IT 104 Final Exam

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

coding

?

The string =A1+A2 is an example of a spreadsheet range.

false

program design paradigms

1. structure programming 2. object-oriented programming ?

An example of a field in a MS Access that contains information about students is:

A student's last name.

web bug

A web beacon or web bug is one of various techniques used on web pages or email, to unobtrusively (usually invisibly) allow checking that a user has accessed some content. Common uses are email tracking and page tagging for web analytics.

worm

A worm is a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.

An example of a record in a database that contains information about students is:

All of the data about a student named George Washington.

contextual computing

Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.

_______ is the protocol for exchanging files over the Internet.

FTP

Every client and server on the Internet has a unique identifying number called an ________.

IP address

Netiquette refers to:

Informal rules of behavior for the Internet.

__________ is the most fundamental protocol of the Internet

TCP/IP

HTML: creating tables

Tables are collections of rows and columns that can be used to organize and display data. <tr> element creates table row. <td> element contains data for cell. <th> element contains header information.

smart dust

The term "smart dust" in IT refers to very small micro-electromechanical sensors (MEMS). Even though these individual components may be as small as the size of a grain of sand, or barely visible to the human eye, they can contain components such as circuits, sensors and wireless technologies, as well as individual power supplies.

HTML: transitional DTD

This DTD contains all HTML elements and attributes, INCLUDING presentational and deprecated elements (like font). Framesets are not allowed. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

how does the phishing filter work?

Through these links, instead of being transferred to the institution's website, they are transferred to the phishing site which then asks them personal information such as account numbers or passwords. Once the answers are submitted, the scammers have the information they need to access the consumer's accounts.

IT code of conduct

Written guideline that helps determine whether computer action is ethical

Which of the following is true?

XHTML documents must be well formed, XHTML tags must be properly nested, XHTML document must begin with DOCTYPE declaration

A column in a database in which customer names are stored would be referred to as a

field

intellectual property: trade secret

a formula used by a business to obtain an advantage over competitors or customers

The formula =$A$1+$A$2 contains:

absolute cell references

intellectual property: fair use

allows limited use of another author's work without asking permission.

intellectual property: copyright

any software written is automatically covered by copyright.

protection: biometric devices

authenticates person's identity using personal characteristic

protection: other

backup and recovery strong passwords

___________ is a technique of exhaustively working through all possible combinations of letters, numbers, and special characters in order to guess a password.

brute force attack

Cobol

designed for business transaction processing.

Which of the following is not related to intellectual property rights?

gelmark ... rest of answers: copyright, trademark, patent

intellectual property: free software license

grants recipients rights to redistribute the software which would otherwise be prohibited by copyright law

A software ___________ grants permission to a user to do things with computer software.

license

___________ is the code of acceptable behaviors users should follow while on the Internet.

netiquette

hardware advances

printing, 3-d printing

Which of the following is a health concern that result from the use of computers?

repetitive stress injury (RSI), carpel tunnel syndrome (CVS), psychological stress

problem definition and analysis

self explanatory

DBMS: foreign key

A foreign key is a column or group of columns in a relational database table that provides a link between data in two tables. It acts as a cross-reference between tables because it references the primary key of another table, thereby establishing a link between them. The majority of tables in a relational database system adhere to the foreign key concept. In complex databases and data warehouses, data in a domain must be added across multiple tables, thus maintaining a relationship between them. The concept of referential integrity is derived from foreign key theory. Foreign keys and their implementation are more complex than primary keys.

high level languages

A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages.

Which of the following is a valid worksheet cell address?

G23

__________ holds programs as they execute and temporary holds data as it is processed

RAM (Random Access Memory)

protection: anti virus software

Repair Quarantine Delete

enabling technologies: hardware

Tablets Smartphones Laptops Wearable devices Mobile credit card readers Embedded systems E-book readers Lower power devices

One way to reduce the occurrence of carpal tunnel syndrome it to:

Take frequent breaks when you are working at a keyboard.

What is the most common reason for installing a Wi-Fi hub in a home?

To allow PCs to connect to a network without wires

__________ software can be used for asset tracking, inventory control, order entry, resource scheduling, and video collections.

database

To keep a message from being understood by anyone who intercepts it, you should:

encrypt it

____________ hardware is hardware that can change its architecture and behavior dynamically by autonomously interacting with its environment.

evolvable

_____________ is established in U.S. copyright law and allows an author to make limited use of another author's work without asking permission.

fair use

A local area network (LAN) is a network that covers a large geographic area using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.

false

An open source version of software is the first version released outside the organization for the purpose of evaluation and real-world testing.

false

Longer passwords provide less security than shorter ones.

false

intellectual property: license

grants the licensee rights to use the licensed software in compliance with the specific terms of the license.

