BSAD 141, Spring 2014 Final Exam Study Guide

Size: px
Start display at page:

Download "BSAD 141, Spring 2014 Final Exam Study Guide"

Transcription

1 BSAD 141, Spring 2014 Final Exam Study Guide NOTE: you are responsible for the material in any chapters, chapter extensions, handouts, and online reading. It would be beneficial to read everything prior to the test. It could be beneficial to reread the chapters and focus on specific definitions. It really depends on your comfort level. The notes do not exactly mirror the chapters. I didn t just reproduce the material in the chapter. Some lectures more closely mirror the book than others. Material from Test #1 Lecture 1 1/21 (BDIS 1.1: pages 2-12): Business Driven Management Information Systems Data, Information, Business Intelligence, and Knowledge AND Appendix A: Hardware and Software Basics Define IT and IS and in relationship to the five components of the IS model Hardware versus software Describe what the CPU is and identify the two components of the CPU and what their responsibilities are Define a bit and a byte Clock speed, word length, and bus width Parallel versus serial bus Define / describe the 3 components of primary storage (RAM, ROM, cache) Define / describe Virtual Memory, why it is important, how it works, what a page file is, and what a fragmentation error is Define / describe secondary storage and give examples of magnetic and optical secondary storage devices What is the difference between BluRay and a DVD? Storage/size units of storage definitions which term represents the largest size? Example, MB vs GB Define / describe the three types of system software (OS, utility, drivers) and provide some examples What are three different OS? Define / describe application software and some examples Define / describe data versus information Define MIS Lecture 2 1/23: (BDIS 7.1 and 7.2: pages ) Networks and Connectivity AND Appendix B: Networks and Telecommunications from the back of the book Define LAN and WAN and state the differences between a LAN and WAN Define networking technology and give examples

2 What are the most popular LAN technologies? Differences between Bluetooth, wireless and Wi-Fi What are some of the drawbacks to WiFi (wireless network connectivity)? Define what a router does Define what a switch does What is the difference between a router and a switch? Define / discuss what a network interface card is Define and differentiate between bandwidth and throughput Explain what your ISP means when they use the term broadband Identify and differentiate between the 3) network access technologies for corporate connectivity and the 3 for home connectivity What are the differences between shared and dedicated networks and between public and private networks? The basics of how VPN works and why it is a popular remote networking connectivity option Define what a network protocol is and what networking standards are What are the two most popular protocols in the Internet protocol stack? Describe the basic characteristics of each What is the format of an IP address and can you identify one? How is the Internet different from the WWW? What is a URL? What does network convergence refer to? Lecture 3 1/28 (BDIS 6.1: pages ) Data, Information, and Databases What is meant by granularity? Discuss the 5 characteristics of high quality information and define each Identify examples of how data can be of low quality Differentiate between a database (DB) and a database management system (DBMS) slides related to DBMS and RDBMS Define and differentiate between an entity set and an entity (rows contain entities) Differentiate between attribute and record Define and differentiate between primary key and foreign key Describe four advantages of RDBMS What is a DB schema and how does it impact the user view of the data? Define and differentiate between data redundancy and information integrity give examples of each and how problems can occur Define the lost-update problem in general. Why would this be an issue? How is it addressed? Lecture 4 1/30 (online reading) Data modeling, Entity-relationship Diagrams (ERDs), characteristics of relationships You are responsible for the online reading

