Monday 17 October 2016

chapter 12

                                                                     Chapter 12

-The systems development life cycle, also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
-systems development have 5 steps: planning ,analysis, design, implementation, operation . And then it follow three guideline: tasks into phases ,involves users, define standards.
-System development should involve representatives of each department.
Image result
- Project management is the process of planning, scheduling, and then controlling the activities during system development ,must have a plan and schedule .
- Feasibility is a measure of how suitable the development of a system will be to the organization in four steps: operational feasibility ,schedule feasibility ,technical feasibility, economic feasibility ...
- Documentation is the collection and summarization of data and information .
-System development can be achieve by using several techniques: review documentation , observe, interview ,survey ,JAD sessions ,research...
-Who initiates a system development project? users, management ,organization , situation beyond an organization , and a project request.
-The Project Planning Phase is the second phase in the project life cycle. It involves creating of a set of plans to help guide your team through the execution and closure phases of the project and have four major activities are performed: review and approve ,prioritize the project ,allocate resources ,form a project development team.
-The Analysis Phase is also the part of the project where you identify the overall direction that the project will take through the creation of the project strategy documents. Gathering requirements is the main attraction of the Analysis Phase.
-Process modeling often uses Business Process Modeling Notation , a standard method of illustrating processes with flowchart-like diagrams that can be easily understood by both IT and business managers.( entity relationship diagram, data flow diagram, Project dictionary)
-entity-relationship diagram, is a graphical representation of entities and their relationships to each other, typically used in computing in regard to the organization of data within databases or information systems.
-A data flow diagram is a graphical representation of the "flow" of data through an information system, modelling its process aspects. A DFD is often used as a preliminary step to create an overview of the system, which can later be elaborated.
-Project dictionary contain all the documentation and deliverables of a project.
-Data table consist of a list of decisions and their criteria.
-Data dictionary can store item's name, description ,and others details ...
- Object modeling combines the data with the processes that act on that data into a single unit, called an object .
-Unified Modeling language (UML) is a standardized modeling language enabling developers to specify, visualize, construct and document artifacts of a software system ,UML is an important aspect involved in object-oriented software development. It uses graphic notation to create visual models of software systems.(use case diagram,)
-use case diagram is a graphic depiction of the interactions among the elements of a system.
-a class diagram in the Unified Modeling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or methods), and the relationships among objects.
- The system proposal assesses the feasibility of each alternative solution .
- The steering committee discusses the system proposal and decides which alternative to pursue (packaged software, custom software, outsourcing)
-Design phase consist of two major activities : acquire hardware and software , develop all of the details of the new.
-Prototype is a rudimentary working model of a product or information system, usually built for demonstration purposes or as part of the development process. In the systems development life cycle Prototyping Model, a basic version of the system is built, tested, and then reworked as necessary until an acceptable prototype is finally achieved from which the complete system or product can now be developed.
- Computer-aided software engineering (CASE) tools are designed to support one or more activities of system development . CASE tools sometimes contain the following tools: project repository ,graphics, prototyping ,housekeeping, quality assurance.
-the implementation phase is to construct the new or modified system and then deliver it.
- The program development life cycle follows these steps: analyze ,design, validity, implement ,test, documentation solution.
- Various tests should be performed on the new system :unit test, systems test, integration test ,acceptance test.
- Training involves showing users exactly how they will use the new hardware and software in the system .
- The purpose of the operation, support, and security phase is to provide ongoing assistance for an information system and its users after the system is implemented.













