Friday, June 1, 2007
Friday, May 11, 2007
Modules and Procedures
Apply modular principles and simple parameter-passing.
Resources:
Resources:
- Modules Presentation
- Programming Principles R. and H. Oliver
p53, 55, 58, 61, 66, 68, 70 - Podcasts - Modules Part 1, Modules Part 2, Modules Part 3 and Functions
Simple Problems using array and files
- Apply Pseudocode and Nassi-Shneiderman diagrams to solve simple problems.
- Apply programming to solve simple problems.
- Apply data structures, including simple arrays and records.
Resources:
Podcasts
- Using Files
- Using Files p34
- Using Files p37
- Array Introduction
- Arrays P44 Part 1 and Part 2
- Arrays and Files
Programming Principles R. and H. Oliver
- p34-44, 47, 50, 51
Blackline masters with with algorithm problems - especially for arrays and records
Basic Programming Control Structures
Apply:
· sequence
· selection
· iteration
Resources:
· sequence
· selection
· iteration
Resources:
- Programming chapter from textbook
- Programming Control Structures Presentation
- Podcasts - While(Test First) Introduction, While p9, For (Fixed Rep) Introduction, For p15, Selection IF..Then..Else Introduction, Selection p21, Selection Nested p27
- Programming Principles by R. and H. Oliver
- pages 2,3,5,9,10,11,12,13,15,17,21,22,24,25,27,28
- (Mr McWillam has the algorithm and python programming solutions)
Thursday, May 10, 2007
Programming Lanugages Overview
Define:
· machine code
· assembler languages
· procedural languages
· fourth generation languages (4GL)
Define and compare:
· interpreters
· compilers
Resources:
Programming Chapter from textbook
Languages Terminology Presentation
Software Generations Worksheet
· machine code
· assembler languages
· procedural languages
· fourth generation languages (4GL)
Define and compare:
· interpreters
· compilers
Resources:
Programming Chapter from textbook
Languages Terminology Presentation
Software Generations Worksheet
Languages (Programming) Outline
1. Define:
· machine code
· assembler languages
· procedural languages
· fourth generation languages (4GL)
2. Define and compare:
· interpreters
· compilers
3. Apply:
· sequence
· selection
· iteration
6. Apply Pseudocode and Nassi-Shneiderman diagrams to solve simple problems.
7. Apply programming to solve simple problems.
5. Apply data structures, including simple arrays and records.
4. Apply modular principles and simple parameter-passing.
· machine code
· assembler languages
· procedural languages
· fourth generation languages (4GL)
2. Define and compare:
· interpreters
· compilers
3. Apply:
· sequence
· selection
· iteration
6. Apply Pseudocode and Nassi-Shneiderman diagrams to solve simple problems.
7. Apply programming to solve simple problems.
5. Apply data structures, including simple arrays and records.
4. Apply modular principles and simple parameter-passing.
Tuesday, May 8, 2007
Getting Started with Python
Python is the freely distributed open-source program that we will use for the languages section of this course. It is available for all operating systems. You can download it from here.
Python Review 1 - Handouts Page 1
Python Review 2 - Data types
There are some nice getting started instructions at http://challenge.ncss.edu.au/gsg-windows/. (Note: The download link on this page doesn't work. Use the one above)
Python Review 1 - Handouts Page 1
Python Review 2 - Data types
There are some nice getting started instructions at http://challenge.ncss.edu.au/gsg-windows/. (Note: The download link on this page doesn't work. Use the one above)
Thursday, May 3, 2007
Questions for the Teleconference
In this document have put answers and/ or links to place to find information for each of these questions.
Ms. Olson
Ms. Olson
Monday, April 30, 2007
Want to get this videos on your computer?
Subscribe to my podcast on iTunes.
You can search on iTunes for Information Systems 12. However, I find searching on iTunes can take a long time. The quicker way is to use the Advanced Menu and subscribe using the feed below.
http://www.yapiodesign.com/krisolson/Information_Systems_12feed.xml
I left small mistakes in the Podcasts so that you can see that everyone makes syntax and logic errors. The trick is to find the errors and fix them. Determination and persistence are very admirable qualities when debugging programs.
You can search on iTunes for Information Systems 12. However, I find searching on iTunes can take a long time. The quicker way is to use the Advanced Menu and subscribe using the feed below.
http://www.yapiodesign.com/krisolson/Information_Systems_12feed.xml
I left small mistakes in the Podcasts so that you can see that everyone makes syntax and logic errors. The trick is to find the errors and fix them. Determination and persistence are very admirable qualities when debugging programs.
