53
1 Review For Final © Abdou Illia (Summer 2010)

1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

1

Review For Final

© Abdou Illia

(Summer 2010)

Page 2: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

2

Computer Hardware

Page 3: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

3

The Core Computer Components

Four subsystems in a computer system:1. Input subsystem 3. Output subsystem2. Processing subsystem 4. I/O (Storage) subsystem

InputProcess

Output

Input/Output (storage)

Page 4: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

4

Output Devices Monitors

Cathode ray tube (CRTs) Liquid crystal displays (LCDs) Quality of display

Resolution (width and height in pixels); e.g. 640 x 480) Dot pitch in millimeters (e.g. .25, .26) Active-Matrix vs. Passive-Matrix display

Touch screens Input and output via display device

Video Card Common resolutionColor Graphics Adapter CGA (1981) 640×200

Hercules (1984) 720×348

Extended Graphics Array XGA (1990) 1024×768

Super XGA 1280×1024

Ultra XGA 1600×1200

Page 5: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

5

Printers Speed and resolution

Pages per minute (PPM) Dots per inch (DPI)

Number of ink dots to fill a square inch Higher DPI = greater page clarity

Impact printers Create image by striking paper and ribbon Dot-matrix printers = most common impact printers

Non-impact printers Create image by spraying or rolling ink on the page

Page 6: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

6

I/O or Secondary Storage devices

Secondary compared to the main primary memory called RAM Nonvolatile1 storage of digital data Could be Magnetic or Optical Magnetic storage (i.e. data stored on magnetically coated

surface) Examples: Magnetic tape, Hard disk, floppy disk Sequential access (e.g. tape) or direct access (e.g. HDD) Hard disk disks

many standards: Parallel ATA (PATA) or IDE (Integrated Drive Electronics) Serial ATA (SATA)2

SCSI (Small Computer System Interface) SCSI provides disk fault-tolerance by using RAID – Redundant Array of

Inexpensive Disks; that is multiple disks set together to provide continued service in case one disk fails.

Disk speed: Transfer rate in MBps (Megabytes per second) Average Read Time (in milliseconds or ms) Platter rotation speed in RPM (5400/7200/10,000/15,000)

1. Means that the stored data wouldn’t disappear (or be deleted) in case of power shortage2. In SATA and PATA, ATA stands for Advanced Technology Attachment

Page 7: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

7

Measuring Storage Capacity

Page 8: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

8

Processing subsystem Motherboard: chipset that all components connect to

Two major components in processing subsys. CPU (Central Processing Unit) or Processor(s) Primary Storage:

Random Access Memory (RAM) Read Only Memory (ROM)

Busses that transfer data

CPU

Primary Storage

Othercomponents

on the Motherboard

Page 9: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

9

Central Processing Unit

Clock: generate time that synchronize other components

ICU: Fetches instructions from RAM

ALU: Execute instructions (arithmetic & logic operations)

Registers: Store control information, data, intermediate results

Processor

Clock

Instruction Control Unit

Arithmetic Logic Unit

Registers

Page 10: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

10

CPU speed Speed measured in hertz

Hertz = # of instructions executed per second Megahertz = 1 million of instructions per second Gigahertz = 1 billion of instructions per second

Speed is also measured in FLOPS* … especially in fields of scientific calculations where long divisions

called Floating point divisions are used.

Intel- Celeron

- Pentium 3, Pentium 4, Pentium 4 Xeon, Dual Core

Advanced Micro Devices (AMD)

- K6 series processors (which compete with Intel Pentium 3)

- Athlon series (which compete with Intel Pentium 4)

IBM

- PowerPC 740, 750, 750FX, 750GL, 750GX

Major Processor manufacturers

*FLoating point Operations Per Second

Page 11: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

11

Primary Storage

RAM holds running programs and the data they use

ROM contains critical programs such as those that boot the computer

Primary Storage

RAM

ROM

Computer’s memory stored on semiconductor chips Two categories:

RAM (Random Access Memory) which is volatile Synchronous Dynamic RAM (SDRAM) Double Data Rate SDRAM or DDR SDRAM

ROM (Read-Only Memory) which is non-volatile

Capacity in Megabytes (MB) or Gigabytes (GB)

Program Data

Page 12: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

12

Summary QuestionsBook Notes

1) Name two devices that could be used for both input and output.

2) What is the difference between: (a) a Kilobyte and a Gigabyte? (b) a Megabyte and a byte?

