Thursday 20 October 2016

CHAPTER-14 ENTERPRISE COMPUTING

What is enterprise computing ?
Enterprise computing involves the use of computers in networks, such as LANs and WANs, or a series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures.

Types of enterprise computing include :-
  • ·       Retail
  • ·       Manufacturing
  • ·       Service
  • ·       Wholesale
  • ·       Government
  • ·       Educational
  • ·       Transportation



Enterprise information is the information gathered in the ongoing operations of an enterprise-sized organization are :-
  • ·       Business intelligence
  • ·       Business process management
  • ·       Business process automation

Managers coordinate resources by performing four activities they are :-
  • ·       Planning
  • ·       Organizing
  • ·       Leading
  • ·       Controlling

An information system is a set of hardware, software, data, people, and procedures that work together to produce information.

Accounting software manages everyday transactions.

Billing software helps the company reconcile purchases with customer payments.

Financial software helps managers budget, forecast, and analyze.

Computer-aided design (CAD) uses a computer and special software to aid in engineering, drafting, and design.

Computer-aided engineering (CAE) uses computers to test product designs.

Computer-aided manufacturing (CAM) is the use of computers to control production equipment.

Computer-integrated manufacturing (CIM) uses computers to integrate the many different operations of the manufacturing process. Customer interaction management (CIM) software manages the day-to-day interactions with customers


Sales force automation (SFA) software equips traveling salespeople with the electronic tools they need to be more productive.

Distribution systems perform the following functions :-
  • ·       Provide forecasting for inventory control
  • ·       Manage and track shipping of products
  • ·       Provide information and analysis on inventory in a warehouse.


Manufacturing Resource Planning 2 (MRP-2) is an extension of MRP and also includes software that helps in scheduling.

Material Requirement planning (MRP) uses software to help monitor and control processes related to production.

The information technology (IT) department makes technology decisions for the enterprise.

      Whether to build or buy new information systems

      When a computer or information system has outlived its useful life.

Web site management programs collect data designed to help organizations make informed decisions regarding their Web presence.

General purpose information systems generally fall into one of five categories :-

  1.       Decision support system
  2.       Expert system
  3.       Office information system
  4.       Transaction processing system
  5.       Management information system


A portal is a collection of links, content, and services presented on a Web page that are interesting for a particular job function.

A data warehouse is a huge database that stores and manages the data required to analyze historical and current transactions.

Web services allow businesses to create products and B2B interactions over the Internet.

A document management system (DMS) allows for storage and management of a company’s documents.

A workflow is a defined process that identifies the specific set of steps involved in completing a particular project or business process.

A virtual private network (VPN) provides mobile users, vendors, and customers with a secure connection to the company network server.

Enterprise hardware allows large organizations to manage and store information and data using devices geared for :-
      Heavy use
      Maximum availability
      Maximum efficiency

Network attached storage (NAS) is a server that provides storage to users and information systems attached to the network.

A storage area network (SAN) is a high-speed network that provides storage to other servers to which it is attached.

An enterprise storage system is a strategy that focuses on the availability, protection, organization, and backup of storage in a company.

A blade server packs a complete computer server on a single card (called a blade) rather than a system unit.

A thin client is a small terminal-like computer that mostly relies on a server for data storage and processing.

A high-availability system continues running and performing tasks for at least 99 percent of the time.

Scalability is a measure of how well computer hardware, software, or an information system can grow to meet increasing performance demands.

Interoperability is the ability for an information system to share information with other information systems within an enterprise.

A disaster recovery plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.

Contains four major components :-
  1.       Emergency plan
  2.       Backup plan
  3.       Recovery plan
  4.       Test plan


Explain 5 types of e-commerce :-

  1.       E-retail – amazon, zalora, lazada
  2.       Finance- Maybank 2 u, CIMB , Hong Leong connect.
  3.       Travel- Air Asia, Trivago , MAS , Expedia
  4.       Entertainment and media- Youtube, itunes
  5.       Health- MOH.gov.my, doctorphil , body building 

CHAPTER-13 COMPUTER PROGRAMS AND PROGRAMMING LANGUAGE

What is computer?
A computer program is a series of instructions that directs a computer to perform tasks. Created by a programmer using a programming language.

Machine language is the first generation of programming languages. Only language the computer directly recognizes.

Assembly language is the second generation of programming languages.

Programmer writes instructions using  symbolic instruction codes.

A source program contains the code to be converted to machine language.

In a procedural language, the programmer writes instructions that tell the computer what to accomplish and how to do it.

The C programming language is used to write many of today’s programs.

COBOL (COmmon Business-Oriented Language) is designed for business applications, but easy to read because of the English-like statements

An object-oriented programming (OOP) language allows programmers the ability to reuse and modify existing objects. For example – java


The Microsoft .NET Framework allows almost any type of program to run on the Internet or an internal business network, as well as computers and mobile devices.


      C++ is an extension of the C programming language
      C# is based on C++ and was developed by Microsoft
      F# combines the benefits of an object-oriented language with those of a functional language.


Visual Programming Language :-

In computing, a visual programming language (VPL) is any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually. A VPL allows programming with visual expressions, spatial arrangements of text and graphic symbols, used either as elements of syntax or secondary notation. For example, many VPLs (known as dataflow or diagrammatic programming) are based on the idea of "boxes and arrows", where boxes or other screen objects are treated as entities, connected by arrows, lines or arcs which represent relations.