Monday, April 23, 2007
Normalisation
Read handouts p. 211-216 and the "High Tech Talk" section at the end of Chapter 10 from your text book.
View video podcast. The podcast example is based on Exercise #1 at http://cs.senecac.on.ca/~dbs201/pages/Normalization_Practice.htm
Complete review exercises 10.1 & 10.2 from your handouts
View video podcast. The podcast example is based on Exercise #1 at http://cs.senecac.on.ca/~dbs201/pages/Normalization_Practice.htm
Complete review exercises 10.1 & 10.2 from your handouts
More on the Relational Model
Handouts p60-70.
Be sure you understand notation for relations p. 66
Pay particular attention to knowing the following terms (most of which we have already discussed.
Be sure you understand notation for relations p. 66
Pay particular attention to knowing the following terms (most of which we have already discussed.
- relation
- entity
- table
- tuple
- attribute
- composite key
- primary key
- foreign key
Entity Relationship Diagrams
Framework for data modeling (Handouts p 13 and 17)
Review Suggested Standards
Introduction to E-R Diagrams
Cardinality
Handouts p. 27-32 Types of Relationships
Review questions: 2.2, 2.7, 2.12
Handouts p. 48 - 53 Examples of Data modeling
Resolving M:N Relationships
Review Exercises: 2.1, 2.3,2.4 (E-R only), 2.5 (E-R only), 2.6
Challenge Problems 2.1, 2.2 , 2.3, 2.4
Review Suggested Standards
Introduction to E-R Diagrams
Cardinality
Handouts p. 27-32 Types of Relationships
Review questions: 2.2, 2.7, 2.12
Handouts p. 48 - 53 Examples of Data modeling
Resolving M:N Relationships
Review Exercises: 2.1, 2.3,2.4 (E-R only), 2.5 (E-R only), 2.6
Challenge Problems 2.1, 2.2 , 2.3, 2.4
Microstar Relationships
Supplier Stock Problem
Complete Ch8 Microstar Materials covering Relationships
Complete Ch8 Microstar Materials covering Relationships
Monday, April 9, 2007
Data Topics
This video shows a flat file database and examines database terminology related to it.
- Data duplication: data repeated in a table
- Data redundancy: the unnecessary duplication of data
- Data integrity: the accuracy or correctness of data
- Table/ Entity / Relation: a cluster of data representing one thing stored in rows and columns
- Row/Record/Tuple: collection data stored about one item in the table/ entity/ relation
- Column/Field/ Attribute: the facts stored in each record
- Primary Key: unique identifier for each record
- Foreign Key: field in a table that matches a primary key in another table allowing the tables to be joined
- Insertion Anomalies: The inability to add information to a database because extra data is required to add it to the database (in our example - we couldn't add supplier details before receiving a movie)
- Update Anomalies: changes must be made in multiple locations (in our example: if a supplier moved the address would need to be changed in many records)
- Deletion Anomalies: deleting a row causes other data to be deleted (in our example: removing a movie causes supplier details to be deleted)
Friday, March 23, 2007
Tuesday, March 20, 2007
Trevor's Tips - System Building Project- Communications
You have been hired by Trevor's Tips as an Information and Communications specialist to set up an illegal betting system. Trevor plans to hire the following staff
Task 1
Trevor's first task for you is to draw an annotated diagram showing how all the computers will be networked and identify communications equipment needed for this. Trevor would like to host the web site at his secret location as opposed to hosting it at an ISP. The betting system will contain lots of confidential data such as client names and credit card numbers. He would also like the diagram to address the following security issues:
Task 2
Trevor is very concerned about computer viruses, worms, trojan horses and spyware. He would like you to explain the difference between each of these and propose a company policy to prevent company problems due to them.
Task 3
Although your network diagram addressed the issue of unauthorised access from external sources (hacker/ cracker), Trevor is worried that some of his employees may access information (such as credit card numbers) and steal them. Identify what access controls are and how they can be used to secure confidential data internally.
Task 4
Loss of laptops has lead to the loss of confidential information in a number of organisations. Trevor would like you identify and describe three measures you would recommend that would recommend that would keep confidential information private even if a laptop containing confidential information was lost or stolen.
Task 5
Some clients may want to email their betting information to Trevor's Tips. Describe and recommend a system that will keep this information secure.
