Saturday, 24 March 2012

First Normal Form


Tuesday, 9 August 2011

Strategies


Network 


Network topology – ring, star, bus, mesh, tree, fully meshed. 
LANs and WANs – local area and wide area 
Distributed networks – split up – horizontal and vertical
Network hardware – computer, router, switch, hub, modem, multiplexer, server, client-server, NIC, cabling
Network software – Network OS, network operating system, network management system, auditing and monitoring software
Network auditing and monitoring procedures – traffic management, issuing server space, network manager/administrator, location of server, no of nodes


Levels of access, Administrator rights, Disc space (quota), Access rights to printers, Access rights to e-mail, Access rights to Internet, Access rights to folders, Access rights to applications, Remote access, Printer credits/allowance. 


Backup Strategy 


Storage - kept off-site in a secure safe location, each version clearly labelled, frequency of at least daily 
Recovery - recovery requires last full backup and following incremental backups to be loaded.
Rotation - One set of tapes kept in one location to cover a week, fortnight or month and another set of tapes kept in a different location to be used for the next period and a third set for the next period before reverting to the first set. 


Frequency any time there is a changeor regularly once a month / end of every day 
Storage (multiple) tape or DAT tape or another external hard drive mirror driveone copy off-site 
Version Control 3 copies (GrandFather/Father/Son)
Distinction between full back up and incremental all new data since the last back up of any type, differential – all data since the last full backup. 


Security Strategy


Options - user name and password guidelines, encryption, biometric, secure the room, store data off site 


integrity – accuracy, making sure it is consistent 


privacy of data – keeping sensitive data private describe the security risks to information systems – hacking, viruses – Trojan, spyware, worm 


code of conduct, virus protection, firewall or (protection from hackers, encryption, denial of service risk, access rights 




Upgrade Strategy


Future proofing 
• Computers and communications technology develop at an incredible rateand future proofing requires an organisation to attempt to anticipate future developments in order to secure resources which will be compatible with them. 
• Buy the most advanced processorand ensure that the computer can be upgraded with extra memory and storage if required. In a year or so this computer will be the standard that everyone else is buying. 
Legacy systems 
• Legacy systems are the systems which are in existence (or under development), at the start of an upgrade program. 
• Many companies continue to use legacy systems because the cost of buying new hardware and re-writing/upgrading the application software for the new hardwareis so costly that it does not make financial sense to move to the new system. 


Emulation – imitation of how the system would run.


Software Strategy


Evaluation of software functionality, performance, usability, compatibility data migration, reliability, resource requirements, portability, support)
Training on-the-job training, in-house and external courses)
User support manuals, online help, online tutorials - provided free with package, always available compared to help desk which is not, help desk to provide telephone support to all its branches, newsgroups, FAQs, bulletin board)


Hardware compatibility with example eg system requirements or implication eg
upgrade hardware.
• Integration with existing software packages.
• Compatibility with existing operating system.
• Compatibility with existing data documents.
• Others may not be able to open documents from this department.

Internet Unit

Structure of a URL


http://www.Click&Get.co.uk/images/CG212.jpg 


protocol - http:// 
domain name - www.Click&Get.co.uk 
path - /images 
port - 21
file identifier - /CG212.jpg 


W3C 


W3C (1 mark) 
developments / standards (1 mark) 
on the WWW (1 mark) 
deals with HTML (1 mark) 


ICANN


ICANN (1 mark) 
• responsible for distribution of IP addresses and domain names (1 mark) 
OR 
• as they will need more IP addresses for the greater number of users


TCP/IP


1. A packet is a block of data 
2. with a header added 
3. with the source address 
4. packet number/length/protocol 
5. and destination addresses attached 


6. Routers in the Internet look at the destination address 
7. and use lookup tables to decide where to send the packet next 
8. which may be the destination or another router 
9. each packet is routed (may be different route) 
10. if does not arrive, will be re-transmitted 
11. packets are reassembled at destination using packet number 


Classes of networks    Class A        Class B        Class C




Networks                        127               16,000           2m



Hosts                              16m               65,000           254


Benefits of subnet masking


more flexibility in terms of number of hosts and networks


useful for small companies who don’t require 254 hosts 


Subnet Masking


128  64   32  16    8    4    2    1
 n        n     n       n     h      h    h      h


Write the subnet mask out in binary


Count the hosts – in this case 4


Use the formula 2h - 2 to find the number of hosts


PHP


• The site has content which changes frequently (is dynamic) 
• Such as Number in Stock and date 
• Content like this ideally held in a database 
• php interfaces well with database such as SQL 


SSL


SSL uses IP addresses to make a secure connection 
SSL uses encryption (1 mark) with public (1 mark) and private keys (1 mark).