PowerBuilder is a powerful program development RAD tool.Best suited for Web-based, .NET, and large-scale enterprise object-oriented applications.


An application generator is a program that creates source code or machine code from a specification of the required functionality.


A macro is a series of statements that instructs an application how to complete a task. You usually create the macro in one of two ways:
      Record the macro with a macro recorder
      Write the macro


HTML is a special formatting language that programmers use to format documents for display on the Web.


XHTML is a markup language that allows Web sites to be displayed more easily on mobile devices.


XML allows Web developers to create customized tags and use predefined tags to display content appropriately on various devices. Two applications of XML are RSS 2.0 and ATOM.


WML is a subset of XML and is used to design pages for micro browsers.


Web 2.0 allows Web sites to provide a means for users to :-
          Share personal information
• Have application software built into the site
• Allow user to modify Web site content

Web page authoring software can create sophisticated Web pages that include images, video, audio, animation, and other effects. For example- Flash, Dream weaver, Expression web


To initiate program development, programmer :-
      Reviews the requirements      Meets with the systems analyst and users      Identifies input, processing, and output 

CHAPTER-12 EXPLORING INFORMATION SYSTEM AND DEVELOPMENT

What is system development ?
System development is a set of activities used to build an information system.

How to operate system development :-
  • ·       Planning- select team , Resource
  • ·       Analysis- user requirement
  • ·       Design- design layout
  • ·       Implementation- testing the system
  • ·       Operation, Support and Security-maintenance , check security, monitor performance.



Project management is the process of planning, scheduling, and then controlling the activities during system development.

Documentation is the collection and summarization of data and information.

The planning phase for a project begins when the steering committee receives a project request.

The analytic phase consist two major activates :-
·       Conduct a preliminary investigation
·       Perform detailed analysis

Process modeling (structured analysis and design) is an analysis and design technique that describes processes that transform inputs into outputs.

An entity-relationship diagram (ERD) is a tool that graphically shows the connections among entities in a system.

A data flow diagram (DFD) is a tool that graphically shows the flow of data in a system
·       Data flows
·       Processes
·       Data stores
·       Sources

The project dictionary contains all the documentation and deliver able of a project.

A decision table is a table that lists a variety of conditions and the actions that correspond to each conditions.

The data dictionary stores the data item’s name, description, and other details about each data item.

Object modeling combines the data with the processes that act on that data into a single unit, called an object.

UML (Unified Modeling Language) has been adopted as a standard notation for object modeling and development.

A use case diagram graphically shows how actors (users) interact with the information system.

A class diagram graphically shows classes and subclasses in a system.

A prototype (proof of concept) is a working model of the proposed system
·       Prototypes have inadequate or missing documentation
·       Users tend to embrace the prototype as a final system
·       Should not eliminate or replace activities

The purpose of the implementation phase is to construct the new or modified system and then deliver it.

Training involves showing users exactly how they will use the new hardware and software in the system ­:-
·       One-on-one sessions
·       Classroom-style lectures
·       Web-based training


The purpose of the operation, support, and security phase is to provide ongoing assistance for an information system and its users after the system is implemented.

CHAPTER-11 MANAGE COMPUTING SECURELY SAFELY AND ETHICALLY



 A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A cybercrime is an online or Internet-based illegal act like :-
  • ·       Hacker-Someone who access a computer illegally.
  • ·       Cracker- Has intention of destroying data, stealing information
  • ·       Script kiddies- Same intention with cracker but does not have skills to use prewritten hacking program
  • ·  Corporate Spies- Someone who is hired to break into specific computer to steal its property data
  • ·      
  • ·       Unethical Employees- Someone break into their employee computer for various reason. Example – feel financial gain from selling
  • ·       Cyber extortionist- Someone who uses email as a vehicle for extorts.
  • ·  Cyber terrorists- Someone use Internet/network/to destroy or damage computers for political reason.


An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

A botnet is a group of compromised computers connected to a network.

A compromised computer is known as a zombie.

A denial of service attack (DoS attack) disrupts computer access to Internet services.

Distributed DoS (DDoS) :-
A back door is a program or set of instructions in a program that allow users to bypass security controls.

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate.

A firewall is hardware and/or software that protects a network’s resources from intrusion.

Organizations take several measures to help prevent unauthorized access and use :-
·       Acceptable use policy
·       Disable file and printer sharing
·       Firewalls
·       Intrusion detection software

Access controls define who can access a computer, when they can access it, and what actions they can take.

Two-phase processes called identification and authentication :-
  • ·       User name
  • ·       Password
  • ·       Passphrase
  • ·       CAPTCHA 

A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer.

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.

Information theft occurs when someone steals personal or confidential information.

Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.

A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender. Often used to ensure that an impostor is not participating in an Internet transaction.

Web browsers and Web sites use encryption techniques

Two ways to protect from system failures caused by electrical power variations include :-
  • ·       surge protectors
  • ·       uninterruptable power supplies (UPS) 

A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. To back up a file means to make a copy of it. Offsite backups are stored in a location separate from the computer site.

Green computing involves reducing the electricity and environmental waste while using a computer.

Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. Huge databases store data online. It is important to safeguard your information.

Spam is an unsolicited e-mail message or newsgroup posting. E-mail filtering blocks. E-mail messages from designated sources. Anti-spam programs attempt to  remove spam before it reaches your inbox.