3 Define a data model Define ERD Describe relational databases and what the benefits of RDBMS are. What is the fundamental component of an RDBMS? What is the programming or query language used in RDBMS? Review terminology for RDBMs Identify requirements for primary keys Types of attributes composite, simple, primary key, single valued, multi-valued Define attribute domain Define relationship degree, relationship connectivity, and relationship existence Differentiate between mandatory and optional existence what are implications when entering data? Interpret relationship connectivity: 1:1, 1:M, M:M Primary key, foreign key, and linking two tables using a FK in a 1:M relationship Lecture 5 2/4: More on data modeling, ERDs 1:M and M:M examples This lecture provided detailed examples on relationship connectivity, re-emphasized definitions, how PKs and FKs work, and I walked you though a 1:M and M:M example using tables. I explained the consequences of implementing a M:M incorrectly using the student class section example Lecture 6 2/6: Introduction to MS Access, building tables, creating keys, linking tables, using MS Access built-in relationships GUI, discussion (examples) of integrity issues Building an ERD using basic information Know the ERD notation used in the class and be able to draw an ERD using CORRECT notation Describe 2 types of integrity entity and referential. When does a violation of each occur? Why is each important? You might want to go through the Project-Manager example and build these tables in Access Make sure you can interpret error messages in Access Define normalization As DB becomes more normalized, what are some of the potential implications with respect to performance (query processing speeds)? We went through working examples of both types of integrity in Access and we looked at a flat file simple data problem and converted it through a first level normalization processing into two tables with a relationship between those 2 tables using M:M Employee-Project example Lecture 7 2/11: in-class normalization exercise where I gave you some data associated with the M:M Employee-Project example. Given some small set of data in a flat file format (like a giant Excel spreadsheet), be able to identify the entities in the table and convert those entities into tables. Be able to place attributes in the appropriate table. We worked through Employee-

4 Project example in detail. We used data to build an ERD and then implemented the ERD in Access this was a M:M example Lecture 8 2/13: in-class exercise Material from Test #2 Lecture 9 2/20 and Lecture 10-2/25: Database queries and reports You need to know the basics of relational databases and how to use keys to understand queries. Some of this material builds on material covered during Test #1. It could be beneficial to work through Tech Plug In 7 using the SlopeSideBikes data I have also posted a query HW if you want to practice. There is a database called NorthWindSimple2007.accdb and the solutions are implemented in NorthWindSimplesol.accdb. We covered a variety of topics during the lecture: What a query is Using the different views to build and view a query We looked at the SQL view We build queries using both the wizard and the design view We discussed all the rows and columns in the design view and specifically what each row does We set various criteria We used sorting We used the wildcard character We created several variables We build a query from a query You are not responsible for pivot charts or tables Lecture 11 2/27: Downloading Web-based data into MS Excel and manipulating data using the Data Analysis plugin You should have worked through the data analysis exercise. If not, you can go through the exercise before the test I have posted a completed spreadsheet as well as an example of an answer to the last question I ask My expectation is that you would be able to interpret basic descriptive statistics and be able to define kurtosis and skewness (as well as how they might be used in analyses)

5 Lecture 12 3/11 Using MS Excel for linear regression modeling exercise You should have worked through the posted exercise and we able to answer all questions We did one example in class and then I gave you another example to do on your own. I posted the solutions to the questions. You should be able to interpret the regression output and interpret basic scatter plots (both of the regression variables and of the residuals) Any information contained in the exercise is fair game Lecture 13 3/18 Basic linear programming exercise + power points Go over the PowerPoints so you understand what linear programming is and how it is used Know what the objective function (OF) is and how to state a basic objective function consistent with the example used in class Know what constraints are and how to state basic constraints consistent with the example used in class Interpret the Answer Report Interpret the Sensitivity Report Interpret the shadow price and allowable increase / decrease associated with the OF coefficients Interpret the shadow price and allowable increase / decrease associated with the RHS constraint coefficients (the interpretation is slightly different from the OF) Given some basic information consistent with the lecture, be able to set up a basic linear programming problem Lecture 14 3/20 Investment LP example There really shouldn t be any new material here I do not intend to ask you questions using a more complex problem. The problem will be in line with Lecture 13 Lecture 15 3/25: (Car Loan Payment worksheet and discussion of Index, Payment, Vlookup, and IF functions) You should be able to answer questions about any of the functions that we use. For example, if I give you a small Excel table and show you a particular function, identify what they function would return. I could ask questions on the construction of a function and how you would use it. I will give handouts in class Material since Test #2 Lecture 16 4/3: IS, Organizational Strategy and Competitive Advantage. BDIS 1.2: pages Define / describe business strategy can you give an example? Why is developing and understanding what a business strategy is important? Differentiate between goals and objectives and provide examples of each

