IT 104 Final Exam
coding
?
The string =A1+A2 is an example of a spreadsheet range.
false
program design paradigms
1. structure programming 2. object-oriented programming ?
An example of a field in a MS Access that contains information about students is:
A student's last name.
web bug
A web beacon or web bug is one of various techniques used on web pages or email, to unobtrusively (usually invisibly) allow checking that a user has accessed some content. Common uses are email tracking and page tagging for web analytics.
worm
A worm is a type of malicious software (malware) that replicates while moving across computers, leaving copies of itself in the memory of each computer in its path.
An example of a record in a database that contains information about students is:
All of the data about a student named George Washington.
contextual computing
Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.
_______ is the protocol for exchanging files over the Internet.
FTP
Every client and server on the Internet has a unique identifying number called an ________.
IP address
Netiquette refers to:
Informal rules of behavior for the Internet.
__________ is the most fundamental protocol of the Internet
TCP/IP
HTML: creating tables
Tables are collections of rows and columns that can be used to organize and display data. <tr> element creates table row. <td> element contains data for cell. <th> element contains header information.
smart dust
The term "smart dust" in IT refers to very small micro-electromechanical sensors (MEMS). Even though these individual components may be as small as the size of a grain of sand, or barely visible to the human eye, they can contain components such as circuits, sensors and wireless technologies, as well as individual power supplies.
HTML: transitional DTD
This DTD contains all HTML elements and attributes, INCLUDING presentational and deprecated elements (like font). Framesets are not allowed. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
how does the phishing filter work?
Through these links, instead of being transferred to the institution's website, they are transferred to the phishing site which then asks them personal information such as account numbers or passwords. Once the answers are submitted, the scammers have the information they need to access the consumer's accounts.
IT code of conduct
Written guideline that helps determine whether computer action is ethical
Which of the following is true?
XHTML documents must be well formed, XHTML tags must be properly nested, XHTML document must begin with DOCTYPE declaration
A column in a database in which customer names are stored would be referred to as a
field
intellectual property: trade secret
a formula used by a business to obtain an advantage over competitors or customers
The formula =$A$1+$A$2 contains:
absolute cell references
intellectual property: fair use
allows limited use of another author's work without asking permission.
intellectual property: copyright
any software written is automatically covered by copyright.
protection: biometric devices
authenticates person's identity using personal characteristic
protection: other
backup and recovery strong passwords
___________ is a technique of exhaustively working through all possible combinations of letters, numbers, and special characters in order to guess a password.
brute force attack
Cobol
designed for business transaction processing.
Which of the following is not related to intellectual property rights?
gelmark ... rest of answers: copyright, trademark, patent
intellectual property: free software license
grants recipients rights to redistribute the software which would otherwise be prohibited by copyright law
A software ___________ grants permission to a user to do things with computer software.
license
___________ is the code of acceptable behaviors users should follow while on the Internet.
netiquette
hardware advances
printing, 3-d printing
Which of the following is a health concern that result from the use of computers?
repetitive stress injury (RSI), carpel tunnel syndrome (CVS), psychological stress
problem definition and analysis
self explanatory
DBMS: foreign key
A foreign key is a column or group of columns in a relational database table that provides a link between data in two tables. It acts as a cross-reference between tables because it references the primary key of another table, thereby establishing a link between them. The majority of tables in a relational database system adhere to the foreign key concept. In complex databases and data warehouses, data in a domain must be added across multiple tables, thus maintaining a relationship between them. The concept of referential integrity is derived from foreign key theory. Foreign keys and their implementation are more complex than primary keys.
high level languages
A high-level language (HLL) is a programming language such as C, FORTRAN, or Pascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages.
Which of the following is a valid worksheet cell address?
G23
__________ holds programs as they execute and temporary holds data as it is processed
RAM (Random Access Memory)
protection: anti virus software
Repair Quarantine Delete
enabling technologies: hardware
Tablets Smartphones Laptops Wearable devices Mobile credit card readers Embedded systems E-book readers Lower power devices
One way to reduce the occurrence of carpal tunnel syndrome it to:
Take frequent breaks when you are working at a keyboard.
What is the most common reason for installing a Wi-Fi hub in a home?
To allow PCs to connect to a network without wires
__________ software can be used for asset tracking, inventory control, order entry, resource scheduling, and video collections.
database
To keep a message from being understood by anyone who intercepts it, you should:
encrypt it
____________ hardware is hardware that can change its architecture and behavior dynamically by autonomously interacting with its environment.
evolvable
_____________ is established in U.S. copyright law and allows an author to make limited use of another author's work without asking permission.
fair use
A local area network (LAN) is a network that covers a large geographic area using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
false
An open source version of software is the first version released outside the organization for the purpose of evaluation and real-world testing.
false
Longer passwords provide less security than shorter ones.
false
intellectual property: license
grants the licensee rights to use the licensed software in compliance with the specific terms of the license.