HTML: <img> element

i. Attribute: alt, src, width, and height Images are added using the <img> element. The src in the following image tag is an example of an attribute: <img src="myhouse.gif" alt = "my new house" /> alt attribute Specifies alternate text to display in place of the image file.

Data redundancy

i. Wasted space ii. Slower processing iii. Data inconsistency

A (n) ______ translates and executes one statement at a time.

interpreter

A(n) ______ translates and executes one statement at a time.

interpreter

_________ is a method for marketing commercial software in which a trial version is distributed in advance and without payment, generally under try before you buy environment.

shareware

Researchers are developing a sensor called _________ , designed to be so small that it floats in the air.

smart dust

A network in which all communications are sent through a central device is a(n) ____ network.

star

internet of things (IoT)

the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.

short answer: what does iot? and explain from security perspective?

the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.

Green computing is the study and practice of using computing resources efficiently and with a worldly perspective.

true

Using someone else's identity to purchase goods or services or perform other transactions is called identity theft.

true

protection: digital signatures

verifies the identity of a sender of an e-mail message or document and guarantees the content was not changed after it was signed. Author identification Content integrity Types: signature line and invisible signature

conventional AI: expert systems

Blends subject-specific knowledge with the knowledge and analytical skills of human experts Types of problems solved by experts: Medical diagnosis War gaming Legal planning

Individuals selling personal items to other individuals on eBay is an example of __________

C2C

______________ act permits e-mail marketers to send unsolicited commercial e-mail as long as it contains an opt-out mechanism, a valid subject line, the legitimate physical address of the mailer, and a label if the content is adult.

CAN-SPAM Act of 2003

The ____ chip, which uses battery power, stores configuration information about the computer.

CMOS

relational database

Most common type of database. A relational database is one in which data entities are related to each other. A database file or table or entity Files (tables) are managed by a DBMS

nano-medicine

Nanomedicine is the application of nanotechnology (the engineering of tiny machines) to the prevention and treatment of disease in the human body. This evolving discipline has the potential to dramatically change medical science.

trojan horse

One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering.

_______ indicates how many pages a printer is able to print per minute.

PPM

cookies

Small file on your computer that contains data about you Some Web sites sell or trade information stored in your cookies Set browser to accept cookies, prompt you to accept cookies, or disable cookies

mobile apps

Small specific purpose computer programs Limited function Isolated from other apps - limited data sharing Use mobile features: camera, location reporting

2003 CAN-SPAM act

The U.S. CAN-SPAM Act is short for Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003. It was implemented to set standards for commercial emailing, often called "spam." According to the law, subject lines must be clear and accurately reflect email content.

A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformat a hard disk.

Trojan horse

types of e-commerce

a. Business to business b. Business to consumer c. Customer to customer d. Business to government and citizen to government e. E-commerce expectations

social concerns

a. Child protection i. Legislation b. Computer addiction c. Green computing

business concerns

a. Fraud b. Computer crime i. Types of computer crimes ii. Property rights c. Data and equipment protection d. Disaster and recovery plan

DBMS: schema

map of database. The term "schema" refers to the organization of data as a blueprint of how the database is constructed (divided into database tables in the case of relational databases). The formal definition of a database schema is a set of formulas (sentences) called integrity constraints imposed on a database.

What type of artificial intelligence is used to simulate or act like the functioning of the human brain?

neural networks

__________ connects a page to another document or web page.

hyperlink

In ____________ conversion, the old IS is gradually turned off and the equivalent parts of the new system gradually turned on.

phased

The act of attempting to fraudulently acquire information by distribution of e-mail messages asking prospective victims to verify their account or confirm billing information is referred to as _________

phishing

A field whose value uniquely identifies each record in a table is called a(n):

primary key

A recipient uses which of the following to read an encrypted message?

private key

A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformats a hard disk.

trojan horse

A denial of service attack is described as an aggressive attempt to prevent legitimate users of a service from using that service or the server it is installed on.

true

An end user license agreements or EULA accompanies most licensed software and is presented to a user during the installation process

true

Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.

true

Spyware programs can harvest personal data by reading cookies and sending the data to a server.

true

If a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.