6 Define / describe competitive advantage, competitive intelligence, and first-mover advantage Understand competitive strategy matrix and examples for cost and differentiation strategies Name components of Porter s 5 forces model and be able to give examples of situations where each of the components is either high or low i.e. understand the different forces in the model and give examples of the force effects Define / describe business process and be able to give examples of business processes Define / describe value chain analysis Name the 5 primary activities of a value chain and 4 secondary activities and give examples Describe how MIS fits into the value chain discussion Differentiate between supply chain and value chain Why might subcontracting certain functions within an organization (or even interacting with other organizations) be difficult to manage from the perspective of optimizing the value chain of a single organization? Lecture 17 4/8: Decision Making and Business Process Management. BDIS Chapter 2: pages online readings Name the two general types of decision: structure and unstructured and identify the common characteristics of both Define 3 different levels of management decisions and how they fit into organizational pyramid be able to give examples of the different types of decisions Relationship between org. pyramid, management decision level, information requirements, and type of decision (slide 7 from Lecture 3) Describe / characterize the information requirements for each type of decision Name which basic type of information system is used at each of the three levels in the organizational pyramid What is a TPS and what does it do? Define / describe metric, critical success factor (CSF), and key performance indicator (KPI) and give examples of each be able to link these with goals Define / describe efficiency and effectiveness and give examples of each. By looking at the table of efficiency vs- effectiveness, which is a more subjective measure? Define / describe a benchmark and the benchmarking process Define BPM Differentiate between BPM and CIP, TQM, and Six Sigma Identify the three types of BP changes associated with MIS and map them to the different managerial levels Differentiate between front-office and back-office systems Define the three types of process scopes What are some of the problems / difficulties associated with BPM?

7 Lecture 18 4/10: (started the in-class Causeway DFD example also some online reading): Entity / activity (EA) tables, context diagrams, and physical DFDs What is a DFD? What are the three types of DFDs and how are they different? What is a context diagram? Rules for CD Physical vs- logical DFDs Define what a balanced DFD is Physical DFD rules How to create an EA table What is an external entity? Internal entity? What is the difference and how can you tell from your EA table? Define information processing activity Lecture 19 4/15: In-class Causeway example + introduction to MS Visio Lecture 20 4/17: In-class Application Screening process example Lecture 21 4/21: Information and Ethics, Information Security and malicious programs. BDIS 4.1: pages BDIS 4.2: pages online reading What is the only ethical component of MIS? You do NOT need to know the details associated with the 6 organizational information management polices identified in slide 10 (and discussed in slides 11-20) Differentiate between virus and worm and be able to define what a virus is What are the different types of viruses that were mentioned? In terms of information security know that people (and the development of policies) are the first line of defense and technology is the second line of defense Define and differentiate between authentication and authorization Define and differentiate between asymmetric / public key and symmetric / private key encryption Define encryption In general be able to explain how public key encryption works Differentiate between public key encryption and a digital signature In general be able to explain how a digital signature works Define a certificate authority and what it does Lecture 22 4/24: what makes a technology sustainable? Virtualization and the cloud. BDIS 5.1: pages BDIS 5.2: pages What are the 3 components / pillars of sustainability? What is the difference between a client and a server? What is an example of a network service that would be hosted on a server? Why is the client-server architecture important? Define cloud computing what is it?

8 What is the difference between the public cloud and a private data center? What are some of the benefits and drawbacks of each? Differentiate between the 3 types of backup What is the difference between a backup plan and a disaster recovery plan? Identify and describe each of the 6 components of an agile MIS infrastructure Define EWaste What are examples of cost-effective approaches to environmental sustainability? Define virtualization Lecture 23 4/29: Decision Support Systems What is a decision-support system and how are these systems used?

Technical Glossary from Frontier

Technical Glossary from Frontier Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to

More information

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Revised 5/2010 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Course Description Covers computer concepts and Internet skills and uses a software

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

Curriculum Map (Computer Technology 9 th grade)

Curriculum Map (Computer Technology 9 th grade) Curriculum Map (Computer Technology 9 th grade) Month August Main Concept (General terms) Operating Systems. 1. What is the difference between operating system software and Application Software 3. Print

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based Virtualization Rackspace Cloud Databases and Container-based Virtualization August 2012 J.R. Arredondo @jrarredondo Page 1 of 6 INTRODUCTION When Rackspace set out to build the Cloud Databases product, we asked many

