Welcome to CMPE003 Personal Computers

Download Report

Transcript Welcome to CMPE003 Personal Computers

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz
Class Information

Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)
No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26

November 25, 2002
2
Final Project

Due by December 3rd, at beginning of final
period
– May be turned in earlier 

Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..
– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002
3
Midterm #3
Review
November 25, 2002
4
Security and Privacy:
Computers and the Internet
Chapter 11
Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files
November 25, 2002
6
Data, not equipment (cont)
Ways to secure data





Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files
November 25, 2002
7
White-hat hackers


Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing



Tiger teams
Intrusion tester
White hat hackers
November 25, 2002
8
Computer Crimes

Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware

Data diddling
– Changing data before or as it enters the system

Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously
November 25, 2002
9
Computer Crimes

Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 

Scavenging
– Search garbage and recycling bins for personal information

Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program

Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time
November 25, 2002
10
Computer Crimes

Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported

Prosecution
– Legal representatives lack technical knowledge
to understand the crime
November 25, 2002
11
Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage




Natural disasters
Fire
Accidents
Vandalism
November 25, 2002




Theft
Theft or destruction of
data
Industrial espionage
Hackers
12
Security
Identification and Access


Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..
– What you know
• Password, PIN number
– What you do
• Signature
– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002
13
Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet
Encryption
Data Encryption Standard (DES)
November 25, 2002
14
Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction
November 25, 2002
15
Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year
November 25, 2002
16
Backup
What Can Cause Data Loss?





Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…

Virus infection
November 25, 2002
17
Viruses
 Illicit
instructions that pass themselves
on to other programs
– Benign
– Damaging to computer
 Digital
November 25, 2002
vandalism
18
Viruses
Vaccine or antivirus software



Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly
November 25, 2002
19
Viruses

Retrovirus
– Fights the vaccine and may delete the antivirus
software

Costs
– Billions of dollars a year
– Aggravation to individual users
November 25, 2002
20
Virus
Getting Infected




Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents

By viewing e-mail in some versions of Microsoft
Outlook
November 25, 2002
21
Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?

Everything about you is in at least
one computer file
November 25, 2002
22
Privacy
Monitoring by Web Sites
Records:





City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view
November 25, 2002
23
Privacy
Monitoring by Web Sites
Cookies



Stores information about you
Located on your hard drive
Beneficial uses
– Viewing preferences
– Online shopping
– Secure sites retain password in cookie

Controversial use
– Tracking surfing habits for advertisers


Can set browser to refuse cookies or warn before
storing
Software available to manage cookies
November 25, 2002
24
Word Processing
and
Desktop Publishing:
Printing It
Chapter 12
Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..
November 25, 2002
26
Word Processing
Features

Insertion point – blinking cursor
– Where will the next typed character appear?

Scrolling
– Screen is window into document
– Brings other parts of document into view
November 25, 2002
27
Word Processing
Features

Word wrap
– Automatically determines when to go to a new
line
• Justifies text automatically
– <Enter> to signal end of paragraph

Easy corrections
–
–
–
–
<Backspace> (deletes to the left)
<Delete>
(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode (<Insert>)
November 25, 2002
28
Formatting Features
Adjust the physical appearance of the document



Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text


Tabs
Indentation
– Ordered, unordered lists
November 25, 2002
29
Formatting Features

Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left


Line spacing
Bullets and Numbering
November 25, 2002
30
Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size

– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter
November 25, 2002
31
Leading and Kerning

Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points

Kerning
– Space between characters
– Each font has a default kerning
November 25, 2002
32
Ergonomics
Study of the interaction of
humans and machines
November 25, 2002
33
Ergonomics
Types of Injury

Repetitive stress injury (RSI)
– Carpal tunnel syndrome
Eyestrain
 Back problems

November 25, 2002
34
Ergonomics
Tips to Prevent Injury

Reduce glare
– Window glare
– Glare deflector
– No overhead lights

Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest
November 25, 2002
35
Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size

November 25, 2002
36
Spreadsheets
and
Business Graphics:
Facts and Figures
Chapter 13
Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change

November 25, 2002
38
Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations

November 25, 2002
39
Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect
What if we reduce the price by 5%?
What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002
40
Electronic Spreadsheets
Fundamentals

Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys

Rows and columns
– Row – number
– Column – letters
November 25, 2002
41
Electronic Spreadsheets
Fundamentals

Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number

Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only
November 25, 2002
42
Cell Contents

Label
– Descriptive text
about entries
– Not used for
calculations

Value
– Number
– May be used in
calculations
November 25, 2002
43
Cell Contents
Formula

Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5

Contains
–
–
–


Cell address
One or more arithmetic operators
Functions
Result appears in the cell containing the formula
Calculation appears in the formula bar
November 25, 2002
44
Cell Contents
Functions



Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common
–
–
–
–
–
SUM
AVERAGE
COUNT
MIN
MAX
November 25, 2002
45
Cell Ranges




November 25, 2002
Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46
Formatting Features





Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style
November 25, 2002
47
Excel features – HW#6

To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell

To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border

To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings
November 25, 2002
48
Business Graphics





Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized
November 25, 2002
49
Line Graphs
• Axis
• Plot area
• Data point
• Labels
• Titles
Shows trends or cycles over time
November 25, 2002
50
Bar Graphs



Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb
November 25, 2002
51
Pie Charts

Proportions
Relationship between parts and whole


One time period
Exploded pie chart
One wedge pulled slightly away from the pie
November 25, 2002
52
Database Management:
Getting Data Together
Chapter 14
Computer Databases
Track information
 Allows higher productivity as a result of
better information

November 25, 2002
54
Hierarchy of Data

Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records

Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence

File
– Collection of related records
November 25, 2002
55
Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.