virtual memory

A _________ is an object that is embedded in an e-mail and is used to check if a user has viewed the email.

web bug

A(n) ______ is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

web filter

A ___________ is the person responsible for designing, developing and maintaining a website.

webmaster

system development life cycle

(SDLC is also an abbreviation for Synchronous Data Link Control.) The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.

management information systems characteristics

- Reporting systems built on existing transaction processing system - Support structured decision making - Support tactical level management

management information systems: output of MIS

- Scheduled reports - On-demand reports - Exception reports

solving problems with excel

-what if analysis -goal seeking -forecasting

assistive technology

1. Braille keyboard 2. Braille display 3. Magnifier 4. Screen reader software 5. Speech recognition

software testing

1. syntax 2. logical ?

To prevent eyestrain, you should rest your eyes every ____ or so by focusing on an object in the distance for one minute, and then closing your eyes for another minute.

15 minutes

To prevent wrist/arm, soreness and injury, you should rest and gently stretch your fingers and arms every ____ or so.

15 minutes

ergonomics

Applied science devoted to comfort, efficiency, and safety in workplace (keyboards, document holders, anti-glare screens, docking station, keyboard drawers, etc)

enabling technologies: network

WiFi 4G LTE-Advanced 5G

mobile app development

"Native" Apps iOS - Objective C programming language Android - Java programming language One Size Fits All HTML 5 CSS 3 JavaScript

Which of the following is a correct way in XHTML to insert an image, assuming that the image is located in the same folder?

< img src = "smiley.gif" />

Which of the following is used to insert a line break?

<br />

HTML: centering on a page

<center>This text will be center-aligned.</center>

To create separate paragraphs, the content for each paragraph must exist within its own _____.

<p> ... </p>

botnet

A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.

Which of the following is true about copyrights?

A composer automatically has copyrights to any piece of music he or she writes.

short answer: what are cookies? explain the process. ex: connect to server then installs cookie on your machine... also explain from spyware context?

A cookie is a text file that a Web browser stores on a user's machine. Cookies are a way for Web applications to maintain application state. They are used by websites for authentication, storing website information/preferences, other browsing information and anything else that can help the Web browser while accessing Web servers. A cookie contains specific information that is encrypted for security purposes. Normally, a cookie is attached with an HTTP header from the HTTP server to a Web browser in response to a user request. This stored cookie is sent to the HTTP server whenever access to a specific website is required. Cookies are managed in two patterns: with expiry date and without expiry date. Cookies without expiry dates are automatically stored in users' machines and remain inside the system's memory until the user's browsing terminates. Cookies with an expiry date expire when that date is surpassed.

geographic information system

A geographic information system (GIS) is a system designed to capture, analyze, store, manipulate, present and manage all types of geographical data, like information from maps, global positioning systems (GPS) and ubiquitous data, like locations of landmarks and areas hit by calamities.

nanocomputing

A nanocomputer is a computer that's very small compared to microcomputers and mini-computers. This term refers to any computer or computing device with microscopic or very small dimensions, although these machines are typically the size of a standard credit card.

data mining

A process of searching large volumes of data and automatically detecting patterns within it. How data mining works - Obtain data, re-format if necessary, and store in a data warehouse system. - Provide access to business analysts. - Analyze the data by application software. - Present outcomes in a useful format, often a graph table.

cloud computing

Access to data and programs over the internet Applications run remotely on "cloud" servers Data stored on "cloud" servers Platform / infrastructure services dynamically scalable Shared resources reduces cost

An example of a record in a database is:

All of the data about one specific thing, such as an individual employee.

excessive traffic

Causes: Denial-of-Service Attacks Unanticipated popularity Slow down the access

_________ is a critical component in a computer that processes data by interpreting and executing instructions contained in computer programs.

Central Processing Unit (CPU)

cognitive computing

Cognitive computing is the simulation of human thought processes in a computerized model. Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works.

mobile and cloud computing

Combination of cloud computing, mobile devices, and wireless networks to provide computational and communication resources to mobile users, cloud users, and cloud computing providers.

conventional AI: neural networks

Combines learning, adaptation, and evolution to create programs that are somewhat intuitive or even intelligent CI methods include: Neural networks Systems mimic human brain functionalities

short answer: whats the difference between interpreter and compiler?

Compilers, assemblers and interpreters are all programs that take the source code of a programming language, written by a programmer, and make it run on a computer. A compiler is a program which coverts the source code of a programming language into executable machine code for a CPU. An interpreter takes each line of source code of a programming language, and executes it there and then. It goes on to do the same for the next line afterwards.

