Midterms
Midterms
File systems were an improvement over manual Lack of Design and Data-Modeling Skills
system Most users lack the skill to properly design
- File systems used for more than two databases, despite multiple personal productivity
decades tools being available.
- Understanding the shortcomings of file Data-modeling skills are vital in the data design
systems aids in development of modern process.
databases Good data modeling facilitates communication
- Many problems not unique to file systems between the designer, user, and the developer.
Even simple file system retrieval task required
extensive programming Database systems - consists of logically related
- Ad hoc queries impossible data stored in a single logical data repository.
- Changing existing structure difficult - Maybe physically distributed among
Security features difficult to program multiple storage facilities.
- Often omitted system environments - DBMS eliminates most of file system’s
Summary of file system limitations: problems
- Requires extensive programming - Current generation stores data structures,
- Cannot perform ad hoc queries relationships between structures, and
- System administration is complex and access paths
difficult - Also defines, stores, and manages
- Difficult to make changes to existing all access paths and components.
structures Database system - defines and regulates the
- Security features are likely to be collection, storage, management, use of data.
inadequate 5 major parts of database system:
Structural dependence - access to a file is 1. Hardware - all the system’s physical
dependent on its own structure devices.
- All file systems programs must be 2. Software - three types of software
modified to conform to a new file structure. required
Structural independence - change file structure - Operating system software
without affecting data access - DBMS software
Data dependence - data access changes when - Application programs and utility
data storage characteristics change software.
Data independence - data storage 3. People - all users of the database system
characteristics do not affect data access. - System and database
Logical data format - how human views the data administrators
Physical data format - how computer must work - Database designers
with data - Systems analysts and
Each program must contain programmers
- Lines specifying opening of specific file - End users
type 4. Procedures - instructions and rules that
- Record specification govern the design and use of the
- Field definitions database system
File system structure makes it difficult to combine 5. Data - collection of facts stored in the
data from multiple sources database.
– Vulnerable to security breaches
Organizational structure promotes storage of Database systems - created and managed at
same data in different locations different levels of complexity.
– Islands of information Database solutions must be cost effective as
Data stored in different locations is unlikely to be well as tactically and strategically effective.
updated consistently Database technology already in use affects
Data redundancy - same data stored selection of a database system.
unnecessarily in different places
DBMS FUNCTIONS - Query language is a nonprocedural
language
Most functions are transparent to end users - Structured Query Language (SQL) is the
- Can only be achieved through the DBMS defacto query language
Data dictionary management - Standard supported by majority of
- DBMS stores definitions of data elements DBMS vendors
and relationships (metadata) in a data Database communication interfaces
dictionary - Current DBMS accept end-user requests
- DBMS looks up required data component via multiple different network
structures and relationships environments
- Changes automatically recorded in the - Communications accomplished in several
dictionary ways
- DBMS provides data abstraction and - End users generate answers to
removes structural and data dependency queries by filling in screen forms
Data storage management through Web browser
- DBMS creates and manages complex - DBMS automatically publishes
structures required for data storage predefined reports on a Web site
- Also stores related data entry forms, - DBMS connects to third party
screen definitions, report definitions etc. systems to distribute information
- Performance tuning : activities that make via e-mail.
the database perform more efficiently. Database system provides framework in which
- DBMS stores the database in multiple strict procedures and standards enforced
physical data files. - Role of human changes from
programming to managing organization’s
Data transformation and presentation resources
- DBMS transforms data entered to conform - Enables more sophisticated use of the
to requires data structures data
- DBMS transforms physically retrieved data Data structures - created within the database
to conform to user’s logical expectations and their relationships determine effectiveness.
Security management
- DBMS creates a security system that Disadvantages of database systems:
enforces user security and data privacy - Increased costs
- Security rules determine which users can - Management complexity
access the database, which items can be - Maintaining currency
accessed etc. - Vendor dependence
Multiuser access control - Frequent upgrade/replacement cycles
- DBMS uses sophisticated algorithms to Chapter 2
ensure concurrent access does not affect Designers, programmers, and end users see data
integrity in different ways.