Sunday 16 October 2016

chapter 14

                                                                 Chapter 14

-Enterprise computing is a buzzword that refers to business-oriented information technology that is critical to a company's operations. Enterprise computing encompasses all the various types of enterprise software, including database management, relationship management and so on.
-Types of enterprises include: retail, service ,wholesale, government ,educational ,manufacturing ,and transportation...
-company has a hierarchy which means the chef is the big boss etc...
-Enterprise information is any kind of information which improves the functions of an enterprise business processes by integration. This means typically offering high quality of service, dealing with large volumes of data  and capable of supporting some large and possibly complex organization or enterprise.
-Managers perform : controlling ,leading , planning , and organization
-Information system is a system composed of people and computers that processes or interprets information.
-Enterprise has many department : marking , human resource , sale ,distribution, information technology etc...
-Accounting software describes a type of application software that records and processes accounting transactions within functional modules such as accounts payable, accounts receivable, payroll, and trial balance. It functions as an accounting information system.
-financial software is a broad category of software that deals with accounting and monetary transactions. It includes payroll, accounts receivables and payables, general ledger, spreadsheets, financial planning, check writing and portfolio management.
-A human resource information system is an information system or managed service that provides a single, centralized view of the data that a human resource management or human capital management  group requires for completing human resource processes.
-CAD (computer-aided design) software is used by architects, engineers, drafters, artists, and others to create precision drawings or technical illustrations. CAD software can be used to create two-dimensional (2-D) drawings or three-dimensional (3-D) models.
-Computer-aided engineering (CAE) is the broad usage of computer software to aid in engineering analysis tasks.
-Computer-aided manufacturing (CAM) is the use of software to control machine tools and related ones in the manufacturing of work pieces.
-Material requirement manufacturing uses software to help monitor and control processes related to production
-Manufacturing resource planning is an extension of MRP and also includes software that helps in scheduling.
-A quality control system helps an organization maintain or improve the quality of its products or services .
- A marketing information system serves as a central repository for the tasks of a marketing department .
- sales force automation software equips traveling sales people with the electronic tools they need to be more productive.
- Distribution systems perform the following functions :provide forecasting ,manage and track shipping, provide information and analysis .
- Customer interaction management software manages the day to day interactions with customers.
- The information technology (IT) department makes technology decisions for the enterprise
- Web site management programs collect data designed to help organizations make informed decisions regarding their Web presence .
- General purpose information systems generally fall into one of five categories :office information system ,expert system etc...
-Customers relationship management manages information about customers .
-Enterprise resource planning provides centralized , integrated software to help manage and coordinate on going activities.
-Content management systems are information systems that combine database , software ,and procedures.
-Some technologies used in enterprise include :portals ,data warehouse ,extranets etc...
-Portal is an Internet site providing access or links to other sites.
-Data Warehouse is a database designed to support decision making in an organization.
-EDI (Electronic Data Interchange) is the transfer of data from one computer system to another by standardized message formatting, without the need for human intervention.
-An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
-A document management system (DMS) is a system (based on computer programs in the case of the management of digital documents) used to track, manage and store documents and reduce paper.
-Workflow is defined series of tasks within an organization to produce a final outcome.
-A virtual private network, also known as a VPN, is a private network that extends across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
-Server virtualization provides the capability to divide a physical server logically into many virtual servers.
-storage virtualization provides the capability to create a single logical storage device from many physical storage device.
-Cloud computing is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," .
-Types of E-commerce: e-retail ,finance ,travel ,entertainment and media health.
- Enterprise hardware allows large organizations to manage and store information and data using devices geared for: heavy use , Maximum availability ,Maximum efficiency .
- RAID duplicates data and implements duplication in different ways .
-Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients.
-A storage area network (SAN) is a network which provides access to consolidated, block level data storage.
-Enterprise storage is a centralized repository for business information that provides common data management and protection, as well as data sharing functions, through connections to numerous (and possibly dissimilar) computer systems.
-A blade server is a stripped-down server computer with a modular design optimized to minimize the use of physical space and energy.
-A thin client is a lightweight computer that is purpose-built for remote access to a server (typically cloud or desktop virtualization environments).
-high availability refers to a system or component that is continuously operational for a desirably long length of time. Availability can be measured relative to "100% operational" or "never failing."
-Scalability is the capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged in order to accommodate that growth.
-Disaster recovery plan set of procedures to recover and protect a business IT infrastructure in the event of a disaster, and contains four major components : emergency plan ,backup plan, recovery plan, test plan.

