Defragmenting reorganizes the files on a disk so that they are located in ____ access time.

Contiguous sectors, which speeds

Why have a code of ethics

Contribute to society and to human well-being. Avoid harm to others. Be honest and trustworthy. Be fair and take action not to discriminate. Honor property rights including copyrights and patent. Give proper credit for intellectual property. Respect the privacy of others. Honor confidentiality.

components of DSS (decision support systems)

Database Management System Knowledgebase Model-base management system User interface Analytical and presentation tools

___________ act criminalizes production and distribution of technology that is used to circumvent measures that control access to copyrighted works.

Digital Millennium Copyright Act

Hardware that is ____________ compliant exceeds the minimum federal standards for reduced energy consumption.

ENERGY STAR

evolvable hardware

Evolvable hardware (EH) is a field focusing on the use of evolutionary algorithms (EA) to create specialized electronics without manual engineering. It brings together reconfigurable hardware, evolutionary computation, fault tolerance and autonomous systems. Evolvable hardware refers to hardware that can change its architecture and behavior dynamically and autonomously by interacting with its environment.

programming: issues: logic errors

Logic errors (wrong formulas, wrong relational operators, etc.). A logic error is an error in a program's source code that gives way to unanticipated and erroneous behavior. A logic error is classified as a type of runtime error that can result in a program producing an incorrect output. It can also cause the program to crash when running. Logic errors are not always easy to recognize immediately. This is due to the fact that such errors, unlike that of syntax errors, are valid when considered in the language, but do not produce the intended behavior. These can occur in both interpreted and compiled languages. A logic error is also known as a logical error.

Which of the following is not typically performed by management information systems (MIS)?

Making recommendations for improving performances

short answer: phishing vs. farming?

Phishing and pharming are two different ways hackers attempt to manipulate users via the Internet. Phishing involves getting a user to enter personal information via a fake website. Pharming involves modifying DNS entries, which causes users to be directed to the wrong website when they visit a certain Web address. Phishing is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. Using a complex set of social engineering techniques and computer programming expertise, phishing websites lure email recipients and Web users into believing that a spoofed website is legitimate and genuine.

mobile advantages

Portability Unlimited access to information Improved decision-making Increased productivity and reduced costs Improved customer relations Ease of research News and entertainment

quantum computing

Quantum computing is an as-of-yet theoretical computing model that uses a very different form of data handling to perform calculations. The emergence of quantum computing is based on a new kind of data unit that could be called non-binary, as it has more than two possible values.

ransomware

Ransomware is a type of malware program that infects, locks or takes control of a system and demands ransom to undo it. Ransomware attacks and infects a computer with the intention of extorting money from its owner. Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.

computing styles

SIRI Like systems, Cognitive computing, Contextual computing

_________ is a communications technology used by some outgoing mail servers.

SMTP (simple mail transfer protocol)

protection: encryption

Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data .... A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format. ... A private key is also known as a secret key.

protection: firewall

Security system consisting of hardware and/or software that prevents unauthorized network access

characteristics and capabilities of DSS

Support for semi-structured and unstructured problems. Support group communication and collaboration. Support different data types. Adaptable and flexible. Interactive and provide ease of use. Fast query response. Provide various analysis techniques. Allow different presentation styles.

short answer: syntax vs. logic error?

Syntax errors occur when a program does not conform to the grammar of a programming language, and the compiler cannot compile the source file. Logic errors occur when a program does not do what the programmer expects it to do. Syntax errors are usually easy to fix because the compiler will tell you where the error occurs and you simply fix the syntax error. For example you may miss a semicolon or a curly bracket where it's supposed to be. Simply locate those errors and fix them. The real pain in the neck are logic errors. For instance you may be writing a software application that solves a puzzle, but when you run it it tells you that the puzzle cannot be solved. After you dig through the program logic you realize you have done something wrong. After you fix the logic and run the program again it solves the puzzle successfully.