November 25, 2002
56
Direct / Random Access


Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys

Updating in place
– Read, change, and return a record to the same place
on disk

DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002
57
Batch Processing


Collect transactions into a transaction file and perform
periodic updates
Process
–
–
–
–
–

Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed
Master file only current immediately after processing
November 25, 2002
58
Transaction Processing



Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data
November 25, 2002
59
Database Models

Database Types
–
–
–
–

Relational
Object-oriented
Hierarchical
Network
Each type structures, organizes and uses
data differently
November 25, 2002
60
Relational Database

Organizes data into related tables
– (files)
Table consists of rows and columns
 Tables linked based upon a common field

– (key)
November 25, 2002
61
Relational Database
Key

Primary key
– A field whose value uniquely identifies a record

Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values
November 25, 2002
62
Data Integrity


Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys

Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002
63
DBMS
Database Management System
Basic functions




Create a database
Enter data
Modify the data as required
Retrieve information from the database
November 25, 2002
64
DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms

– Queries
– Reports
November 25, 2002
65
Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database

– Zero or more records can be retrieved

Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS
November 25, 2002
66
Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking

– First user requests record
– Others are locked out for update
November 25, 2002
67
Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time

– Summary form
– Regularly scheduled basis

May include data from external sources
– Ie, NYSE, weather, etc…
November 25, 2002
68
Systems Analysis and Design:
The Big Picture
Chapter 15
Systems Analysis and Design
What is it?

Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs

Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis
November 25, 2002
70
SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation

November 25, 2002
71
SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions

– Organizational chart, informal hierarchy
Results in a rough plan and what to do
November 25, 2002
72
SDLC
Analysis

Understand the existing system
– Gather data
– Analyze data

Establishes current system requirements
November 25, 2002
73
SDLC
Design
Planning the new system
 Two phases

– Preliminary design
– Detail design
November 25, 2002
74
SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype

November 25, 2002
75
SDLC
Detail Design
Parts of detail design phase





Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup
November 25, 2002
76
SDLC
Development

Programming
– Refine the design
– Detailed logic flowcharts and pseudocode

Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002
77
SDLC
Implementation








Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system
November 25, 2002
78
Programming Languages:
Telling the Computers
What to Do
Chapter 16
What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do
November 25, 2002
80
The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program

November 25, 2002
81
The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output

November 25, 2002
82
The Programming Process
Planning the Solution

Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..

Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax

Desk-checking
– Personal code design walk through

Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002
83
The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?

– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002
84
The Programming Process
Testing the Program

Translation – compiler
– Translates from source module into object module
– Detects syntax errors

Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references

Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002
85
The Programming Process
Documenting the Program


Performed throughout the development
Material generated during each step
–
–
–
–
–
–
–
Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing
November 25, 2002
86
Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:

– Procedural Languages
• Machine language
• Assembly language
• High-level language – 3GL
– Nonprocedural Languages
• Very high-level language – 4GL
• Natural language – 5GL
November 25, 2002
87
Machine Language

Written in strings of 0 and 1
– Displayed as hexadecimal
Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent

November 25, 2002
88
Assembly Language

Mnemonic codes
– Add, sub, tst, jmp…
Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language

November 25, 2002
89
3GL
High-Level Languages


1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math
– COBOL: (COmmon Business Oriented Language)
• Business

Compilation translates from high-level
language to machine language
November 25, 2002
90
4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages

– Retrieve information from databases
– Easy to learn and use
November 25, 2002
91
5GL
Natural Languages



Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002
92
Third Generation Languages
Traditional Programming
 Describe
data
 Describe procedures or operations
on that data
 Data and procedures are separate
November 25, 2002
93
Third Generation Languages

FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN

COBOL (Common Business Oriented Language)
–
–
–
–
1959
Business
Large complex data files
Formatted business reports
November 25, 2002
94
Third Generation Languages

BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic

RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002
95
Third Generation Languages

C
– 1972
– Efficient code – the language of UNIX
– Portability

C++
– Enhancement of C (Object Oriented)

M$ Visual Basic
–
–
–
–
1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program
November 25, 2002
96
Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)

– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform

Applets
November 25, 2002
97
Javascript & Power Point

From HW #5
– Something related to example file

From Final Project – Power Point
– Something from command set
November 25, 2002
98
November 25, 2002
99
November 25, 2002
100