HTML: <img> element
i. Attribute: alt, src, width, and height Images are added using the <img> element. The src in the following image tag is an example of an attribute: <img src="myhouse.gif" alt = "my new house" /> alt attribute Specifies alternate text to display in place of the image file.
Data redundancy
i. Wasted space ii. Slower processing iii. Data inconsistency
A (n) ______ translates and executes one statement at a time.
interpreter
A(n) ______ translates and executes one statement at a time.
interpreter
_________ is a method for marketing commercial software in which a trial version is distributed in advance and without payment, generally under try before you buy environment.
shareware
Researchers are developing a sensor called _________ , designed to be so small that it floats in the air.
smart dust
A network in which all communications are sent through a central device is a(n) ____ network.
star
internet of things (IoT)
the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
short answer: what does iot? and explain from security perspective?
the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. Security requirements and solutions are analysed based on a four-layer framework of IoT on sensing layer, network layer, service layer, and application layer. The cross-layer threats are analysed followed by the security discussion for the enabling technologies including identification and tracking technologies, WSN and RFID, communication, networks, and service management.
Green computing is the study and practice of using computing resources efficiently and with a worldly perspective.
true
Using someone else's identity to purchase goods or services or perform other transactions is called identity theft.
true
protection: digital signatures
verifies the identity of a sender of an e-mail message or document and guarantees the content was not changed after it was signed. Author identification Content integrity Types: signature line and invisible signature
conventional AI: expert systems
Blends subject-specific knowledge with the knowledge and analytical skills of human experts Types of problems solved by experts: Medical diagnosis War gaming Legal planning
Individuals selling personal items to other individuals on eBay is an example of __________
C2C
______________ act permits e-mail marketers to send unsolicited commercial e-mail as long as it contains an opt-out mechanism, a valid subject line, the legitimate physical address of the mailer, and a label if the content is adult.
CAN-SPAM Act of 2003
The ____ chip, which uses battery power, stores configuration information about the computer.
CMOS
relational database
Most common type of database. A relational database is one in which data entities are related to each other. A database file or table or entity Files (tables) are managed by a DBMS
nano-medicine
Nanomedicine is the application of nanotechnology (the engineering of tiny machines) to the prevention and treatment of disease in the human body. This evolving discipline has the potential to dramatically change medical science.
trojan horse
One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. The term comes from the a Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering.
_______ indicates how many pages a printer is able to print per minute.
PPM
cookies
Small file on your computer that contains data about you Some Web sites sell or trade information stored in your cookies Set browser to accept cookies, prompt you to accept cookies, or disable cookies
mobile apps
Small specific purpose computer programs Limited function Isolated from other apps - limited data sharing Use mobile features: camera, location reporting
2003 CAN-SPAM act
The U.S. CAN-SPAM Act is short for Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003. It was implemented to set standards for commercial emailing, often called "spam." According to the law, subject lines must be clear and accurately reflect email content.
A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformat a hard disk.
Trojan horse
types of e-commerce
a. Business to business b. Business to consumer c. Customer to customer d. Business to government and citizen to government e. E-commerce expectations
social concerns
a. Child protection i. Legislation b. Computer addiction c. Green computing
business concerns
a. Fraud b. Computer crime i. Types of computer crimes ii. Property rights c. Data and equipment protection d. Disaster and recovery plan
DBMS: schema
map of database. The term "schema" refers to the organization of data as a blueprint of how the database is constructed (divided into database tables in the case of relational databases). The formal definition of a database schema is a set of formulas (sentences) called integrity constraints imposed on a database.
What type of artificial intelligence is used to simulate or act like the functioning of the human brain?
neural networks
__________ connects a page to another document or web page.
hyperlink
In ____________ conversion, the old IS is gradually turned off and the equivalent parts of the new system gradually turned on.
phased
The act of attempting to fraudulently acquire information by distribution of e-mail messages asking prospective victims to verify their account or confirm billing information is referred to as _________
phishing
A field whose value uniquely identifies each record in a table is called a(n):
primary key
A recipient uses which of the following to read an encrypted message?
private key
A _________ appears to be something desirable but it usually does something malicious, such as erase files, damage data, or reformats a hard disk.
trojan horse
A denial of service attack is described as an aggressive attempt to prevent legitimate users of a service from using that service or the server it is installed on.