Backup and recovery management Different views of same data lead to designs that
- DBMS provides backup and data recovery do not reflect organization’s operation
to ensure data safety and integrity Data modeling reduces complexities of database
- Recovery management deals with design
recovery of database after a failure Various degrees of data abstraction help reconcile
- Critical to preserving database’s varying views of same data
integrity
Data integrity management Data models - relatively simple representations
- DBMS promotes and enforces integrity of complex real-word data structures.
rules Often graphical
- Minimizes redundancy Model - an abstraction of a real-word object or
- Maximizes consistency event. Useful in understanding complexities of the
- Data relationships stored in data dictionary used real world environment.
to enforce data integrity Data modeling - iterative and progressive
- Integrity is especially important in transaction
oriented database systems Importance of Data Models
● Facilitate interaction among the designer,
Database access languages and applications the applications programmer, and the end
programming interfaces user
- DBMS provides access through a query ● End users have different views and needs
language for data
● Data model organizes data for various
users
● Data model is an abstraction
Cannot draw required data out of the data
model
Business rules
Descriptions of policies, procedures, or, principles
within a specific organization
- Apply to any organization that stores and
uses data to generate information
Description of operation to create/enforce actions
within an organization’s environment
- Must be in writing and kept up to date
- Must be easy to understand and widely
disseminated
Describe characteristics of data as viewed by the
company
MULTIMEDIA
Multimedia - combination of two or more media to design for governmental services and nonprofit
- Integration of text, graphics, drawings, services applications as well.
moving images. Animation, audio and any
other media where every type of Entertainment and Fine Arts - develop special
information can be presented, stored, effects in movies and animations. Multimedia
transmitted and processed digitally. games are a popular pastime and are software
- Allows the content to be presented in a programs available either as CD-ROMS or online.
nonlinear way, which allows the user to be Some video games also use multimedia features.
active rather than passive.
Interactivity - fundamental feature of Multimedia artists - minds are able to blend
multimedia. techniques using different media that in some way
- The ability of the user to interact with an incorporates interaction with the viewer.
application.
Media - evolved to mean ‘facilitating or linking Peter Greenaway - melded cinema with opera
communication’ - be it via phone, the web, TV or and all sorts of digital media. Another approach
some other instrument. entails the creation of multimedia that can be
displayed in a traditional fine arts arena, such as
When using more than one type of medium, it is an art gallery.
referred to as Multimedia.
Education - multimedia is used to produce
Major Features of multimedia computer-based training courses that lets the
user go through a series of presentations, text
Multimedia presentations - viewed in person on about a particular topic, and associated
stage, projected, transmitted, or played locally illustrations in various information formats.
with a media player.
Multimedia games & simulations - used in a Edutainment - informal term used to describe
physical environment with special effects, with combining education with entertainment
multiple users in an online network, or locally with
an offline computer, game system, or simulator. Engineering - software engineers may use
multimedia in computer simulations for anything
Usage from entertainment to training such as military or
industrial training.
Video games may include a combination of text,
audio, still images, animation, video, and Multimedia for software interfaces are often done
interactivity content forms. as a collaboration between creative professionals
and software engineers.
A presentation using Powerpoint. Corporate
presentations may combine all forms of media Industry - multimedia is used as a way to help
content. present information to shareholders, superiors
and co-workers. Also helpful in providing
Virtual reality uses multimedia content. employee training, advertising and selling
Applications and delivery platforms of multimedia products all over the world via virtually unlimited
are virtually limitless. web-based technologies.
Multimedia finds its application in various areas Mathematical & Scientific Research -
including but not limited to, advertisements, art, multimedia are used for modeling and simulation.
education, entertainment, engineering, medicine,
mathematics, business, scientific research, and Medicine - doctors can get trained by looking at a
spatial temporal applications. virtual surgery or they can simulate how the
human body is affected by diseases spread by
Creative industries - use multimedia for a variety viruses and bacteria and then develop techniques
of purposes ranging from fine arts, to to prevent it.
entertainment, to commercial art, to journalism, to
media, and software services provided for any of Effective PPT
the industries listed below.
- When making PPT consider the type of
Commercial - exciting presentations are used to presentation (Lecture, discussion)
grab and keep attention in advertising. - Don’t make your presentation
Commercial multimedia developers may be hired powepointless.
● Structure your presentation - Always title your graphs.
● Keep it simple (background, font, Other features
colour) - Avoid sound effects in powerpoint
● Minimal content on slides-6/6 - Avoid embedded programs and action
● Avoid pointless animations buttons for advanced users
● Only use pictures if they assist - Refrain from trite clip art
● Ensure accuracy with content and - Choose pictures that highlight your point
equipment - Use a screen capture if appropriate
Spelling and Grammar
The outline - Proof your slides for spelling mistakes,
- 1st or 2nd slide should have an outline use of repeated words, grammatical errors
- Follow outline for your presentation you might have made
- Place main points on outline slide - Have someone check your presentation
Slide layout Conclusion slide
- Use point form, not complete sentences - Use and effective and strong closing
- Maximum 6 points per slide - Use a conclusion slide
- Avoid wordiness: keywords only
- Showing one point at a time will focus Typography - from the Latin words typos (type)
attention on one point, prevent reading and graphos (written)
ahead and help your presentation focused - The art of creating and setting type with
- Do not use distracting animation the purpose of honoring the text it sets
- Do not go overboard with animation - The art and technique of arranging type
- Use consistent animation that involves the selection of typeface,
- Slide transitions should not be distracting fontsize, leading, tracking, kerning.