Telecommuting

Telecommuting Flexibility in working location and hours Advantage Saves office space Care for young and elderly parents Disadvantage Business isolation Risk of data loss and compromise to data integrity

children's online privacy protection

The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that prohibits websites from knowingly collecting and maintaining the online information and privacy of children under the age of 13. COPPA gives parents control of information collected from their children online. The law was enacted on October 21, 1998 and became effective April 21, 2000. COPPA violations are subject to civil penalties (up to $11,000 for each violation). On December 19, 2012, the FTC introduced changes and updates to COPPA in the wake of the December 14 shootings at Sandy Hook Elementary School in Newtown, Connecticut.

digital millennium copyright

The Digital Millennium Copyright Act (DMCA) is U.S. copyright legislation that implements the World Intellectual Property Organization (WIPO) Performances and Phonograms Treaty and the 1996 WIPO Copyright Treaty. DMCA prevents the unauthorized duplication of digital copyrighted works by regulating digital intellectual property (IP) owners and consumers. Since DMCA was passed in 1998, similar bills and legislation have been adopted internationally.

1986 electronic communications privacy act (ECPA)

The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer (18 U.S.C. § 2510 et seq.), added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act (SCA, 18 U.S.C. § 2701 et seq.), and added so-called pen trap provisions that permit the tracing of telephone communications (18 U.S.C. § 3121 et seq.).

________ allows peripheral devices to be connected without the need to plug expansion cards into the computer's external bus

USB

work and workspace design

a. De-skilling b. Job losses c. Communication and organizational structure d. Geography e. Telecommuting f. Ergonomics

health issues

a. Repetitive Stress Injury (RSI) i. Carpal Tunnel Syndrome (CTS) b. Computer Vision Syndrome (CVS) c. Information overload d. Psychological stress e. Isolation

A modem

converts a digital signal into an analog signal and vice versa

intellectual property: patent

cover the underlying methodologies embodied in a given piece of software.

Which of the following activity is an example of a copyright infringement:

creating a copy and selling it to someone, creating a copy and giving it to someone, posting a copy on the internet for users to download

Pascal

designed to teach structured programming; useful for math and science applications.

_____________ is the use of the internet and other electronic technologies through which business communicates and negotiates with customers.

e-commerce

If an <img> element does not include height and width attributes, then the ToolTip will be empty when the user moves the mouse over the image.

false

In XHTML, there are five levels of headers, from < h1>...< /h1> to < h5>.... < /h5>.

false

The head element tells a browser that this is an HTML document.

false

While slides in a presentation can display a chart, the chart must first be created in a spreadsheet program.

false

With the B2B business model, consumers sell directly to other consumers, such as via an online auction site.

false

interpreter vs. compiler

Compiler and Interpreter are two different ways to execute a program written in a programming or scripting language. A compiler takes entire program and converts it into object code which is typically stored in a file. The object code is also refereed as binary code and can be directly executed by the machine after linking. Examples of compiled programming languages are C and C++. An Interpreter directly executes instructions written in a programming or scripting language without previously converting them to an object code or machine code. Examples of interpreted languages are Perl, Python and Matlab.

keystroke logging

Designated events and actions are provided for capturing and analyzing keystrokes in software and operating system-based applications. Keystroke rhythm is unique for a user on a specific keyboard, and is considered a behavior biometric which could be used in many areas such as security, authentication and surveillance.

cloud characteristics

Easier and less costly maintenance Centralization of infrastructure Productivity increases Reliability increases Centralized Security

data structure: arrays

In computer science, an array data structure, or simply an array, is a data structure consisting of a collection of elements (values or variables), each identified by at least one array index or key. An array is stored so that the position of each element can be computed from its index tuple by a mathematical formula.

syntax

In computer science, the syntax of a programming language is the set of rules that define the combinations of symbols that are considered to be correctly structured programs in that language.

logic: iteration

Iteration, in the context of computer programming, is a process wherein a set of instructions or structures are repeated in a sequence a specified number of times or until a condition is met. When the first set of instructions is executed again, it is called an iteration. When a sequence of instructions is executed in a repeated manner, it is called a loop. Iteration is the repetition of a process in a computer program, usually done with the help of loops. An example of an iteration programming language is as follows: Consider a database table containing 1000 student records. Each record contains the following fields: First name Last name Roll no If one wants to copy all the student records from the database and print them, the best way to retrieve the record is to iterate or loop through each record. It can be executed using the for loop statement as shown below: for (int i=0;i<1000;i++) { \\Print first name and last name from table }

cloud computing: virtualization

Main enabling technology for cloud computing Separates a physical computing device into one or more "virtual" devices Creates scalable systems

success factors in e-commerce

Market Research Interface Documentation Security Inviting Value Incentive

SQL: the language of data: field vs. record

Tables are also called datasheets. Each table in a database holds data about a different, but related, subject. Data is stored in records. A record is composed of fields and contains all the data about one particular person, company, or item in a database.

challenges and impediments to success in e-commerce

Unfulfilled expectations Unsatisfactory Web experience Navigation Motivation Awkward process Security Suitability

m-commerce

Use of wireless handheld devices to conduct commercial transactions online while on-the-go Provides: Content purchase and delivery (Kindle) Navigation Shop online while travelling Mobile banking Mobile payments Information services (news, stock quotes, sports scores)

database: data vs. information

data in, information out. Data are simply facts or figures — bits of information, but not information itself. When data are processed, interpreted, organized, structured or presented so as to make them meaningful or useful, they are called information. Information provides context for data.