Wednesday 12 October 2016

Chapter 13

                                                             Chapter 13

-computer program is a collection of instructions that performs a specific task when executed by a computer. Create by a programmer using a programming language.
-Machine language is a computer programming language consisting of binary or hexadecimal instructions that a computer can respond to directly.
-Assembly language is a low-level symbolic code converted by an assembler.
-Source program is a programmer that is converted into the equivalent object program, written in machine language, by the compiler or assembler.
-Computer processors provide hardware support for procedural programming through a stack register and instructions for calling procedures and returning from them.
-Third-generation language (3GL):
               .a compiler translates an entire programs before executing it
               .an interpreter converts and executes one code statement at a time.
-COBOL is primarily used in business, finance, and administrative systems for companies and governments.
-Object-oriented programming (OOP) refers to a type of computer programming (software design) in which programmers define not only the data type of a data structure, but also the types of operations (functions) that can be applied to the data structure. and have some advantage: object can be reused ,programmers create applications faster ,work well in RAD environment ,most program development tools IDEs.
- Java is a general-purpose computer programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.
-  JIT compiler. (Just-In-Time compiler) A compiler that converts program source code into native machine code just before the program is run.
- The Microsoft Framework allows almost any type of program to run on the Internet or an internal business network, as well as computers and mobile devices .(CLR, classes).
-C++ is an object oriented programming (OOP) language, developed by Bjarne Stroustrup, and is an extension of C language.
-C# (pronounced "C-sharp") is an object-oriented programming language from Microsoft that aims to combine the computing power of C++ with the programming ease of Visual Basic.
-F# (pronounced F sharp) is a strongly typed, multi-paradigm programming language that encompasses functional, imperative, and object-oriented programming techniques.
-Visual Studio is an integrated development environment from Microsoft.
-Visual C++ supports object-oriented programming of 32-bit Windows applications with an integrated development environment (IDE), a C/C++ compiler, and a class library called the Microsoft Foundation Classes .
- Visual C# combined the elements of C++.
-a visual programming language (VPL) is any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually.
-Delphi uses the Pascal-based programming language called Object Pascal introduced by Borland, and compiles Delphi source code into native code.
-PowerBuilder is a popular rapid application development (RAD) tool for building object-oriented programming client/server applications the parts of which can be distributed within a network.
-4GL is a computer programming language envisioned as a refinement of the style of languages classified as third-generation programming language (3GL).
-programming languages include : Ada , APL, basic etc...
-application generator is a software that generates application programs from descriptions of the problem rather than by traditional programming.
- A macro
is a series of statements that instructs an application how to complete a task and can be useful for two things : Record the macro with a macro recorder, Write the macro .
-Hypertext Markup Language(HTML), a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
-Extensible Hypertext Markup Language (XHTML) is part of the family of XML markup languages. It mirrors or extends versions of the widely used Hypertext Markup Language (HTML), the language in which Web pages are formulated.
-Wireless Markup Language (WML), based on XML, is a markup language intended for devices that implement the Wireless Application Protocol (WAP) specification, such as mobile phones.
- Web browsers can execute short programs to add interactive elements to Web pages To send and receive information between your computer and a Web server, these programs use the CGI (script ,applets ,servlets ,Activex controls)
-Java script ,Perl ,PHP, Rexx, Tcl ,VBscript are variety languages use by a programmers scripts ,applets etc...
-Dynamic HTML, or DHTML, is an umbrella term for a collection of technologies used together to create interactive and animated web sites by using a combination of a static markup language.
-Ruby on Rails, sometimes known as "RoR" or just "Rails," is an open source framework for Web development in Ruby, an object-oriented programming (OOP) language .
- Web page authoring software can create sophisticated Web pages that include images, video, audio, animation, and other effects. (dream weaver ,flash ,expression web , share point designer).
-Authoring systems can be defined as software that allows its user to create multimedia applications for manipulating multimedia objects.(tool book and director).
- Program development consists of a series of steps programmers use to build computer programs.
-
To initiate program development, programmer:
Reviews the requirements, Meets with the systems analyst and users ,Identifies input, processing, and output.
- Design a solution algorithm
-in structured design , the programmer typically begins with a general design and moves toward a more detailed design.
-Programmers use a hierarchy chart to show program modules graphically.



















ty of languages use by a programmers



 