true
An end user license agreements or EULA accompanies most licensed software and is presented to a user during the installation process
true
Software as a Service (SaaS) allows businesses to subscribe to Web-delivered business application software by paying a monthly service charge or a per use fee.
true
Spyware programs can harvest personal data by reading cookies and sending the data to a server.
true
If a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.
virtual memory
A _________ is an object that is embedded in an e-mail and is used to check if a user has viewed the email.
web bug
A(n) ______ is a program that warns or blocks you from potentially fraudulent or suspicious Web sites.
web filter
A ___________ is the person responsible for designing, developing and maintaining a website.
webmaster
system development life cycle
(SDLC is also an abbreviation for Synchronous Data Link Control.) The systems development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application.
management information systems characteristics
- Reporting systems built on existing transaction processing system - Support structured decision making - Support tactical level management
management information systems: output of MIS
- Scheduled reports - On-demand reports - Exception reports
solving problems with excel
-what if analysis -goal seeking -forecasting
assistive technology
1. Braille keyboard 2. Braille display 3. Magnifier 4. Screen reader software 5. Speech recognition
software testing
1. syntax 2. logical ?
To prevent eyestrain, you should rest your eyes every ____ or so by focusing on an object in the distance for one minute, and then closing your eyes for another minute.
15 minutes
To prevent wrist/arm, soreness and injury, you should rest and gently stretch your fingers and arms every ____ or so.
15 minutes
ergonomics
Applied science devoted to comfort, efficiency, and safety in workplace (keyboards, document holders, anti-glare screens, docking station, keyboard drawers, etc)
enabling technologies: network
WiFi 4G LTE-Advanced 5G
mobile app development
"Native" Apps iOS - Objective C programming language Android - Java programming language One Size Fits All HTML 5 CSS 3 JavaScript
Which of the following is a correct way in XHTML to insert an image, assuming that the image is located in the same folder?
< img src = "smiley.gif" />
Which of the following is used to insert a line break?
<br />
HTML: centering on a page
<center>This text will be center-aligned.</center>
To create separate paragraphs, the content for each paragraph must exist within its own _____.
<p> ... </p>
botnet
A botnet is a group of computers connected in a coordinated fashion for malicious purposes. Each computer in a botnet is called a bot. These bots form a network of compromised computers, which is controlled by a third party and used to transmit malware or spam, or to launch attacks.
Which of the following is true about copyrights?
A composer automatically has copyrights to any piece of music he or she writes.
short answer: what are cookies? explain the process. ex: connect to server then installs cookie on your machine... also explain from spyware context?
A cookie is a text file that a Web browser stores on a user's machine. Cookies are a way for Web applications to maintain application state. They are used by websites for authentication, storing website information/preferences, other browsing information and anything else that can help the Web browser while accessing Web servers. A cookie contains specific information that is encrypted for security purposes. Normally, a cookie is attached with an HTTP header from the HTTP server to a Web browser in response to a user request. This stored cookie is sent to the HTTP server whenever access to a specific website is required. Cookies are managed in two patterns: with expiry date and without expiry date. Cookies without expiry dates are automatically stored in users' machines and remain inside the system's memory until the user's browsing terminates. Cookies with an expiry date expire when that date is surpassed.
geographic information system
A geographic information system (GIS) is a system designed to capture, analyze, store, manipulate, present and manage all types of geographical data, like information from maps, global positioning systems (GPS) and ubiquitous data, like locations of landmarks and areas hit by calamities.
nanocomputing
A nanocomputer is a computer that's very small compared to microcomputers and mini-computers. This term refers to any computer or computing device with microscopic or very small dimensions, although these machines are typically the size of a standard credit card.
data mining
A process of searching large volumes of data and automatically detecting patterns within it. How data mining works - Obtain data, re-format if necessary, and store in a data warehouse system. - Provide access to business analysts. - Analyze the data by application software. - Present outcomes in a useful format, often a graph table.
cloud computing
Access to data and programs over the internet Applications run remotely on "cloud" servers Data stored on "cloud" servers Platform / infrastructure services dynamically scalable Shared resources reduces cost
An example of a record in a database is:
All of the data about one specific thing, such as an individual employee.
excessive traffic
Causes: Denial-of-Service Attacks Unanticipated popularity Slow down the access
_________ is a critical component in a computer that processes data by interpreting and executing instructions contained in computer programs.