Designing a database

i. Schema ii. cardinality: In the context of databases, cardinality refers to the uniqueness of data values contained in a column. High cardinality means that the column contains a large percentage of totally unique values. Low cardinality means that the column contains a lot of "repeats" in its data range. iii. primary key iv. foreign key

corporate concerns: online fraud risk

risks in online transactions -business responsibility -falling sales

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Fortran

the oldest high-level programming language; designed for scientific and mathematical applications.

C, C++, C#

versions of the highly efficient C programming language; C++ and C# are object-oriented.

logic: sequence

(1) One of the three basic logic structures in computer programming. The other two logic structures are selection and loop. In a sequence structure, an action, or event, leads to the next ordered action in a predetermined order. The sequence can contain any number of actions, but no actions can be skipped in the sequence. The program, when run, must perform each action in order with no possibility of skipping an action or branching off to another action. All logic problems in programming can be solved by forming algorithms using only the three logic structures, and they can be combined in an infinite number of ways. The more complex the computing need, the more complex the combination of structures. (2)A structured series of shots or scenes with a beginning, middle and end. The term sequence can be applied to video, audio, or graphics.

HTML: page titles

<head> </head> Contains information about the document, such as title

HTML: headers

<header> For logos or headings to show at the top of the Web page

HTML: hyperlinks

<ul id="menu"> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> </ul>

implementation

?

maintenance

?

entity-relationship (ER) diagram

An entity-relationship diagram (ERD) is a data modeling technique that graphically illustrates an information system's entities and the relationships between those entities. An ERD is a conceptual and representational model of data used to represent the entity framework infrastructure.

pseudocode

Most software programs are developed using a programming language, like C++ or Java. These languages have a specific syntax that must be adhered to when writing program's source code. Pseudocode, on the other hand, is not a programming language, but simply an informal way of describing a program. It does not require strict syntax, but instead serves as a general representation of a program's functions. Since each programming language uses a unique syntax structure, understanding the code of multiple languages can be difficult. Pseudocode remedies this problem by using conventional syntax and basic english phrases that are universally understood. For example, a line of PHP code may read:if ($i < 10) { i++; } This could be written in pseudocode as:if i is less than 10, increment i by 1. By describing a program in pseudocode, programmers of all types of languages can understand the function of a program.

program design

?

assembly language

An assembly language is a low-level programming language for microprocessors and other programmable devices. It is not just a single language, but rather a group of languages. An assembly language implements a symbolic representation of the machine code needed to program a given CPU architecture. An assembly language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that are implemented directly on the physical CPU. Assembly languages generally lack high-level conveniences such as variables and functions, and they are not portable between various families of processors. They have the same structures and set of commands as machine language, but allow a programmer to use names instead of numbers. This language is still useful for programmers when speed is necessary or when they need to carry out an operation that is not possible in high-level languages.

product suitability in e-commerce

Certain products and services are more suitable for online sales and some are more suitable for offline sales. Suitable: Products that have a high value to weight ratio Music, movies, software, photography, travel reservations and tickets, and financial transactions. Unsuitable: Products that have a low value to weight ration Products that have a limited shelf life Products that require trial fittings Products where color integrity is important

corporate concerns: denial of service

overloads a network with packets slowing and crippling the legitimate network traffic -bandwidth consumption -consumption of other resources

testing

?

data structure

A data structure is a specialized format for organizing and storing data. General data structure types include the array, the file, the record, the table, the tree, and so on. Any data structure is designed to organize data to suit a specific purpose so that it can be accessed and worked with in appropriate ways.

database management systems (DBMS)

A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. A DBMS generally manipulates the data itself, the data format, field names, record structure and file structure. It also defines rules to validate and manipulate this data. A DBMS relieves users of framing programs for data maintenance. Fourth-generation query languages, such as SQL, are used along with the DBMS package to interact with a database. Some dbms examples are: MySQL, SQL Server, Oracle, dBASE, and FoxPro.