3) What is the function of the Instruction Control Unit or ICU found in the processing subsystem?

4) Explain the difference between RAM and ROM.

5) What is pixel? What is dot pitch

6) What is a byte?

7) What is a Hertz?

Page 13: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

13

Network Technology

Page 14: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

14

Computer Network An interconnection of computers and

computing equipment using either wires or radio waves over small or large geographic distances

“Connect to GHI”ABC

DEF GHI

JKLMNO

Once connected to the network, the computer (or another device) becomes a network node

Page 15: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

15

Transmission Media Physical media

Transmission media used to physically connect nodes in to the network

Transmits electrical or optical signals Could be cooper wire or fiber optic cable

Physical

Wireless

Page 16: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

16

Transmission Media (Continued) Twisted Pair

Category Use Signal Data rate Distance Problem

Category 1 Telephone Analog/Digital <100Kbps 3-4 miles Security, noise

Category 2 T1, ISDN Digital <2 Mbps 3-4 miles Security, noise

Category 3 LANs Digital 10 Mbps 100 m Security, noise

Category 4 LANs Digital 20 Mbps 100 m Security, noise

Category 5 LANs Digital 100 Mhz 100 m Security, noise

Category 6 LANs Digital 250 Mhz 100 m Security, noise

Category 7 LANs Digital 600 Mhz 100 m Security, noise

Page 17: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

17

Wireless Media Uses electromagnetic waves or electromagnetic radiation for

data transmission Propagation through space, and indirectly, through solid objects Two kinds of wireless media used

Radio waves (radio Frequency) Affected by Multipath interference Highly vulnerable to snooping Limited distance Blocked by thick objects

Infrared light Close proximity and “line of sight” location required

LaptopComm. Tower

Page 18: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

18

Network Topologies The configurations of network components

How physically the network looks like How logically data is transferred on the network

Widely used network topologies: Bus Star Ring

Page 19: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

19

Bus Network Topology Most simple network topology All devices connected to a common central

cable called a “bus” Inexpensive If cable fails, the entire network will shut

down

Page 20: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

20

Star Network Topology Centered around

central device called a hub or a switch

All network nodes connect to the hub/switch

Easy to install and update

If hub fails, network fails

Page 21: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

21

Ring Topology

Node connected to a logical ring in a central device called MAU

More reliable than bus or star Only one node sends at a

time (no collisions)

Expensive and limited speed

Page 22: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

22

Network Architecture

Defines how the processing takes place on the network

Two primary types Client-server Peer-to-peer (P2P)

Page 23: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

23

Summary Questions

Malaga Notes

1) What is a node?

2) Name physical and wireless media used in networking

3) What transmission media is used for the telephone?

4) What are the main network topology? What are the differences between them?

5) Distinguish between Client-server and P2P networks

Page 24: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

24

The Internet and eBusiness

Page 25: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

25

Brief history of the Internet

1969 The Defense Advanced Research Projects developed ARPANET, the precursor of the Internet

1971 Ray Tomlison invents e-mail

1979 USENET newsgroups created at Duke University and the University of North Carolina

1984 Domain Name System (DNS) established

1991 Tim Berners-Lee creates the World Wide Web

1994 First online shopping mall, first spam email, first pizza ordered online, first advertisement banner

2000 A major denial of service attack brings down websites such as Yahoo!, Amazon.com, and eBay

2002 Denial of service attack knocks out 8/15 root DNS servers

Make sure you know what DNS is used for.

Page 26: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

26

Webserver needs:- Network (or Server) Operating System- TCP/IP- Domain name (e.g. eiu.edu)- Internet access - IP Address (e.g. 139.67.8.3)

User PC needs:- Workstation Operating System- TCP/IP- Web browser (e.g. Internet Explorer)- Internet access (e.g. thru an ISP)- IP Address (e.g. 128.150.50.9)

Accessing the Internet (www)

NetworkWeb

Browser

Packet

Router

Packet

Route

WebserverSoftware

Page 27: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

27

Internet applications/services E-Mail File transfers Instant messaging (IM) Newsgroups Streaming audio and video Internet telephony World Wide Web (WWW) Portal

Page 28: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

28

Intranets and Extranets Intranet

Internal company network that uses Internet and WWW technologies.