Central Processing Unit (CPU)
cognitive computing
Cognitive computing is the simulation of human thought processes in a computerized model. Cognitive computing involves self-learning systems that use data mining, pattern recognition and natural language processing to mimic the way the human brain works.
mobile and cloud computing
Combination of cloud computing, mobile devices, and wireless networks to provide computational and communication resources to mobile users, cloud users, and cloud computing providers.
conventional AI: neural networks
Combines learning, adaptation, and evolution to create programs that are somewhat intuitive or even intelligent CI methods include: Neural networks Systems mimic human brain functionalities
short answer: whats the difference between interpreter and compiler?
Compilers, assemblers and interpreters are all programs that take the source code of a programming language, written by a programmer, and make it run on a computer. A compiler is a program which coverts the source code of a programming language into executable machine code for a CPU. An interpreter takes each line of source code of a programming language, and executes it there and then. It goes on to do the same for the next line afterwards.
Defragmenting reorganizes the files on a disk so that they are located in ____ access time.
Contiguous sectors, which speeds
Why have a code of ethics
Contribute to society and to human well-being. Avoid harm to others. Be honest and trustworthy. Be fair and take action not to discriminate. Honor property rights including copyrights and patent. Give proper credit for intellectual property. Respect the privacy of others. Honor confidentiality.
components of DSS (decision support systems)
Database Management System Knowledgebase Model-base management system User interface Analytical and presentation tools
___________ act criminalizes production and distribution of technology that is used to circumvent measures that control access to copyrighted works.
Digital Millennium Copyright Act
Hardware that is ____________ compliant exceeds the minimum federal standards for reduced energy consumption.
ENERGY STAR
evolvable hardware
Evolvable hardware (EH) is a field focusing on the use of evolutionary algorithms (EA) to create specialized electronics without manual engineering. It brings together reconfigurable hardware, evolutionary computation, fault tolerance and autonomous systems. Evolvable hardware refers to hardware that can change its architecture and behavior dynamically and autonomously by interacting with its environment.
programming: issues: logic errors
Logic errors (wrong formulas, wrong relational operators, etc.). A logic error is an error in a program's source code that gives way to unanticipated and erroneous behavior. A logic error is classified as a type of runtime error that can result in a program producing an incorrect output. It can also cause the program to crash when running. Logic errors are not always easy to recognize immediately. This is due to the fact that such errors, unlike that of syntax errors, are valid when considered in the language, but do not produce the intended behavior. These can occur in both interpreted and compiled languages. A logic error is also known as a logical error.
Which of the following is not typically performed by management information systems (MIS)?
Making recommendations for improving performances
short answer: phishing vs. farming?
Phishing and pharming are two different ways hackers attempt to manipulate users via the Internet. Phishing involves getting a user to enter personal information via a fake website. Pharming involves modifying DNS entries, which causes users to be directed to the wrong website when they visit a certain Web address. Phishing is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. Using a complex set of social engineering techniques and computer programming expertise, phishing websites lure email recipients and Web users into believing that a spoofed website is legitimate and genuine.
mobile advantages
Portability Unlimited access to information Improved decision-making Increased productivity and reduced costs Improved customer relations Ease of research News and entertainment
quantum computing
Quantum computing is an as-of-yet theoretical computing model that uses a very different form of data handling to perform calculations. The emergence of quantum computing is based on a new kind of data unit that could be called non-binary, as it has more than two possible values.
ransomware
Ransomware is a type of malware program that infects, locks or takes control of a system and demands ransom to undo it. Ransomware attacks and infects a computer with the intention of extorting money from its owner. Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto-worm.
computing styles
SIRI Like systems, Cognitive computing, Contextual computing
_________ is a communications technology used by some outgoing mail servers.
SMTP (simple mail transfer protocol)
protection: encryption
Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data .... A private key is a tiny bit of code that is paired with a public key to set off algorithms for text encryption and decryption. It is created as part of public key cryptography during asymmetric-key encryption and used to decrypt and transform a message to a readable format. ... A private key is also known as a secret key.
protection: firewall
Security system consisting of hardware and/or software that prevents unauthorized network access
characteristics and capabilities of DSS
Support for semi-structured and unstructured problems. Support group communication and collaboration. Support different data types. Adaptable and flexible. Interactive and provide ease of use. Fast query response. Provide various analysis techniques. Allow different presentation styles.
short answer: syntax vs. logic error?
Syntax errors occur when a program does not conform to the grammar of a programming language, and the compiler cannot compile the source file. Logic errors occur when a program does not do what the programmer expects it to do. Syntax errors are usually easy to fix because the compiler will tell you where the error occurs and you simply fix the syntax error. For example you may miss a semicolon or a curly bracket where it's supposed to be. Simply locate those errors and fix them. The real pain in the neck are logic errors. For instance you may be writing a software application that solves a puzzle, but when you run it it tells you that the puzzle cannot be solved. After you dig through the program logic you realize you have done something wrong. After you fix the logic and run the program again it solves the puzzle successfully.