Client Side Scripting


• Should be faster than server side scripting 


• Validation/Error trapping is improved 


• Individual fields can be checked rather than waiting for form to be submitted. 


• Less load on server/doesn’t affect server performance 


Benefits of using domain names over IP addresses


domain names are words/meaningful (1 mark) not just numbers (1 mark) OR


domain names are used by people (1 mark) not by computers (1 mark)) OR 


easier to remember (1 mark) than strings of numbers (1 mark) 



HTML  codes



Inserting an image


<img src="Zologo.jpg" alt="Zologo" height="70" width =”120”> 


Linking to an email address


<a href = mailto:mranderson@BuchanHighSchool.sch.uk >Mr Anderson</a> 


Benefits/Drawbacks of Web Design software


Advantages
• Don’t have to learn HTML code
• WYSIWYG
• Speed of development
• Easier to use (for a beginner)
• Special effects are easily produced
• Easy to change layout
• Provides online help
• Any other appropriate answer


Disadvantages
• Have to learn how to use the software
• Some are quite complicated touse
• Creates large file size
• Produces bloated or extraneous code
• Slower to load
• Expensive to buy
• Any other appropriate answer


How to add new pages to a website


Upload her files (1 mark)
to the correct folder (1 mark)
Create a link to the page (1 mark)
on her hosting server (1 mark) 


Web Site Design Issues


Page structure/layout (1 mark) ensuring web pages are consistent by catering for
• different screen display sizes
• resolutions
• colour depth
• browser types
• user preferences
• available fonts
• users changing window size
or
Uniformity of presentation (1 mark) ensuring each web page is laid out in a similar manner (1 mark) or to give the user a familiar environment
(1 mark)
Or Download efficiency (1 mark) ensuring that the web pages will not take too long to download (1 mark) or striking a balance between the number of images and the time needed to transmit the images (1 mark)
or
Browser compatibility issues (1 mark) different browsers interpret HTML scripts differently resulting in different displays in different browsers (1 mark) or some web pages will be displayed differently depending on the browser (1 mark)


PGP


This method involves the use of keys, a public key and a private key (1 mark). A public key is freely available to everyone on the Internet and is used to encrypt the message (1 mark). A private key is secure and is used to decipher the message.


CSS


A cascading style sheet is a set of rules for a number of text formatting
controls (1 mark) that can be linked to a number of web pages (1 mark).
OR
A language (1 mark) used to describe how an HTML document should be
formatted (1 mark).


Cookies


A short piece or file of text/code (1 mark) stored by a website on a client 

DNS


A domain name server resolves the web address into the correct IP address (1 mark).
The operating system compares the domain name with the domain name that is
currently being referenced (1 mark). 
If the names match then the web page is displayed (1 mark). 
If no match found then it is passed on to another DNS (1 mark).
If not resolved then timeout error (404) is returned (1 mark). 

Entity Relationship Diagrams


Guide to Normalisation



Multi Valued Attributes - Certain fields will have more than one data entry e.g. item on a supermarket receipt


Cost and Value - the cost of the information refers to how much money was spent to obtain it the value refers to the importance (worth) of that information to the company or individual. 


EIS
strategic, used for long term (decisions), uses summarised information, top level of management, uses mostly external information, predict trends, major impact, uses information from MIS and DSS 


DSS
To help managers, (help) make decisions/choices, retrieve, summarise and analyse data, To help with “what if” 


Web Content covered by the C, D & P Act
Text, Graphics, Sound, Video, Animation, Media, Games, Software 


Serif/Sans Serif
Serif fonts ( p ) have a small stroke at the end of the letter, while sans serif fonts ( p ) do not. 


Text wrapping feature 
allows a user to specify how text flowsaround graphics and other objects in a document. 


Project management Software
Timeline, Resource allocation, Gantt (and other) charts, Optimisation and critical pathanalysis.


Security risks 
Hacking– gaining unauthorised access to the system


Freedom of Information Act
Public bodies must give information when requested. 


Types of user support
Manuals, Online help, Online tutorials, Help desk (could be on-line), Newsgroups/Forums, FAQs 


Data mining
Look for patternsin customer transactions/purchases/activitiesto make suggestions/recommendations