Typical Use: Finding and sharing work documents Collaboration between employees to work in teams Communication tool

Typically, only internal employees can get access

Extranet Web site that allows customers and business

partners limited access to organizational intranet Uses Internet and WWW technologies Add additional security through the use of a

Virtual Private Network (VPN)

Page 29: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

29

Portal Portal

Web site that offers a broad array of resources and services; such as

email newsgroup Serach engines Online shopping malls

Example: yahoo!, msn, aol

Page 30: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

30

Summary Questions

Refers to the slide # in class posted notes

Book Notes

1) (a) Name some Internet applications/services (b) What is Instant Messaging?

9,14,

2) (a) What does a user PC needs for accessing the World Wide Web? (b) What is needed on the webserver side?

7

3) Name some Internet connection options available for residential users and businesses.

5-6

4) (a) What is an intranet? (b) an extranet? 18,19

Page 31: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

31

Managing Security

Page 32: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

32

Best way to prepare Review the ppt notes or chapter 7, 12 in the

book to make sure you can answer the following questions Security Review Questions available in the Final

Review section of course web site Security Questions in Quiz 1

Page 33: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

33

Managing the Development and

Purchase of IS

Page 34: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

34

Systems Development Methodology? The process companies go through to

develop and maintain an information system Framework for successful IS development A System Development Methodology is used

For building a new system Or for modifying an existing system

Examples of SDM: System Development Life Cycle ■ Prototyping Joint Application Development ■ Rapid Application Development

Page 35: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

35

Questions Which of the following is true about SDM?

1) They provide guidelines for developing IS and maintaining them which includes upgrading and improving them.

2) SDM are needed when a brand new IS has to be developed, but you don’t need to use a SDM when it comes to modifying an existing IS.

3) When a company is engaged in developing an IS, the process involves the company’s employees who would be the future users of the IS, and IS professionals like system analysts and programmers. But it doesn’t involve the company’s management

4) All of the above

Page 36: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

36

Traditional Systems Development Life Cycle (SDLC)

Seven phases 1) Planning 5) Testing2) Systems Analysis 6) Implementation3) Systems Design 7) Maintenance4) Development

Typically one phase needs to be completed before beginning the next

Problem in later phase may require return to previous phase

Planning

Analysis

Design

Development

Testing

Implementation

Maintenance

Page 37: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

37

Question

In SDLC, the 7 phases are typically followed in a sequential order, which means we don’t return to a previous phase in any circumstances

True False

Page 38: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

38

Planning Feasibility analyses

Technical Analysis Do the technologies exist to develop the system?

Economic Analysis Can the organization afford the system? Will it provide an adequate Benefit?

Operational Analysis (i.e. assessing the human element of the proposed system)

Resistance to change Organizational politics

System development schedule Is the proposed development time line realistic? Is the programming team available during Programming

step? Planning performed by Project Manager using

Search and investigation (e.g. for technical analysis step) Total Cost of Ownership analysis Project Management software

Feasibility Analyses

System Development Schedule

Page 39: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

39

Systems Analysis Systems analyst works with company to understand

the problem fully and to detail the requirements of the proposed system

Step 1: Analyze current system Objectives:

Understand what things are done and how (business processes) Identify any problems associated w/ current business processes

Techniques: Observe employees at work Talk to employees (potential users) Conducting interviews

Analyze current system

Define new system requirement

Page 40: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

40

Systems Analysis Step 2: Define new system’s requirements

Main Objective: Specify What need to be done (not how to do it)

To be defined: Input requirements (nature of data, source, etc.) Processing requirements Output requirements (Types of reports, content, etc.) Storage requirements

Tools and techniques Data flow diagrams (DFD)

Start with high level process Add more levels with increased levels of detail

Computer-Aided Software Engineering (CASE) tools Software that eases the systems development process

Analyze current system

Define new system requirements

Page 41: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

41

Data Flow Diagrams (DFD)

Data flow

Process

External Entity

Data storage

. Symbolized by an arrow.

. Shows data being passed from or to a process

. Symbolized by a rectangle or a curved rectangle.

. Action performed by people of organizational units in order to transform input into output OR Action performed by people in the organizational units to help the units achieve their objectives

Symbolized by a square, an external entity is something (person, group, department, etc.) outside the system that interacts with the system by providing input or receiving information.

Used to store data in the system. Represents a file, a database, etc.

Page 42: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

42

Systems Design Using the requirements from Systems Analysis phase

to design the new or modified system. Logical systems design

Details the system’s functionality (what it should do?) Uses Structure charts to create top-down representation of

system’s modules Uses System flowcharts to show relationships between modules

Physical systems design Specifies all of the actual components (hardware, network, etc) used

to implement the logical design The design must be frozen at end of this phase to prevent the

to system grow indefinitely in terms of its scope and features Scope creep Feature creep

Performed by system designer or (system analyst in some case)

Page 43: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

43

Development Programming process is usually the most

difficult and time consuming in the Development process.