- a secretary to do administrative work such as write letters and memos
- ten data entry operators to enter phone wagers
- five sports analysts to analyse the various sporting events, set the odds and enter this data into the sports database
- a web designer to create the web interface for internet betting.
Task 1
Trevor's first task for you is to draw an annotated diagram showing how all the computers will be networked and identify communications equipment needed for this. Trevor would like to host the web site at his secret location as opposed to hosting it at an ISP. The betting system will contain lots of confidential data such as client names and credit card numbers. He would also like the diagram to address the following security issues:
- loss of data due to hardware failure
- loss of confidential data due to external intrusion
- information theft due to interception of wireless transmission
Task 2
Trevor is very concerned about computer viruses, worms, trojan horses and spyware. He would like you to explain the difference between each of these and propose a company policy to prevent company problems due to them.
Task 3
Although your network diagram addressed the issue of unauthorised access from external sources (hacker/ cracker), Trevor is worried that some of his employees may access information (such as credit card numbers) and steal them. Identify what access controls are and how they can be used to secure confidential data internally.
Task 4
Loss of laptops has lead to the loss of confidential information in a number of organisations. Trevor would like you identify and describe three measures you would recommend that would recommend that would keep confidential information private even if a laptop containing confidential information was lost or stolen.
Task 5
Some clients may want to email their betting information to Trevor's Tips. Describe and recommend a system that will keep this information secure.
Thursday, March 15, 2007
Online OSI Quiz
The OSI model is a framework for defining communication standards. You should read the hand out from your teacher and the High Tech Talk at the end of Chapter 9.
This quiz may help you check your understanding - http://gocertify.com/quizzes/osi/
- Be able to identify and describe each of the layers i.e. Layer 7 is the Application Layer. The application layer provides network services to user applications.
- Be able to identify protocols operating at each layer i.e. Layer 7/ Application Layer - File Transfer Protocol (FTP), Hypertext transfer protocol (HTTP) etc
- Be able to identify hardware devices defined at each layer i.e. Layer 3 / Network Layer - Routers (forwards packets along optimal path)
This quiz may help you check your understanding - http://gocertify.com/quizzes/osi/
Computer Ethics
Computer Ethics covers the area of moral guidelines that govern the use of computers. Consider each of the following situations and decide whether you believe the company made an ethical decision.
- Your company digitally manipulated photos in their brochure.
- Your company has a department to handle customers who feel that data that you hold in your database of customers is incorrect.
- Your web designer copied the html of a competitor's web site, modified it and used it for your company web site.
- A song created specifically for commercials for your company has been swapped on bit torrent.
- Someone posted your company's commerical on YouTube.
- A clever employee has used data collected from an online form at your web site to identify customers who are unlikely to pay their debts to you.
- An employee lost a laptop with 200 employees data on it including names, phone numbers, tax file numbers, other payroll information.
- Another enterprising employee wants to sell customer data including names and addresses to a marketer.
- Your company web site uses cookies to track user preferences and passwords.
- Your company provides free software to customers to facilitate online purchases. However, hidden in that software is a program that tells you what other web sites they visit.
- Your company sends out email to customers advising them of new products.
- Your company puts RFID tags in your name tag to allow them to track your whereabouts at all times.
- Installed on your company computer is software that allows your boss to view your desktop at any time to see what you are doing.
- Your company uses a proxy server that filters incoming web traffic allowing employees to view only certain web sites.
Computer Security
Computer Security Risks
- any event or action that culd cause a loss of or damage to computer hardware, software, data, information or processing capability
- accidental and deliberate
- common security risks include viruses, worms, trojan horses, unauthorised access and use, hardware theft, software theft, information theft and system failure
- How Stuff Works and you textbook give excellent descriptions about the differences between each of these and how businesses can safeguard their network against them
- use of a computer network without permission
- hackers/crackers are those individuals who access a computer or network illegally
- common safeguards include firewalls, IDS, access controls
Hardware Theft
- Firewalls may be hardware or software systems that restrict incoming and outgoing traffic. (Mr McWilliam will show you a short animated movie about this)
- IDS stands for intrusion detection software. This is a type of software that analyzes all network traffic and notifies network administrators of any suspected system breaches.