Telecommuting
Telecommuting Flexibility in working location and hours Advantage Saves office space Care for young and elderly parents Disadvantage Business isolation Risk of data loss and compromise to data integrity
children's online privacy protection
The Children's Online Privacy Protection Act of 1998 (COPPA) is a federal law that prohibits websites from knowingly collecting and maintaining the online information and privacy of children under the age of 13. COPPA gives parents control of information collected from their children online. The law was enacted on October 21, 1998 and became effective April 21, 2000. COPPA violations are subject to civil penalties (up to $11,000 for each violation). On December 19, 2012, the FTC introduced changes and updates to COPPA in the wake of the December 14 shootings at Sandy Hook Elementary School in Newtown, Connecticut.
digital millennium copyright
The Digital Millennium Copyright Act (DMCA) is U.S. copyright legislation that implements the World Intellectual Property Organization (WIPO) Performances and Phonograms Treaty and the 1996 WIPO Copyright Treaty. DMCA prevents the unauthorized duplication of digital copyrighted works by regulating digital intellectual property (IP) owners and consumers. Since DMCA was passed in 1998, similar bills and legislation have been adopted internationally.
1986 electronic communications privacy act (ECPA)
The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer (18 U.S.C. § 2510 et seq.), added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act (SCA, 18 U.S.C. § 2701 et seq.), and added so-called pen trap provisions that permit the tracing of telephone communications (18 U.S.C. § 3121 et seq.).
________ allows peripheral devices to be connected without the need to plug expansion cards into the computer's external bus
USB
work and workspace design
a. De-skilling b. Job losses c. Communication and organizational structure d. Geography e. Telecommuting f. Ergonomics
health issues
a. Repetitive Stress Injury (RSI) i. Carpal Tunnel Syndrome (CTS) b. Computer Vision Syndrome (CVS) c. Information overload d. Psychological stress e. Isolation
A modem
converts a digital signal into an analog signal and vice versa
intellectual property: patent
cover the underlying methodologies embodied in a given piece of software.
Which of the following activity is an example of a copyright infringement:
creating a copy and selling it to someone, creating a copy and giving it to someone, posting a copy on the internet for users to download
Pascal
designed to teach structured programming; useful for math and science applications.
_____________ is the use of the internet and other electronic technologies through which business communicates and negotiates with customers.
e-commerce
If an <img> element does not include height and width attributes, then the ToolTip will be empty when the user moves the mouse over the image.
false
In XHTML, there are five levels of headers, from < h1>...< /h1> to < h5>.... < /h5>.
false
The head element tells a browser that this is an HTML document.
false
While slides in a presentation can display a chart, the chart must first be created in a spreadsheet program.
false
With the B2B business model, consumers sell directly to other consumers, such as via an online auction site.
false
interpreter vs. compiler
Compiler and Interpreter are two different ways to execute a program written in a programming or scripting language. A compiler takes entire program and converts it into object code which is typically stored in a file. The object code is also refereed as binary code and can be directly executed by the machine after linking. Examples of compiled programming languages are C and C++. An Interpreter directly executes instructions written in a programming or scripting language without previously converting them to an object code or machine code. Examples of interpreted languages are Perl, Python and Matlab.
keystroke logging
Designated events and actions are provided for capturing and analyzing keystrokes in software and operating system-based applications. Keystroke rhythm is unique for a user on a specific keyboard, and is considered a behavior biometric which could be used in many areas such as security, authentication and surveillance.
cloud characteristics
Easier and less costly maintenance Centralization of infrastructure Productivity increases Reliability increases Centralized Security
data structure: arrays
In computer science, an array data structure, or simply an array, is a data structure consisting of a collection of elements (values or variables), each identified by at least one array index or key. An array is stored so that the position of each element can be computed from its index tuple by a mathematical formula.
syntax
In computer science, the syntax of a programming language is the set of rules that define the combinations of symbols that are considered to be correctly structured programs in that language.