Development performed by programmers, database developers, and network engineers

Programmers use Program Development Cycle

1) Review the input, processing, output, and storage requirements2) Develop the logic of the programs (using Flowcharts and Pseudo code)3) Write the programs using code generators & programming languages4) Test and debug the programs5) Complete the programs documentation

Page 44: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

44

Development tools

Program Flowchart:

Graphical illustration of the problem-solving logic

within a programPseudocode:

English-language statements that describe the processing steps of a

program in paragraph form.

Programming languages:-Java-C++-Visual Basic-Etc.

Code generators:Software that generate programs that programmers could modify.

Page 45: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

45

Testing Programmers test modules

Do they return proper outputs? Do they handle incorrect data appropriately?

Development team do unit testing i.e. testing how modules work together

System testing (software along with database and network component)

Verification: Testing system in simulated environment with simulated data

Validation: Testing system in real working environment with real data

Page 46: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

46

Implementation Implementation strategies

Direct cutover: Quick change to new system

Parallel conversion: Old and new systems used in parallel for a while.

Pilot testing: New system installed at only one location or one department

Staged conversion: Only one part of the system installed, then another part is installed.

User training

Page 47: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

47

Maintenance Maintenance counts for as much as 80%

of the total cost of an information system Tasks

Correct errors found during implementation System enhancements

Incremental upgrades Addition of major new features

Page 48: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

48

Summary QuestionsBook Notes

1) What is a System Development Methodology? What is it used for?

2) What are the 7 phases of the SDLC methodology?

3) What kind of Feasibility analyses need to be performed during the Planning phase? Why is the system development schedule important?

4) What are the two steps in the Systems Analysis phase? What techniques and tools are used during the Systems Analysis phase?

5) What tools do programmers usually use during the Development phase?

6) What is the difference between the Verification and the Validation tests performed during systems testing?

Page 49: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

49

Questions During what SDLC phase software programs like

Microsoft Project could be used?a) Maintenanceb) Implementationc) Developmentd) System Analysise) Planning f) None of the above

Which of the following tools or techniques could be used during the System Analysis phase of the SDLC? (Choose all correct answers)

a) Interviewsb) Observing future users doing their jobc) Using pseudocoded) Using software programs to draw data flow diagramse) All of the above

Page 50: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

50

Questions What kind of feasibility analysis seeks to determine if an

organization can afford the new information system and if the system will provide the adequate benefits?

a) Operational Feasibilityb) Financial Feasibilityc) Economic Feasibilityd) Beneficial Feasibilitye) None of the above

During the Development phase of a new medical IS, the development team finds out that most of the technologies needed to develop and implement the system are not yet available on the market. At what step of the SDLC that kind of problem should have been identified?

a) Maintenanceb) Implementationc) Developmentd) System Analysise) Planning f) None of the above

Page 51: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

51

Questions During what phase of the SDLC the Database

component of a new system is created?a) Maintenanceb) Implementationc) Developmentd) System Analysise) Planning f) None of the above

During what phase of the SDLC code generators could be used?

a) Maintenanceb) Implementationc) Developmentd) System Analysise) Planning f) None of the above

Page 52: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

52

Questions The implementation strategy in which the old

system is immediately replaced by the new one is called:

a) Staged conversionb) Direct cutoverc) Systematic testingd) None of the above

Validation testing performed during the Testing phase of the SDLC ensures that the system is working properly in the real working environment using real data.

a) Trueb) False

Page 53: 1 Review For Final © Abdou Illia (Summer 2010). 2 Computer Hardware

53

SDLC: RecapSteps Key actors Tools/Techniques

1. Planning Project Manager Project Management software, Total Cost Ownership analysis, etc.

2. System Analysis System Analyst, Users. Interviews, observing users at work, DFD

3. System Design System analyst (or system designer)

System Flowchart, Structure chart

4. Development Programmers, database developers, network engineers

Program Flowchart, Pseudo code, programming languages, DBMS

5. Testing Development team, Users Unit testing, verification, validation

6. Implementation Development team, Users Direct cutover, parallel conversion,pilot testing, staged conversion

7. Maintenance internal IS staff, external consultant

Make sure you can answer questions about System Development (see SDM Quest link in Review section)