- Access controls limit internal and external access to data and systems. The most common access control is the use of user names and passwords. Access to data and systems should be limited to only those individuals who require it to limit accidental or intentional security breaches. Example: Census Bureau EBay customer database . Access controls can specify who can read, write or modify based on user name. Other access controls include possessed objects, biometric devices and call back systems.
Software Theft
- stealing of computer equipment
- can result in the loss of data as well. example: Florida dept of tranportation
- controls include mostly physical controls such as locked doors, locked windows, cables
Information Theft
- organisations need to ensure that all software used in the organisation is covered by a license agreement. Generally most licenses are for only a single user. However, some software manufacturers offer site licenses.
- theft of personal or confidential information
- one of the top threats facing corporate America
- Encryption is the best safeguard. Encryption converts readable data to unreadable data.
- A common form of encryption is public key (asymmetric) encryption which allows senders to encrypt using a public key and receivers decrypt using a private key. Pretty Good Privacy (PGP) is a common public key encryption service and is used for things like email.
- TrueCrypt is a nice open source symmetric key encryption system that can be used to encrypt storage devices like hard drives. (If a corporate hard drive is stolen, customer private data can not be read from the drive)
- Encryption is used extensively on the internet to protect data traveling over the public network. Examples include Virtual Private Networks to create secure connections, digital certificates to authenticate users, SSL and SHTTP which encrypt data between a client and server,
Tuesday, March 13, 2007
Communications Research Assignment
Part I (28 points)
Part II (28 Marks)
Your employer has previously externally hosted their web site. You have been asked to create an analysis of broadband options that would improve connection speeds and allow the business web server to be on site. Research and compare four of the the following internet connection options in Australia in terms ISP, upload speed, maximum download speed, cost, regional availability, download allowance, and other relevant factors (provide a hyper link to the information source)
You have started work as the IT manager for a new business wants to have a big web presence. The owner of the business has asked you to research DDOS (Distributed Denial of Service) ransom attacks like the one described in this article. A colleague has recommended a podcast , Security Now # 8 DDOS Attacks, done by security expert Steve Gibson. Transcripts of all of Steve's podcasts and links to other interesting information are at http://www.grc.com/securitynow.htm.
You are required to create an annotated diagram(s) that show how DDOS attacks occur. You must show at least the following in your diagram and annotate the diagram with definitions/ descriptions of each.
web server
zombie
zombie fleet/ bot army
zombie master
malware
router
spoof
IP Address
web Client
bandwidth
packet
source IP
destination IP
dropped packet
Part II (28 Marks)
Your employer has previously externally hosted their web site. You have been asked to create an analysis of broadband options that would improve connection speeds and allow the business web server to be on site. Research and compare four of the the following internet connection options in Australia in terms ISP, upload speed, maximum download speed, cost, regional availability, download allowance, and other relevant factors (provide a hyper link to the information source)
- ISDN
- ADSL
- other DSL
- Fibre
- Cable
- Wireless Broadband
- Satellite
Ethernet
Listen to the first 20 minutes of Security Now Podcast about Ethernet and answer the following questions. You can access this at school. See your teacher to access it. Alternatively, you can download it at http://media.grc.com/sn/SN-029.mp3. When they reference social security number, you need to think tax file number.
What is a MAC address? Why is it unique?
Why can't they be used as addresses in a WAN instead of IP addresses?
In the original bus network connected by coaxial cable what was at each end?
How were computers connected to the bus network at that time?
What was one of the big draw backs with that type of network?
Identify and describe the other LAN technology available at that time.
What does CSMA/CD stand for?
How does it work?
Why do collisions occur?
What happens if a collision occurs?
Why don't token ring networks have collisions?
What happens as the amount of LAN traffic increases?
Describe hubs (how they are used and their drawbacks) - BUS NETWORK
Describe switches (how they are used and their drawbacks) - STAR NETWORK
Hubs and switches both have a physical topology of the star network. However, hubs are considered logical bus networks - Why?
NOTE: a term that we haven't covered but you need to know is Bridge.
Bridges are devices used to connect two local area networks using the same protocol- Ethernet or Token Ring
What is a MAC address? Why is it unique?
Why can't they be used as addresses in a WAN instead of IP addresses?
In the original bus network connected by coaxial cable what was at each end?
How were computers connected to the bus network at that time?
What was one of the big draw backs with that type of network?
Identify and describe the other LAN technology available at that time.
What does CSMA/CD stand for?
How does it work?
Why do collisions occur?
What happens if a collision occurs?
Why don't token ring networks have collisions?