SQL: the language of data: field

A field is part of a record and contains a single piece of data for the subject of the record. In the database table illustrated in Figure 4, each record contains four fields: Log ID A number assigned to this customer support incident for identification purposes Operator The code for the customer support operator who handled this incident Resolved A check box to indicate whether the incident was resolved Duration The time in seconds the operator spent on this incident Fields appear as columns in a database table. Data from the Log ID field for five records is highlighted in the Figure 4.

DBMS: primary key

A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records. A primary key's main features are: It must contain a unique value for each row of data. It cannot contain null values. A primary key is either an existing table column or a column that is specifically generated by the database according to a defined sequence.

data structure: stack

A stack is a basic data structure that can be logically thought of as a linear structure represented by a real physical stack or pile, a structure where insertion and deletion of items takes place at one end called top of the stack. The basic concept can be illustrated by thinking of your data set as a stack of plates or books where you can only take the top item off the stack in order to remove things from it. This structure is used all throughout programming. The basic implementation of a stack is also called a LIFO (Last In First Out) to demonstrate the way it accesses data, since as we will see there are various variations of stack implementations. There are basically three operations that can be performed on stacks . They are 1) inserting an item into a stack (push). 2) deleting an item from the stack (pop). 3) displaying the contents of the stack(pip).

RDMBS: normalization

Database normalization, or simply normalization, is the process of restructuring a relational database in accordance with a series of so-called normal forms in order to reduce data redundancy and improve data integrity.

mobile cloud

Different from mobile computing Use of cloud apps instead of traditional applications Use of cloud services (data storage and virtual servers)

commerce: disintermediation and the supply chain

Disintermediation, in finance, is the withdrawal of funds from intermediary financial institutions, such as banks and savings and loan associations, to invest them directly. Generally, disintermediation is the process of removing the middleman or intermediary from future transactions.

HTML: Hypertext markup language

Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.

HTML: horizontal rule

In HTML5, the <hr> tag defines a thematic break. In HTML 4.01, the <hr> tag represents a horizontal rule. However, the <hr> tag may still be displayed as a horizontal rule in visual browsers, but is now defined in semantic terms, rather than presentational terms.

SQL: the language of data: record

In relational databases, a record is a group of related data held within the same structure. More specifically, a record is a grouping of fields within a table that reference one particular object. The term record is frequently used synonymously with row. For example, a customer record may include items, such as first name, physical address, email address, date of birth and gender. Data is stored in records. A record is composed of fields and contains all the data about one particular person, company, or item in a database. In this database, a record contains the data for one customer support incident report. Records appear as rows in the database table. A record for Log ID 1201242 is highlighted in Figure 3.

DBMS: tables

In relational databases, and flat file databases, a table is a set of data elements (values) using a model of vertical columns (identifiable by name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows.

SQL: the language of data: selection vs. projection

Projection means choosing which columns (or expressions) the query shall return. Selection means which rows are to be returned. if the query is select a, b, c from foobar where x=3; then "a, b, c" is the projection part, "where x=3" the selection part.

logic

Logic plays a key role in computer science (databases, computational complexity, programming languages, artificial intelligence, hardware and software design and verification, etc..), and is undoubtedly one of the foundations that provide the maturity and agility to assimilate the future concepts, languages, techniques and tools in computer science. Similarly to architects and engineers, who mathematically analyze their products, computer scientists need to analyze the logical properties of their systems while designing, developing, verifying and maintaining them, especially when it comes to systems that are critical financially, or with respect to safety, privacy or efficiency.

measuring web traffic

Measuring Traffic Traffic statistics Tracking applications Toolbars Packet sniffing Categories for collecting and analyzing data: Visitor count Page count Popular pages Visit time Times per page Busy times Referrers

transactions in e-commerce

Merchant Accounts PayPal Google Checkout Secure Electronic Transaction Electronic Checks Digital Cash Smart Cards Micropayments SSL

enabling technologies: software

Mobile operating systems Android iOS Server virtualization Storage virtualization

Pharming

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."

data structure: queue

Queue is an abstract data structure, somewhat similar to Stacks. Unlike stacks, a queue is open at both its ends. One end is always used to insert data (enqueue) and the other is used to remove data (dequeue). Queue follows First-In-First-Out methodology, i.e., the data item stored first will be accessed first.