More information

Deployment Planning Guide

Deployment Planning Guide Deployment Planning Guide August 2011 Copyright: 2011, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or by any means,

More information

WASSCE / WAEC DATA PROCESSING SYLLABUS WWW.LARNEDU.COM

WASSCE / WAEC DATA PROCESSING SYLLABUS WWW.LARNEDU.COM WASSCE / WAEC DATA PROCESSING SYLLABUS WWW.LARNEDU.COM Visit www.larnedu.com for WASSCE / WAEC syllabus on different subjects and more great stuff to help you ace the WASSCE in flying colours. PREAMBLE

More information

ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems

ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems ACS 1803 Final Exam Topic Outline IV. Functional Area Information Systems a. Financial Information Systems (Lecture Outline 5.1) i. Budgeting Systems ii. Cash Management Systems iii. Capital Management

More information

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system. DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows

More information

Middle School. Sixth Grade

Middle School. Sixth Grade Middle School The goal of the Middle School Computer curriculum is to further develop technology skills for both academic learning and personal productivity in the 21 st century. Students learn the science

More information

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus Modality of Examination: The examination comprises of two papers, each carrying 100 marks. The first paper is General Overview

More information

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1

SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

MySQL for Beginners Ed 3

MySQL for Beginners Ed 3 Oracle University Contact Us: 1.800.529.0165 MySQL for Beginners Ed 3 Duration: 4 Days What you will learn The MySQL for Beginners course helps you learn about the world's most popular open source database.

More information

Chapter 12 Databases, Controls, and Security

Chapter 12 Databases, Controls, and Security Systems Analysis and Design in a Changing World, sixth edition 12-1 Chapter 12 Databases, Controls, and Security Table of Contents Chapter Overview Learning Objectives Notes on Opening Case and EOC Cases

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution

Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution Computer & Information Systems (22:198:604) Fall 2008 Homework 2 Solution 1. Chapter 3. Review Question 2 (Page 66) Comment on the statement, "The CPU is the brain of the computer." The CPU selects instructions,

More information

Component 4: Introduction to Information and Computer Science

Component 4: Introduction to Information and Computer Science Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

PARCA Certified PACS Associate (CPAS) Requirements

PARCA Certified PACS Associate (CPAS) Requirements PARCA Certified PACS Associate (CPAS) Requirements Copyright notice: Copyright 2005 PACS Administrators in Radiology Certification Association (PARCA). All rights reserved. All rights reserved. This publication

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Best Practices for Consolidation Projects

Best Practices for Consolidation Projects Best Practices for Consolidation Projects Lynne Glickman Solution Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

CISA TIMETABLE (4 DAYS)

CISA TIMETABLE (4 DAYS) CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology

More information

INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY INFORMATION TECHNOLOGY Scope These program criteria apply to Information Technology, Computer Engineering Technology, and specialities therein, such as computer programming, computer systems analysis,

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

Types of Software Testing (E-ams) For MBA Programs and CAD12

Types of Software Testing (E-ams) For MBA Programs and CAD12 GRADE 12 Grade 12: Term 1-10 weeks/40 hours Data and Information Management: Database design and concepts (±1 week/4 hours) - Relational database overview o Normalisation (overview and purpose) to reduce

More information

OKLAHOMA SUBJECT AREA TESTS (OSAT )

OKLAHOMA SUBJECT AREA TESTS (OSAT ) CERTIFICATION EXAMINATIONS FOR OKLAHOMA EDUCATORS (CEOE ) OKLAHOMA SUBJECT AREA TESTS (OSAT ) FIELD 081: COMPUTER SCIENCE September 2008 Subarea Range of Competencies I. Computer Use in Educational Environments

More information

HP LeftHand SAN Solutions

HP LeftHand SAN Solutions HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express

More information

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP PROGRAMMING & SOFTWARE DEVELOPMENT AND INFORMATION SUPPORT & SERVICES PATHWAY SOFTWARE UNIT UNIT 5 Programming & and Support & s: (Unit 5) PAGE

More information

White Paper ClearSCADA Architecture

White Paper ClearSCADA Architecture White Paper ClearSCADA Architecture ClearSCADA has 3 major components or software applications; the ClearSCADA server, a windows client known as, and a web client known as Webx. The software is designed

More information

Microsoft SharePoint 2010 Administration

Microsoft SharePoint 2010 Administration Microsoft SharePoint 2010 Administration Real-World Skills for MCITP Certification and Beyond Tom Carpenter James Pyles WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning the Logical

More information

ProSystem fx Engagement. Deployment Planning Guide

ProSystem fx Engagement. Deployment Planning Guide ProSystem fx Engagement Deployment Planning Guide September 2011 Copyright: 2011, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted

More information

Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster.