What happens as the amount of LAN traffic increases?
Describe hubs (how they are used and their drawbacks) - BUS NETWORK
Describe switches (how they are used and their drawbacks) - STAR NETWORK
Hubs and switches both have a physical topology of the star network. However, hubs are considered logical bus networks - Why?
NOTE: a term that we haven't covered but you need to know is Bridge.
Bridges are devices used to connect two local area networks using the same protocol- Ethernet or Token Ring
Friday, March 9, 2007
Chapter 9 - Communications and Networks
Read Chapter 9 Communications and Networks and answer the following questions.
What is the difference between an analog signal and a digital signal? explain using both text and a diagram.
What is VOIP?
What are the five reasons businesses use a network?
What is the difference between a LAN, a MAN and a WAN?
What is a client/server network? (define server and client in your answer)
What is a peer-to-peer network?
Is a business that has 200 computers likely to use a client/ server or a peer-to-peer network? (explain your answer)
What is internet peer-to-peer?
Using words and diagrams describe each of the following topologies - bus, ring, and star.
Describe each of the following communication technologies - Ethernet (802.3), Token Ring, TCP/IP, 802.11, Bluetooth, IrDA, RFID, WAP,
Briefly describe each of the types of communication over telephone lines.
Briefly describe the various communication devices.
What is a router?
What is noise?
What is attenuation?
What is bandwidth?
If you have not done so already - create a chart that identifies each transmission media (physical and wireless), a brief description of it, its transfer speed, and advantages/ disadvantages associated with each.
What is the difference between an analog signal and a digital signal? explain using both text and a diagram.
What is VOIP?
What are the five reasons businesses use a network?
What is the difference between a LAN, a MAN and a WAN?
What is a client/server network? (define server and client in your answer)
What is a peer-to-peer network?
Is a business that has 200 computers likely to use a client/ server or a peer-to-peer network? (explain your answer)
What is internet peer-to-peer?
Using words and diagrams describe each of the following topologies - bus, ring, and star.
Describe each of the following communication technologies - Ethernet (802.3), Token Ring, TCP/IP, 802.11, Bluetooth, IrDA, RFID, WAP,
Briefly describe each of the types of communication over telephone lines.
Briefly describe the various communication devices.
What is a router?
What is noise?
What is attenuation?
What is bandwidth?
If you have not done so already - create a chart that identifies each transmission media (physical and wireless), a brief description of it, its transfer speed, and advantages/ disadvantages associated with each.
Wednesday, March 7, 2007
Tuesday, March 6, 2007
The Internet
To cover the content for this you will need to read Chapter 2 "The Internet and World Wide Web" from your text book, Discovering Computers 2006, and listen to about 1.5 hours worth of podcasts. The first podcast is called the Internet - click here for jargon, slides, video version and/or audio version. You can skip the first 30 minutes or so. Three other podcasts that are helpful include Web Servers (Quicktime format, Flash Format), TCP/IP (Quicktime format, Flash format) and HTTP (Quicktime format, Flash format)
These podcasts can be listened to at school. They also can be taken home or downloaded at home. You need to answer the following questions.
What is the Internet?
What are the different ways a person can connect to the Internet?
What is an access provider?
Describe three types of service providers.
Draw an annotated diagram showing how a student accesses a web page.
Define the following terms- IP Address, domain name, top-level domain
What is the DNS and why is it important?
Do the terms WWW and Internet mean the same thing?
What other services are available on the Internet besides the WWW?
Describe the difference between a peer-to-peer network and a client-server network architecture.
In using the WWW describe the client and the server relationship?
In using the WWW what software is commonly the client? What software is commonly the server?
What are the protocols for web page browsing, outgoing mail servers, incoming mail servers, web mail servers, uploading files,?
Is this a distributed or centralised processing environment? Support your answer.
Can ISPs or other servers read you Internet transmissions - email, instant messages, web pages viewed?
What is a LAN?
What is a WAN?
What is the major difference between them?
What is the difference between http and html?
Write an URL and identify the domain name, top-level domain, protocol, directory/ folders and resources/ file accessed.
What is FTP used for?
What is the difference betweeen http and https?
Find out the IP address of the GSC website - www.gsc.wa.edu.au
Go to the Traceroute tool and trace to the IP address of the school website from someplace in the US - what does each line represent?
If you run it again is it exactly the same?
Trace from someplace other than the US.
Subscribe to:
Posts (Atom)