- Be consistent with transitions - never It’s important to design labels for titles, screens,
random menus, and buttons or tabs using words that have
- Worst effects : Checkerboard or Comb the precise and powerful meaning to express
Fonts what you need to say.
- Use different size to show hierarchy GO BACK is more powerful than previous
- Title font is 36 point Quit is more powerful than cLOSE
- Main point 28 point Typeface - family of graphic characters usually
- Text is 24 point includes many type sizes and styles.
- Use a standard font like arial - Set of one or more fonts, in one or more
- Use at least an 18-point font and bold sizes, designed with stylistic unity
- Capitalize only when necessary - They usually comprise an alphabet of
- Don’t use a complicated font letters, numbers, punctuation marks, and
Spacing special characters.
- If you have a set of points space them out - Families of fonts
on the slide rather than in one corner - Ex. Arial
Colour Font - collection of character of a single size and
- Use a font color that contrasts sharply with style belonging to a particular typeface family
the background - Variations of a typeface
- Use color to reinforce the logic of your - Ex. Arial underline
structure Courier is a typeface while courier 12-point italic
- Use color to emphasize a point but only is a font
use this occasionally
- Using a different color for each point is Font styles - boldface, italics
unnecessary Attributes - underline, outline
- Trying to be creative can also be bad Type sizes - expressed in point (1/72 of an inch)
Background
- Use a simple background
- Use backgrounds that contrasts with
text/imagery
- Use the same background consistently
throughout your presentation
Baseline - horizontal guideline indicating where
Graphs
the bottom of the characters
- Use graphs rather than just charts and
X height - height of the lowercase letters with no
words. Data in graphs is easier to
ascender or descender
comprehend and retain rather than raw
Ascender - part of the lowercase letter that
data.
extends above x-height
Descender - part of the lowercase letter that Rasterizing - converting mathematical
extends below x-height representation of font to a recognizable symbol
displayed on screen or in printed output.
Tracking - horizontal space between each Modern - industrial revolution = mechanical point
character of view
- Old style typefaces were becoming
obsolete
- Elegant but severe and cold
- Not very readable
Shapes
Construction Composition
- Mini compositions can be created by
stacking or placing shapes next to each
other
- Can be built using forms within forms
- Visual contrasts generates visual energy
- Shapes can be mixed and colors varied as
the basis of visually pattern or graphic
element
- Literal form has been placed within bold
geometric form
- Visual bond between overlapping images
is strengthened by a shared conveyance
or movement
- Representational images can be built of
shapes – a common means of creating
icons and simple graphic elements
Construction Repetition
- Surprisingly versatile means of creating
potent graphic images
Construction Patterns
- Have long been used to add richness and
depth to designs and other works of art
- Can be used within compositions to
support backdrops for text, icons, etc.
- Can give life and energy to areas of a
printed or digital designs that are usually
blank
STS 200 BCE - Historian Polybius describes
communication by means of fire signals.
Antiquity
Classic of the Gnomon and the Circular Paths of Velocity of Light (1676)
Heaven, written about this time, contains the first - danish astronomer Ole Romer became the
known proof of a version of the Pythagorean first person measure the speed of light.
theorem. ーsolved the problem using a much longer
distance over which measure the velocity of light.
5 CE - Mathematican Liu Hsin is the first person ーthe speed of light is 240,00 km (1500,00 mi)
known to use decimal fraction per second.
ーstudied Jupiter, its moon, and Earth to measure
300 CE - Abacus is used in Europe,although the velocity of light.
counting boards based on the same principle had ーit took 16 minutes longer for the light to travel
been used by the ancient Greeks and Romans as when earth is the farthest away from Jupiter than
much as a thousand years earlier. when the earth is the closest
ーThis is also the reason that light was moving at
Biology a finite speed.
Information
⮚News can be read online
• Focusing on web content versus
paper-based content
⮚Books can now be read online
• Online modules, Google Scholar
⮚Research journals are also available
online
• Can be retrieved with relative ease
Changes in ICT 2017 and beyond
Wireless network - Wireless” means without • Networks follow protocols, which define how
wire, media that is made up of electromagnetic communications are sent and received.
waves (EM Waves) or infrared waves. These protocols allow devices to
communicate. Each device on a network
uses an Internet Protocol or IP address, a
Personal Area Network / PAN - is the smallest
string of numbers that uniquely identifies a
and simplest type of network. PANs connected
device and allows other devices to recognize
devices within the range of an individual and are
it.
no larger than about 10 meters.