Know your enemy. Class Objectives Threat Model Express. and know yourself and you can fight a hundred battles without disaster. Know your enemy and know yourself and you can fight a hundred battles without disaster. Sun Tzu Class Objectives Threat Model Express Create quick, informal threat models 2012 Security Compass inc. 2 1

More information

Course Descriptions. preparation.

Course Descriptions. preparation. Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Course Descriptions. CS 101 Intro to Computer Science

Course Descriptions. CS 101 Intro to Computer Science Course Descriptions CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

COURSE NAME: Database Management. TOPIC: Database Design LECTURE 3. The Database System Life Cycle (DBLC) The database life cycle contains six phases;

COURSE NAME: Database Management. TOPIC: Database Design LECTURE 3. The Database System Life Cycle (DBLC) The database life cycle contains six phases; COURSE NAME: Database Management TOPIC: Database Design LECTURE 3 The Database System Life Cycle (DBLC) The database life cycle contains six phases; 1 Database initial study. Analyze the company situation.

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Designing a Microsoft SQL Server 2005 Infrastructure

Designing a Microsoft SQL Server 2005 Infrastructure Course Outline Other Information MS 2786 Days 2 Starting Time 9:00 Finish Time 4:30 Lunch & refreshments are included with this course. Designing a Microsoft SQL Server 2005 Infrastructure Introduction

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE Game changing Technology für Ihre Kunden Thomas Bürgis System Engineering Manager CEE Threats have evolved traditional firewalls & IPS have not Protection centered around ports & protocols Expensive to

More information

Relational Database Basics Review

Relational Database Basics Review Relational Database Basics Review IT 4153 Advanced Database J.G. Zheng Spring 2012 Overview Database approach Database system Relational model Database development 2 File Processing Approaches Based on

More information

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines 015 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 D 1 A 13 C 14 B 15 B

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet

More information

DATABASE MANAGEMENT SYSTEMS. Question Bank:

DATABASE MANAGEMENT SYSTEMS. Question Bank: DATABASE MANAGEMENT SYSTEMS Question Bank: UNIT 1 1. Define Database? 2. What is a DBMS? 3. What is the need for database systems? 4. Define tupule? 5. What are the responsibilities of DBA? 6. Define schema?

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases.

SQL Databases Course. by Applied Technology Research Center. This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. SQL Databases Course by Applied Technology Research Center. 23 September 2015 This course provides training for MySQL, Oracle, SQL Server and PostgreSQL databases. Oracle Topics This Oracle Database: SQL

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

MedInformatix System Requirements

MedInformatix System Requirements MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Lesson 5. Managing Devices. Learning Objectives. ODN Skills

Lesson 5. Managing Devices. Learning Objectives. ODN Skills Lesson 5 Managing Devices Learning Objectives Students will learn to: Connect Plug-and-Play Devices Connect and Disconnect Printers Install Third-Party Software for Devices Understand Disk Types Understand

More information

HC-6950. Emission Protected Security Workstation

HC-6950. Emission Protected Security Workstation Emission Protected Crypto AG / 6950-e-2.ppt / DA-HQ / 0004 / 1 PC and Workstation Risks Security Risks: Unauthorized change of data (Sabotage, Viruses) Unauthorized use of data Data loss (deletion) Physical

More information

Sage 100 Premium ERP Version 2015 Supported Platform Matrix Created as of April 6, 2015

Sage 100 Premium ERP Version 2015 Supported Platform Matrix Created as of April 6, 2015 The information in this document applies to Sage 100 Premium ERP Version 2015.Detailed product update information and support policies can be found on the Sage Support web site at: https://support.na.sage.com/