logic: iteration
Iteration, in the context of computer programming, is a process wherein a set of instructions or structures are repeated in a sequence a specified number of times or until a condition is met. When the first set of instructions is executed again, it is called an iteration. When a sequence of instructions is executed in a repeated manner, it is called a loop. Iteration is the repetition of a process in a computer program, usually done with the help of loops. An example of an iteration programming language is as follows: Consider a database table containing 1000 student records. Each record contains the following fields: First name Last name Roll no If one wants to copy all the student records from the database and print them, the best way to retrieve the record is to iterate or loop through each record. It can be executed using the for loop statement as shown below: for (int i=0;i<1000;i++) { \\Print first name and last name from table }
cloud computing: virtualization
Main enabling technology for cloud computing Separates a physical computing device into one or more "virtual" devices Creates scalable systems
success factors in e-commerce
Market Research Interface Documentation Security Inviting Value Incentive
SQL: the language of data: field vs. record
Tables are also called datasheets. Each table in a database holds data about a different, but related, subject. Data is stored in records. A record is composed of fields and contains all the data about one particular person, company, or item in a database.
challenges and impediments to success in e-commerce
Unfulfilled expectations Unsatisfactory Web experience Navigation Motivation Awkward process Security Suitability
m-commerce
Use of wireless handheld devices to conduct commercial transactions online while on-the-go Provides: Content purchase and delivery (Kindle) Navigation Shop online while travelling Mobile banking Mobile payments Information services (news, stock quotes, sports scores)
database: data vs. information
data in, information out. Data are simply facts or figures — bits of information, but not information itself. When data are processed, interpreted, organized, structured or presented so as to make them meaningful or useful, they are called information. Information provides context for data.
Designing a database
i. Schema ii. cardinality: In the context of databases, cardinality refers to the uniqueness of data values contained in a column. High cardinality means that the column contains a large percentage of totally unique values. Low cardinality means that the column contains a lot of "repeats" in its data range. iii. primary key iv. foreign key
corporate concerns: online fraud risk
risks in online transactions -business responsibility -falling sales
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Fortran
the oldest high-level programming language; designed for scientific and mathematical applications.
C, C++, C#
versions of the highly efficient C programming language; C++ and C# are object-oriented.
logic: sequence
(1) One of the three basic logic structures in computer programming. The other two logic structures are selection and loop. In a sequence structure, an action, or event, leads to the next ordered action in a predetermined order. The sequence can contain any number of actions, but no actions can be skipped in the sequence. The program, when run, must perform each action in order with no possibility of skipping an action or branching off to another action. All logic problems in programming can be solved by forming algorithms using only the three logic structures, and they can be combined in an infinite number of ways. The more complex the computing need, the more complex the combination of structures. (2)A structured series of shots or scenes with a beginning, middle and end. The term sequence can be applied to video, audio, or graphics.
HTML: page titles
<head> </head> Contains information about the document, such as title
HTML: headers
<header> For logos or headings to show at the top of the Web page
HTML: hyperlinks
<ul id="menu"> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> <li><a href="#">Link</a></li> </ul>
implementation
?
maintenance
?
entity-relationship (ER) diagram
An entity-relationship diagram (ERD) is a data modeling technique that graphically illustrates an information system's entities and the relationships between those entities. An ERD is a conceptual and representational model of data used to represent the entity framework infrastructure.
pseudocode
Most software programs are developed using a programming language, like C++ or Java. These languages have a specific syntax that must be adhered to when writing program's source code. Pseudocode, on the other hand, is not a programming language, but simply an informal way of describing a program. It does not require strict syntax, but instead serves as a general representation of a program's functions. Since each programming language uses a unique syntax structure, understanding the code of multiple languages can be difficult. Pseudocode remedies this problem by using conventional syntax and basic english phrases that are universally understood. For example, a line of PHP code may read:if ($i < 10) { i++; } This could be written in pseudocode as:if i is less than 10, increment i by 1. By describing a program in pseudocode, programmers of all types of languages can understand the function of a program.
program design
?
assembly language
An assembly language is a low-level programming language for microprocessors and other programmable devices. It is not just a single language, but rather a group of languages. An assembly language implements a symbolic representation of the machine code needed to program a given CPU architecture. An assembly language is the most basic programming language available for any processor. With assembly language, a programmer works only with operations that are implemented directly on the physical CPU. Assembly languages generally lack high-level conveniences such as variables and functions, and they are not portable between various families of processors. They have the same structures and set of commands as machine language, but allow a programmer to use names instead of numbers. This language is still useful for programmers when speed is necessary or when they need to carry out an operation that is not possible in high-level languages.
product suitability in e-commerce
Certain products and services are more suitable for online sales and some are more suitable for offline sales. Suitable: Products that have a high value to weight ratio Music, movies, software, photography, travel reservations and tickets, and financial transactions. Unsuitable: Products that have a low value to weight ration Products that have a limited shelf life Products that require trial fittings Products where color integrity is important
corporate concerns: denial of service
overloads a network with packets slowing and crippling the legitimate network traffic -bandwidth consumption -consumption of other resources
testing
?
