Benefits

Eliminates much of the tediumCalculations are error-freeWorksheet is automatically recalculated when you change one value or calculationPerforms “what-if” analysis

12/4/2003 32

Cells and Cell Addresses

Spreadsheet is divided into rows and columnsA cell is the intersection of a row and a column

Cell is known by its addressAddress consists of column letter, followed by row number, for example B7

Active cell - the cell available to be edited at a given time

12/4/2003 33

Contents of Cells

Label – provides descriptive text information about entries in the spreadsheetValue – an actual number that is entered into a cellDisplayed value – what is displayed in the cell

Formula – an instruction to the program to calculate a numberFunction – a preprogrammed formula

12/4/2003 34

Cell Contents: Formula

Calculation instructionContains

Cell addressOne or more arithmetic operatorsFunctions

Result appears in the cell containing the formulaCalculation appears in the formula bar

12/4/2003 35

Ranges

A group of one or more adjacent cells occurring in a rectangular shape

The program treats the range as a unitA range is referred to by its upper-left and lower-right cells, for example E7:G14

12/4/2003 36

Spreadsheet Features

SecurityCells can be protected so the user doesn’t accidentally destroy complex formulasPassword protection can prevent anyone from making changes to the worksheet

DecorationAdd borders or colors to cells or rangesChange the color of fontsAdd clip art

12/4/2003 37

Planning the Spreadsheet

Create a sketch of the spreadsheet

Show how labels and data should appearSpecify any formulas and/or functions needed

12/4/2003 38

Business Graphics

Graphics that represent data in a visual, easily understood format

Generate and sustain interestGraphs easily reveal trends that could be lost if buried in long columns of numbers

Two types:Analytical graphicsPresentation graphics

12/4/2003 39

Line Graphs

Illustrate multiple comparisonsData is plotted in plot area, then connected by a line

Computers:Tools for an Information Age

Chapter 13Database Management Systems:Getting Data Together

12/4/2003 41

The Hierarchy of Data

Field – a group of one or more characters that has a specific meaning

The smallest meaningful unit of dataDescribes one characteristic of a person, place, or thing

Record – the set of fields containing data about a person, place, or thingFile – a collection of related records

12/4/2003 42

Primary Key

A field that uniquely identifies a recordSalesID can be a primary key for the Salesperson tableOnce a SalesID appears in the table, no other salesperson can have that ID

12/4/2003 43

Relational Model

Data organized in table format

Columns represent fieldsRows represent records

Tables related by primary/foreign key relationshipMost current database development uses this model

12/4/2003 44

Integrity Constraints

Define acceptable values for a fieldFor example, the value of a month cannot be greater than 12

Primary keys cannot be duplicatedForeign keys cannot be used unless they exist as a primary key

A SalesID that is used in the customer table must exist as a primary key in the salesperson table

12/4/2003 45

Creating the Database

Consider your needsReports you will needInquiries you will want to make

12/4/2003 46

Setting Up the File Structure

Design the structure for each table

Define the tableDefine each field in the tableDefine primary key

Set up the table in design view

12/4/2003 47

Entering the Data

Enter data into the tables in datasheet viewEnter data into the tables by using a graphical form

12/4/2003 48

Data Retrieval

Involves extracting the desired dataTwo primary forms of data retrieval

QueriesReports

12/4/2003 49

Queries

You present a set of criteria; the DBMS selects matching data from the databaseUse a query language

Structured Query Language (SQL) is supported by most relational databasesQuery-by-example (QBE) uses a graphical interface to generate the SQLDisplay results in a table-like grid

12/4/2003 50

Data Warehouses

Contain data that has been captured in company databases

Can contain data that has been gathered from external sources

Use a variety of analytical tools

12/4/2003 51

Analytical Tools

Online analytical processing (OLAP) software Analyzes data from all databases in the data warehouseProvides different “views” of the same data

Data mining uses sophisticated statistical and artificial intelligence techniques

Looks for previously unrecognized patterns, relationships, and trends among the data

Computers:Tools for an Information Age

Chapter 14Systems Analysis and Design:The Big Picture

12/4/2003 53

The Systems Development Life Cycle (SDLC)Phases for Developing a System:

Preliminary investigationAnalysisDesignDevelopmentImplementation

12/4/2003 54

Preliminary Investigation: Defining the Problem

Two points that must be agreed upon

The nature of the problemThe scope (boundaries) of the problem

Agreeing on the problem helps define the objectives of the system

12/4/2003 55

Systems Analysis

Studying an existing system to determine how it works and how it meets users’ needs

Typically happens as a result of some impetus for change, combined with the authority to make the change

12/4/2003 56

Individuals Involved in Systems Analysis

Systems analyst – performs analysis and design

Not programming (but may on occasion)Client – the person or organization contracting to have the work doneUser – the people who will have contact with the system

12/4/2003 57

Data Gathering

A number of techniques can be usedWritten documentsInterviews with users and managers

Structured interview – includes only questions that have been written out in advanceUnstructured interview – interviewer has a general goal but few, if any questions prepared

QuestionnairesObservationSampling

12/4/2003 58

System Requirements

A detailed list of things the system must be able to do

The design of the new system will be based on these requirementsAnalyst and management must come to a clear agreement on requirements

12/4/2003 59

Key DecisionsWrite custom software or buy a software package (make or buy decision)

Software packages will often need to be customized

Outsource software development or create in-house

In-house design requires client to have technical expertise

Develop alternatives (candidates)All candidates meet the client’s requirements but with variations in features and cost

12/4/2003 60

Systems Design

The process of developing a plan for an improved system, based on the result of the systems analysis

12/4/2003 61

Systems Design

Develop detailed design specifications that will satisfy requirements

Output requirementsInput requirementsFiles and databasesSystem processingSystem controls and backups

12/4/2003 62

Prototyping

Building a model of the systemTypically a limited working system or subset of a systemDeveloped very quicklyDesigned to give the user an idea of what the system will look like

Computer-aided software engineering (CASE) toolsAutomate many of the tasks of the development process

12/4/2003 63

System Development

Schedule and monitor the two principal activitiesProgramming Testing

There are several project scheduling tools available

12/4/2003 64

Testing

Unit testing – verifies that individual program units work

Perform testing with test dataSystem testing – determines whether all program units work together as plannedVolume testing – uses real data in large amounts

Determines whether the system can handle a large volume of data

12/4/2003 65

Implementation

Steps involved in starting the new systemTrainingEquipment conversionFile conversionSystem conversionAuditingEvaluationMaintenance

12/4/2003 66

System Conversion

Four approachesDirect conversion – the user simply stops using the old system and starts using the new onePhased conversion – the system is implemented one part at a timePilot conversion – the entire system is used by a designated set of usersParallel conversion – the old and new systems are both used until users are satisfied the new system works

12/4/2003 67

Training

Teach users how to use the systemThe system will do no better than the people using itDevelop user’s manual to aid users who are not familiar with the systemHands-on training is best