More information

Course Outline. Kasun@sjp.ac.lk Faculty of Applied Sciences University of Sri Jayewardanepura. Information Technology

Course Outline. Kasun@sjp.ac.lk Faculty of Applied Sciences University of Sri Jayewardanepura. Information Technology Course Outline Kasun@sjp.ac.lk Faculty of Applied Sciences University of Sri Jayewardanepura Information Technology Objectives Outcomes Course outline Examination & Certificate Overview of a Computer System

More information

Microsoft SQL Database Administrator Certification

Microsoft SQL Database Administrator Certification Microsoft SQL Database Administrator Certification Training for Exam 70-432 Course Modules and Objectives www.sqlsteps.com 2009 ViSteps Pty Ltd, SQLSteps Division 2 Table of Contents Module #1 Prerequisites

More information

Sage 100 Premium Version 2016 Supported Platform Matrix Created as of November 25, 2015

Sage 100 Premium Version 2016 Supported Platform Matrix Created as of November 25, 2015 The information in this document applies to Sage 100 Premium Version 2016. Detailed product update information and support policies can be found on the Sage Support web site at: https://support.na.sage.com/.

More information

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of

More information

Network Technology (10101)

Network Technology (10101) Network Technology (10101) Rationale Statement: The goal of this course is to help students recognize the significant impact of computer networking in their lives. Virtually any career involves the use

More information

SQL Server Administrator Introduction - 3 Days Objectives

SQL Server Administrator Introduction - 3 Days Objectives SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying

More information

Comparing SMB Direct 3.0 performance over RoCE, InfiniBand and Ethernet. September 2014

Comparing SMB Direct 3.0 performance over RoCE, InfiniBand and Ethernet. September 2014 Comparing SMB Direct 3.0 performance over RoCE, InfiniBand and Ethernet Anand Rangaswamy September 2014 Storage Developer Conference Mellanox Overview Ticker: MLNX Leading provider of high-throughput,

More information

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June 2010 2 hours

UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education. Paper 1 May/June 2010 2 hours *865730009* UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Secondary Education INFORMATION AND COMMUNICATION TECHNOLOGY 047/ Paper May/June 00 hours Candidates

More information

BUSINESS PROCESSING GIANT TURNS TO HENSON GROUP TO ENHANCE SQL DATA MANAGEMENT SOLUTION

BUSINESS PROCESSING GIANT TURNS TO HENSON GROUP TO ENHANCE SQL DATA MANAGEMENT SOLUTION BUSINESS PROCESSING GIANT TURNS TO HENSON GROUP TO ENHANCE SQL DATA MANAGEMENT SOLUTION Overview Country or Region: United States Industry: Business Processing Customer Profile Cynergy Data provides electronic

More information

Information and Digital Technology

Information and Digital Technology 2014 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Networking and Hardware Total marks 80 Section I Pages 2 7 General Instructions Reading time 5 minutes Working time 2 hours

More information

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/

Security Design. thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Security Design thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing

More information

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...

More information

HP ProLiant BL660c Gen9 and Microsoft SQL Server 2014 technical brief

HP ProLiant BL660c Gen9 and Microsoft SQL Server 2014 technical brief Technical white paper HP ProLiant BL660c Gen9 and Microsoft SQL Server 2014 technical brief Scale-up your Microsoft SQL Server environment to new heights Table of contents Executive summary... 2 Introduction...

More information

BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497

BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497 CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.

More information

DBMS / Business Intelligence, Business Intelligence / DBMS

DBMS / Business Intelligence, Business Intelligence / DBMS DBMS / Business Intelligence, Business Intelligence / DBMS Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Priority Pro v17: Hardware and Supporting Systems

Priority Pro v17: Hardware and Supporting Systems Introduction Priority Pro v17: Hardware and Supporting Systems The following provides minimal system configuration requirements for Priority with respect to three types of installations: On-premise Priority

More information

Corporate PC Backup - Best Practices

Corporate PC Backup - Best Practices A Druva Whitepaper Corporate PC Backup - Best Practices This whitepaper explains best practices for successfully implementing laptop backup for corporate workforce. White Paper WP /100 /009 Oct 10 Table