data structure
A data structure is a specialized format for organizing and storing data. General data structure types include the array, the file, the record, the table, the tree, and so on. Any data structure is designed to organize data to suit a specific purpose so that it can be accessed and worked with in appropriate ways.
database management systems (DBMS)
A database management system (DBMS) is a software package designed to define, manipulate, retrieve and manage data in a database. A DBMS generally manipulates the data itself, the data format, field names, record structure and file structure. It also defines rules to validate and manipulate this data. A DBMS relieves users of framing programs for data maintenance. Fourth-generation query languages, such as SQL, are used along with the DBMS package to interact with a database. Some dbms examples are: MySQL, SQL Server, Oracle, dBASE, and FoxPro.
SQL: the language of data: field
A field is part of a record and contains a single piece of data for the subject of the record. In the database table illustrated in Figure 4, each record contains four fields: Log ID A number assigned to this customer support incident for identification purposes Operator The code for the customer support operator who handled this incident Resolved A check box to indicate whether the incident was resolved Duration The time in seconds the operator spent on this incident Fields appear as columns in a database table. Data from the Log ID field for five records is highlighted in the Figure 4.
DBMS: primary key
A primary key is a special relational database table column (or combination of columns) designated to uniquely identify all table records. A primary key's main features are: It must contain a unique value for each row of data. It cannot contain null values. A primary key is either an existing table column or a column that is specifically generated by the database according to a defined sequence.
data structure: stack
A stack is a basic data structure that can be logically thought of as a linear structure represented by a real physical stack or pile, a structure where insertion and deletion of items takes place at one end called top of the stack. The basic concept can be illustrated by thinking of your data set as a stack of plates or books where you can only take the top item off the stack in order to remove things from it. This structure is used all throughout programming. The basic implementation of a stack is also called a LIFO (Last In First Out) to demonstrate the way it accesses data, since as we will see there are various variations of stack implementations. There are basically three operations that can be performed on stacks . They are 1) inserting an item into a stack (push). 2) deleting an item from the stack (pop). 3) displaying the contents of the stack(pip).
RDMBS: normalization
Database normalization, or simply normalization, is the process of restructuring a relational database in accordance with a series of so-called normal forms in order to reduce data redundancy and improve data integrity.
mobile cloud
Different from mobile computing Use of cloud apps instead of traditional applications Use of cloud services (data storage and virtual servers)
commerce: disintermediation and the supply chain
Disintermediation, in finance, is the withdrawal of funds from intermediary financial institutions, such as banks and savings and loan associations, to invest them directly. Generally, disintermediation is the process of removing the middleman or intermediary from future transactions.
HTML: Hypertext markup language
Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
HTML: horizontal rule
In HTML5, the <hr> tag defines a thematic break. In HTML 4.01, the <hr> tag represents a horizontal rule. However, the <hr> tag may still be displayed as a horizontal rule in visual browsers, but is now defined in semantic terms, rather than presentational terms.
SQL: the language of data: record
In relational databases, a record is a group of related data held within the same structure. More specifically, a record is a grouping of fields within a table that reference one particular object. The term record is frequently used synonymously with row. For example, a customer record may include items, such as first name, physical address, email address, date of birth and gender. Data is stored in records. A record is composed of fields and contains all the data about one particular person, company, or item in a database. In this database, a record contains the data for one customer support incident report. Records appear as rows in the database table. A record for Log ID 1201242 is highlighted in Figure 3.
DBMS: tables
In relational databases, and flat file databases, a table is a set of data elements (values) using a model of vertical columns (identifiable by name) and horizontal rows, the cell being the unit where a row and column intersect. A table has a specified number of columns, but can have any number of rows.
SQL: the language of data: selection vs. projection
Projection means choosing which columns (or expressions) the query shall return. Selection means which rows are to be returned. if the query is select a, b, c from foobar where x=3; then "a, b, c" is the projection part, "where x=3" the selection part.
logic
Logic plays a key role in computer science (databases, computational complexity, programming languages, artificial intelligence, hardware and software design and verification, etc..), and is undoubtedly one of the foundations that provide the maturity and agility to assimilate the future concepts, languages, techniques and tools in computer science. Similarly to architects and engineers, who mathematically analyze their products, computer scientists need to analyze the logical properties of their systems while designing, developing, verifying and maintaining them, especially when it comes to systems that are critical financially, or with respect to safety, privacy or efficiency.