•If you have a wireless router that also has
Local Area Network/LAN - is a system where Ethernet ports, you can use wired and wireless
computers and other devices connect to each devices together. A LAN that includes both wired
other in one location. LANs use both wired and and wireless devices is sometimes called a
wireless connectivity options. Wireless LAN "mixed network
/WLAN has surpassed traditional wired LAN in •."
terms of popularity, but wired LAN remains the User - the person who utilizes a computer or
more secure and reliable option. network service
User’s intervention - set of behaviors or
Metropolitan Area Network / MAN - is an activities performed by users. Typically in the form
interconnection of several LANs throughout a city, of user-contributed content, where users add their
town or municipality. own contents.
Campus Area Network / CAN - is a network
interconnected, dispersed LANs. Importance is it embodies the views of the users
not the developers, systems analyst, etc.
Wide Area Network / WAN - is the most
expansive type of computer network EXAMPLES: UPLOAD, DOWNLOAD,
configuration. COMMENT, SUBMIT REVIEWS, INTERACT
Network security - Protection of the underlying COMMON APPS USED LIKE LAPTOPS
networking infrastructure from unauthorized Desktop applications are stand-alone application
access, misuse, breaches, intrusions and other which runs on system and laptops. These
threats. applications are installed on the systems via
–involves creating a secure infrastructure for downloading online or buying CDs online or from
devices, applications, users, and applications to the store. Desktop applications are high in
work in a secure manner. efficiency and can be customized by using new
– Protects client data and information, keeping technology in the market.
shared data secure and ensuring reliable access
and network performance as well as protection Internet connection is not required for accessing
from cyber threats. the applications, it works on the local server
– Reduces overhead expenses and safeguards present in the system. Some desktop applications
organizations from costly losses that occur from a such as word editor, photo editing app and media
data breach or other security incident. player allow you to perform different tasks while
other such as gaming apps are developed purely
Network security essentials: for entertainment. When you purchase a
computer or a laptop, there is a set of apps that
are already installed on your desktop.
INSTALLING SECURITY SOFTWARE AND
MAINTAINING BACKUPS
– You must ensure that your workplace installs THE EXAMPLES OF SOME OF THE POPULAR
security software on every device using your DESKTOP APPLICATIONS ARE:
network. Maintaining backups is important; they Word processing applications such as
help you recover from a ransomware attack that Microsoft Word, Microsoft Excel, Microsoft
can block your access to your internal PowerPoint and WPS Office which are designed
documents. With an updated backup, you can to edit the textual content or enter it
wipe your computers, reinstall the necessary
softwares, and recover your data to continue Gaming applications such as Minesweeper and
working as if nothing had happened. Solitaire which are used for entertainment,
Improving passwords - You must utilize Web browsers such as Internet Explorer,
multi-factor authentication to access your Chrome and Firefox which help you to connect to
network, as it considers additional inputs than just the Internet from your computer,
user credentials. Integrating additional password
procedures will improve your security posture by Media player applications such as iTunes,
making it difficult for the hacker to access your Windows Media Player, and VLC media player
network with only user credentials. which let you listen to music, watch videos and
movies and create collections of media content.
Limiting Network Access - Access controls limit
access to information and information processing Graphics and design software such as Adobe
systems. When implemented effectively, they Photoshop, CorelDraw and AutoCAD.
mitigate the risk of information being accessed
without the appropriate authorization, unlawfully
Real-time online communication tools like
Skype, Hangouts, Google Meet, Zoom and
Whatsapp.
DAY TO DAY ACTIVITIES WITH APPS
Multimedia and music streaming software
such as MX Player, BLC Media Player, Spotify, Zoom Best for video conferencing, chatting, and
Pandora, etc. Project management software like phone meetings.
Asana, Zoho, Slack, Forecast, etc.
6. Polymorphic Virus This virus has the Packet filtering- A small amount of data is
capability to evade anti-virus programs since it analyzed and distributed according to the filter’s
can change codes every time an infected file is standards.
performed.
Proxy service- Network security system that
7. Resident Virus A resident virus stores itself on protects while filtering messages at the
your computer’s memory which allows it to infect application layer.
files on your computer. This virus can interfere
with your operating system leading to file and
Stateful inspection - Dynamic packet filtering that
program corruption. 8. Multipartite Virus A type of
monitors active connections to determine which
virus that is very infectious and can easily spread
network packets to allow through the Firewall.
on your computer system. It can infect multiple
parts of a system including memory, files, and
boot sector which makes it difficult to contain. Next Generation Firewall (NGFW) - Deep packet
inspection Firewall with application-level
inspection
Main types of phone viruses