Tuesday 11 October 2016

chapter 11

                                            Chapter 11

-A computer security risk is any event or action that could cause a loss or damage to computer hardware, software, data, or information. Some breaches to computer security are accidental, but some are planned.
-Cyber crime  is crime conducted via the Internet or some other computer network such as hacker ,crackers ,scrip kiddies ,corporate spies, unethical employees ,cyber extortionists ,cyber terrorists .
- information transmitted over networks has a higher degree of security risk than information kept on organization's premises.
- Internet security is an online system that prevents credit card numbers from being stolen on a shopping website.
                .Computer virus is a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
                .Worm is a standalone malware computer program that replicates itself in order to spread to other computers.
                .Trojan horse is a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
                . A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook.
- An infected computer has one or more of the following symptoms: file become corrupted ,operating system runs much slower, etc...
- Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections .
-Bot net is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.
-A denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
-A back door is a means of access to a computer program that bypasses security mechanisms.
-Spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
-A firewall is a system designed to prevent unauthorized access to or from a private network.
-Intrusion detection software: analyses ,assesses ,identifies ,notifies
-Honeypot : vulnerable computer that is set up to entice an intruder to break into it.
-Unauthorized Access is an act of illegally gaining access into any computer, network etc , or promoting such activity, which is banned under the “Unauthorized Access while Unauthorized use of a computer is a class A misdemeanor.  Computer trespass. A person is guilty of computer trespass when he or she knowingly uses, causes to be used, or accesses a computer.
.Organizations take several measures to help prevent unauthorized access and use            -Acceptable use policy
-Disable file and printer sharing
-Firewalls
-Intrusion detection software .
-access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization by using : User name ,Password etc...
-A Biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioural characteristic.
-Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.(law enforcement ,criminal prosecutors, military intelligence, insurance agencies ,information security departments).
-Hardware theft is the act of stealing computer equipment and the help reduce are : alarm system ,physical access controls, etc...while The act of defacing or destroying computer equipment is known as hardware vandalism.
-software theft in Technology Expand. legal. Unauthorised duplication and/or use of computer software and occurs when someone : steals software media ,illegally copies ,intentionally erases programs ,illegally registers and or activates a programs.
-A single users license agreement contains:
   .Permitted to: install ,copy ,and remove the software
   .No permitted to : install, copy, export , and rent the software.
- Information theft occurs when someone steals personal or confidential information .
-Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.
-A digital signature (not to be confused with a digital certificate) is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
-system failure is a hardware or operating system malfunction. See fault tolerant. There is two ways to protect :surge protectors and uninterruptable power supplies 
   ex; Aging hardware ,Natural disasters, Electrical power problems, Errors in computer programs.
-Backup  is the procedure for making extra copies of data in case the original is lost or damaged and have two categories : full backup and selective backup
-Three generation backup policy : grandparent , parent , and child
- Wireless access poses additional security risks : 80 percent of wireless networks have no security protection.
- War driving allows individuals to detect wireless networks while driving a vehicle through the area
-Computer ethics is a part of practical philosophy which concerns with how computing professionals should make decisions regarding professional and social conduct.
-Intellectual property rights refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
-An IT code of conduct is written guideline that helps to determine whether a specific computer action is ethical or unethical.
-information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
-cookie. A small text file (up to 4KB) created by a Web site that is stored in the user's computer either temporarily for that session only or permanently on the hard disk.
-Web site use cookies for many reasons: allow personalization ,store user's password ,assist with online shopping, track how often users visit a site ,targets advertisements.
-Spam also known as unsolicited bulk email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted email messages, frequently with commerce
al content, in large quantities to an indiscriminate set of recipients.
- E-mail filtering blocks e-mail messages from designated sources.
-anti-spam is the methods that detect e-mail messages that are unsolicited advertisements, called "spam."
-Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
-Employee monitoring software is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location.
-Content filtering is the process of restricting access to certain material on the Web .
-Web filtering software is the process of restricting access to certain material on the Web .
