measuring web traffic
Measuring Traffic Traffic statistics Tracking applications Toolbars Packet sniffing Categories for collecting and analyzing data: Visitor count Page count Popular pages Visit time Times per page Busy times Referrers
transactions in e-commerce
Merchant Accounts PayPal Google Checkout Secure Electronic Transaction Electronic Checks Digital Cash Smart Cards Micropayments SSL
enabling technologies: software
Mobile operating systems Android iOS Server virtualization Storage virtualization
Pharming
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent. Pharming has been called "phishing without a lure."
data structure: queue
Queue is an abstract data structure, somewhat similar to Stacks. Unlike stacks, a queue is open at both its ends. One end is always used to insert data (enqueue) and the other is used to remove data (dequeue). Queue follows First-In-First-Out methodology, i.e., the data item stored first will be accessed first.
mobile disadvantages
Real or virtual? - Non-personal communication WiFi or 3G/4G Connection required Dependence on batteries Weather can interfere with transmission Health issues - smartphone radiation Safety - device use while driving
cloud computing: application support
Software-as-a-Service (SaaS) Selling access to programs like Microsoft Office and Adobe Creative Platform-as-a-Service (PaaS) Selling access service to mobile development Infrastructure-as-a-Service (IaaS)Selling saleable infrastructure including web space, virtual servers, data storage, and network connection.
source code
Source code is the set of instructions and statements written by a programmer using a computer programming language. This code is later translated into machine language by a compiler. The translated code is referred to as object code.
spyware
Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.
fraud and other concerns in e-commerce
Stolen Credit Cards Phishing Click Fraud Pharming Auction and Retail Schemes Market Manipulation Spam
DMBS: structure query language (SQL)
Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation. SQL is used to query, insert, update and modify data. SQL is used to help us answer information related questions. SQL works with tables that follow the four rules: The order of the rows does not matter. The order of the columns does not matter. All records must have the same number of fields. All data in a column (field) must be the same type
HTML: subscripts and superscripts
Subscript : For adding a subscript text in a html file, tag can be used. The sub tag defines subscript text. Subscript text appears half a character below the normal line, and is sometimes rendered in a smaller font. Subscript text can be used for chemical formulas, like H2O to be written as H2O. Superscript : For adding a superscript text in a html file, tag can be used. The sup tag defines superscript text. Superscript text appears half a character above the normal line, and is sometimes rendered in a smaller font. Superscript text can be used for footnotes.
HTML: display lists of things
Tables are collections of rows and columns that can be used to organize and display data. <tr> element creates table row. <td> element contains data for cell. <th> element contains header information. Unordered lists List of bulleted items. <li> elements are nested within the <ul> elements as follows: <ul> <li> list item 1 </li> <li> list item 2 </li> </ul> Ordered lists List of numbered items. <li> elements are nested within the <ol> elements: <ol> <li> Bill Clinton </li> <li> George Bush </li> </ol>
increasing web traffic
Techniques: Indexing a site in search engine Purchase advertising, including bulk (spam) email, pop-up ads, and search engine advertisements. Purchasing non-Internet based advertising Links from referrer sites
HTML: line break
The HTML <br> element produces a line break in text (carriage-return). It is useful for writing a poem or an address, where the division of lines is significant.
HTML: strict DTD
This DTD contains all HTML elements and attributes, but does NOT INCLUDE presentational or deprecated elements (like font). Framesets are not allowed. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
HTML: frameset DTD
This DTD is equal to HTML 4.01 Transitional, but allows the use of frameset content. <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
HTML: creating ordered and unordered lists
Unordered lists List of bulleted items. <li> elements are nested within the <ul> elements as follows: <ul> <li> list item 1 </li> <li> list item 2 </li> </ul> Ordered lists List of numbered items. <li> elements are nested within the <ol> elements: <ol> <li> Bill Clinton </li> <li> George Bush </li> </ol>
HTML: font style, color, and size
Usually used with CSS
virus distribution
Virus is a potentially damaging computer program
programming: issues: syntax errors
a character or string incorrectly placed in a command or instruction that causes a failure in execution. (typos, wrong syntax, etc.)
machine language
a computer programming language consisting of binary or hexadecimal instructions that a computer can respond to directly.
corporate concerns: unsecured email
allows passwords to be stored in cookies
Java
object-oriented programming language commonly used for Web applications. Object - a template for all instances that have identical behaviors and properties Class - is a blueprint or prototype from which objects are created.
cloud architecture
front end, network, back end
Rules of HTML 5 coding
i. Document must be well formed. ii. All tag names must be in lowercase. iii. All attribute values must be enclosed by quotes. iv. Tags must be properly nested. v. Each document must have a root element. <html> ... </html>