mobile disadvantages

Real or virtual? - Non-personal communication WiFi or 3G/4G Connection required Dependence on batteries Weather can interfere with transmission Health issues - smartphone radiation Safety - device use while driving

cloud computing: application support

Software-as-a-Service (SaaS) Selling access to programs like Microsoft Office and Adobe Creative Platform-as-a-Service (PaaS) Selling access service to mobile development Infrastructure-as-a-Service (IaaS)Selling saleable infrastructure including web space, virtual servers, data storage, and network connection.

source code

Source code is the set of instructions and statements written by a programmer using a computer programming language. This code is later translated into machine language by a compiler. The translated code is referred to as object code.

spyware

Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.

fraud and other concerns in e-commerce

Stolen Credit Cards Phishing Click Fraud Pharming Auction and Retail Schemes Market Manipulation Spam

DMBS: structure query language (SQL)

Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation. SQL is used to query, insert, update and modify data. SQL is used to help us answer information related questions. SQL works with tables that follow the four rules: The order of the rows does not matter. The order of the columns does not matter. All records must have the same number of fields. All data in a column (field) must be the same type

HTML: subscripts and superscripts

Subscript : For adding a subscript text in a html file, tag can be used. The sub tag defines subscript text. Subscript text appears half a character below the normal line, and is sometimes rendered in a smaller font. Subscript text can be used for chemical formulas, like H2O to be written as H2O. Superscript : For adding a superscript text in a html file, tag can be used. The sup tag defines superscript text. Superscript text appears half a character above the normal line, and is sometimes rendered in a smaller font. Superscript text can be used for footnotes.

HTML: display lists of things

Tables are collections of rows and columns that can be used to organize and display data. <tr> element creates table row. <td> element contains data for cell. <th> element contains header information. Unordered lists List of bulleted items. <li> elements are nested within the <ul> elements as follows: <ul> <li> list item 1 </li> <li> list item 2 </li> </ul> Ordered lists List of numbered items. <li> elements are nested within the <ol> elements: <ol> <li> Bill Clinton </li> <li> George Bush </li> </ol>

increasing web traffic

Techniques: Indexing a site in search engine Purchase advertising, including bulk (spam) email, pop-up ads, and search engine advertisements. Purchasing non-Internet based advertising Links from referrer sites

HTML: line break

The HTML <br> element produces a line break in text (carriage-return). It is useful for writing a poem or an address, where the division of lines is significant.

HTML: strict DTD

This DTD contains all HTML elements and attributes, but does NOT INCLUDE presentational or deprecated elements (like font). Framesets are not allowed. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

HTML: frameset DTD

This DTD is equal to HTML 4.01 Transitional, but allows the use of frameset content. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">

HTML: creating ordered and unordered lists

Unordered lists List of bulleted items. <li> elements are nested within the <ul> elements as follows: <ul> <li> list item 1 </li> <li> list item 2 </li> </ul> Ordered lists List of numbered items. <li> elements are nested within the <ol> elements: <ol> <li> Bill Clinton </li> <li> George Bush </li> </ol>

HTML: font style, color, and size

Usually used with CSS

virus distribution

Virus is a potentially damaging computer program

programming: issues: syntax errors

a character or string incorrectly placed in a command or instruction that causes a failure in execution. (typos, wrong syntax, etc.)

machine language

a computer programming language consisting of binary or hexadecimal instructions that a computer can respond to directly.

corporate concerns: unsecured email

allows passwords to be stored in cookies

Java

object-oriented programming language commonly used for Web applications. Object - a template for all instances that have identical behaviors and properties Class - is a blueprint or prototype from which objects are created.

cloud architecture

front end, network, back end

Rules of HTML 5 coding

i. Document must be well formed. ii. All tag names must be in lowercase. iii. All attribute values must be enclosed by quotes. iv. Tags must be properly nested. v. Each document must have a root element. <html> ... </html>


Ensembles d'études connexes

ATI Peds Cardio, Comp exam 2 ATI questions

View Set

(BIOL) Human Anatomy - Ch. 4 The Integumentary System HW

View Set

Personnel Planning and Recruitment

View Set

The Notorious Jumping Frog of Calaveras County review

View Set

US History: Reasons for Expansionism and the Story of Hawaii Notes

View Set

Chapter 15 - give me liberty study guide/chronological (copied)

View Set

Quizlet Live (Les Couleurs, Fr. 1 Un. 2-2, Fr. 1 Un. 2-1)

View Set