chapter 9 network an commmunication

                                                               Chapter 9

-Computer communication is defined as any human communication that occurs through the use of two or more electronic devices.(transfer ,receive ,instructions  and information).
-Uses of computer application : blogs ,chat rooms , E-mail ,Fax, internet ,web ,web 20 etc....With wireless users can send and receive messages.
-Text messaging is an electronic communication sent and received by cellular phone or pc or any device.
-Picture messaging : can be use for sending pictures and sounds files.
-Video messaging : Communicating visually with another person via computer. Video chat may refer to video calling or video messaging. For example, Facebook's Skype .
-Wireless instant messaging:  is a type of online chat which offers real-time text transmission over the Internet.
-Wireless internet access point : is the one can be use in many public location ,or school ,or home etc... for many people.
-A cyber café is a place which provides Internet access to the public, usually for a fee.
-Global Positioning System is a system of satellites, computers, and receivers that is able to determine the latitude and longitude of a receiver on Earth by calculating the time difference for signals from different satellites to reach the receiver.
-Groupware is a Software that supports multiple users working on related tasks in local and remote networks.
-Voice Mail is a computer-based system that allows users and subscribers to exchange personal voice message, to select and deliver voice information; and to process transactions relating to individuals, organizations, products and services, using an ordinary telephone.
-Many programs provide a means to collaborate , or work online , with users connected to a server .Collaboration software  is an application software designed to help people involved in a common task to achieve their goals.(online meeting ,web conferences, documents management system).
Web services enable programmers to create applications that communicate with other remote computers over the Internet.
- Mashup :is a  mixture of content or elements. For example, an application that was built from routines from multiple sources or a Web site that combines content and/or scripts from multiple sources is said to be a mashup.
-Network is a set of computers connected together for the purpose of sharing resources. 
-Advantages of a network: sharing software , sharing hardware, transferring funds ,facilitating communication ,sharing information and data.
-Local area network is a computer network that spans a relatively small area.
-Wireless LAN  is a LAN that uses no physical wires .
-A metropolitan area network (MAN) is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).
-Wide area network is a network that covers a large geographical area.
-Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or work loads between peers. Users access each other’s hard disks and exchange files directly over the Internet.
-Network topology refers to the layout of the computers and devices in a communications network, and have three parts which: star network , bus network , ring network.
-Intranet is an intranet network that use internet  technologies while extranet allows customers to access part of its intranet.
-Networks communication standards : WIFI , UWB, RFID , Bluetooth etc...
-Ethernet is a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more .
-A token ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and pass one or more logical tokens from host to host.
-TCP/IP is the language a computer uses to access the Internet.
-WI-FI identifies any network based on the 802.11 standard that facilitates wireless communication .
- Bluetooth defines how two Bluetooth devices use short-range radio waves to transmit data
-UWB specifies how two UWB devices use short-range radio waves to communicate at high .
- IrDA transmits data wirelessly via infrared (IR) light waves.
- RFID uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
-WIMAX 802.12: .develops by IEEE
                               .towers can cover 30 mile radius
                               .two types are fixed wireless and mobile wireless
                               .provides wireless
-Wireless application protocol: .E-mail
                                                        .web
                                                        .chats rooms etc...
- Communication software consists of programs that:
                                         .help users to establish connection to others computer or network
                                         .manage the transmission of data ,instruction ,and information
                                         .provides an interface for users to communicate with one another.
- The public switched telephone network (PSTN) is the worldwide telephone system .
Dial-up lines ,dedicated line, ISDN line ,DSL, FTTP, T-carrier ,ATM.
-Asymmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) technology, a data communications technology that enables faster data transmission over copper telephone lines rather than a conventional voice band modem can provide.
-Communication device is  an umbrella term for hardware that transmits voice, video or text. It can refer to virtually any computing, phone or network device.
- A dial-up modem converts signals between analog and digital .
-A digital modem send and receive data and information to and a digital line (DSL modem ,cable modem).
-A wireless modem uses the cell phone network to connect to the Internet wirelessly from a notebook computer.
-A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms) is a computer hardware component that connects a computer to a computer network.
-A router is a networking device that forwards data packets between computer networks.
-Home networks provides computers with :connection ,high speed internet, access files and programs ,connect game and play in mode of multiplayer ,share peripherals ,subscribe to and VOIP.
-Types of wired home network: Ethernet ,Power line cable ,phone line.
- The amount of data that can travel over a communications channel sometimes is called the bandwidth.
-Latency is the time it takes a signal to travel from one location to another on a network.
-Transmission data carries one or more signals.
-Broadband media transmit multiple signals simultaneously.
-radio communication based on a network of transmitters each serving a small area known as a cell: cellular radio.
- Microwave is a radio signal in the frequency range from 300 MHz to 300 GHz or from 1 to 300 GHz, depending on the rating system.
-In a communications context, a satellite is a specialized wireless receiver/transmitter that is launched by a rocket and placed in orbit around the earth.