More information

COURSE OUTLINE Survey of Operating Systems

COURSE OUTLINE Survey of Operating Systems Butler Community College Career and Technical Education Division Skyler Lovelace New Fall 2014 Implemented Spring 2015 COURSE OUTLINE Survey of Operating Systems Course Description IN 167. Survey of Operating

More information

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global

CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit

More information

What the student will need:

What the student will need: COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use

More information

MSc Information Technology - E521

MSc Information Technology - E521 MSc Information Technology - E521 1. Aims and Objectives This conversion programme targets non-engineering graduates with a view of preparing them for the employment market where up-to-date IT skills represent

More information

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy Montgomery College Course Designator/Course Number: CS 11 Course Title: Computer Literacy Course Length: 3 credits 3 5-minute meetings per week or equivalent Course Description: An introduction to the

More information

Configuring Apache Derby for Performance and Durability Olav Sandstå

Configuring Apache Derby for Performance and Durability Olav Sandstå Configuring Apache Derby for Performance and Durability Olav Sandstå Sun Microsystems Trondheim, Norway Agenda Apache Derby introduction Performance and durability Performance tips Open source database

More information

Outline: Operating Systems

Outline: Operating Systems Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)

More information

Post Genie TM WebMail Server 2400/2208R

Post Genie TM WebMail Server 2400/2208R 具 備 容 錯 備 援 機 制 的 網 路 郵 件 伺 服 器 Post Genie TM WebMail Server 2400/2208R October 27, 2004 Presented by Kevin Liou Product Manager, Message Communication QNAP, Member of ICP Electronics In.c (IEI) 1 Agenda

More information

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science

COMSATS Institute of Information Technology, Abbottabad Department of Computer Science COMSATS Institute of Information Technology, Abbottabad Department of Computer Science Course: CSC 432 Telecom Network Design (3,0) (Spring 2015) Office: Instructor: Office hours: Email: Z-Block (Z-359)

More information

IT Security in Process Automation - Top Ten

IT Security in Process Automation - Top Ten IT Security for Process Control Field Devices, Services and Maintenance INTERKAMA Forum, April 13 th, 2005 Slide 1 IT Security in Process Automation Content Why is this important? Security Measures in

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Logicalis Enterprise Cloud Frequently Asked Questions

Logicalis Enterprise Cloud Frequently Asked Questions Logicalis Enterprise Cloud Frequently Asked Questions Getting Started What is the Logicalis Enterprise Cloud and why is it a great solution? The Logicalis Enterprise Cloud (LEC) is a shared computing environment

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components

More information

SYLLABUS FOR BASIC COMPUTER COURSE (BCC)

SYLLABUS FOR BASIC COMPUTER COURSE (BCC) SYLLABUS FOR BASIC COMPUTER COURSE (BCC) OBJECTIVE: The course is designed to aim at imparting a basic level appreciation programme for the common man. After completing the course the incumbent is able

More information

Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC)

Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC) Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC) Preamble These CTAC are applicable to programs having titles involving Information

More information

SMB Direct for SQL Server and Private Cloud

SMB Direct for SQL Server and Private Cloud SMB Direct for SQL Server and Private Cloud Increased Performance, Higher Scalability and Extreme Resiliency June, 2014 Mellanox Overview Ticker: MLNX Leading provider of high-throughput, low-latency server

More information

Outline. CS 245: Database System Principles. Notes 02: Hardware. Hardware DBMS ... ... Data Storage

Outline. CS 245: Database System Principles. Notes 02: Hardware. Hardware DBMS ... ... Data Storage CS 245: Database System Principles Notes 02: Hardware Hector Garcia-Molina Outline Hardware: Disks Access Times Solid State Drives Optimizations Other Topics: Storage costs Using secondary storage Disk

More information

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express

Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Express SQL 2008 R2 Express Restrictions 1 CPU 1 GB Ram Use Limit 10 GB Database Size High Availability Options None (No Database Mirroring,

More information

M.S. Computer Science Program

M.S. Computer Science Program M.S. Computer Science Program Pre-requisite Courses The following courses may be challenged by sitting for the placement examination. CSC 500: Discrete Structures (3 credits) Mathematics needed for Computer

More information