"True friendship is like sound health; the value of it is seldom known until it be lost."

- Charles Caleb Colton













Tuesday, August 9, 2011

1. Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.
CYBERCRIME PENETRATORS:
Hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community.
Script kiddie or skiddie, occasionally skid, script bunny, script kitty, script-running juvenile (SRJ) or similar, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites.
Cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.
Industrial espionage, economic espionage or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security purposes. Economic espionage is conducted or orchestrated by governments and is international in scope, while industrial or corporate espionage is more often national and occurs between companies or corporations.
Cyberextortionist(s) is an individual or group who uses email as an offensive force. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network. The message sent through the email usually demands money in exchange for the prevention of the attack.
Cyberterrorist is the one who uses Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

2. Computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
Rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware.
Botnet is a collection of compromised computers connected to the Internet, termed bots, that are used for malicious purposes. When a computer becomes compromised, it becomes a part of a botnet. Botnets are controlled via protocols such as IRC and http.
Backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.
denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management. One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

CONTROLS:
Firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass. Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
Intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Intrusion detection is not a monitoring process. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusioners detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization.
IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.
Honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.

3. Operating system and software patches and updates
There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.
Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.
Passwords
Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.
  1. Change passwords often. It is recommended at least once every few months.
  2. Create a BIOS password.
  3. When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23!.
  4. Do not use sticky notes around your computer to write down passwords. Instead use a password manager.
Get a hardware or software firewall
We highly recommend all computer users have a firewall solution. There are two ways a firewall can protect your computer and network.
  1. Hardware firewall - A hardware firewall is a hardware device that is connected to your network. Often many home users who have a home network use their network router as a firewall solution.
  2. Software firewall - A software firewall is a software program that you install on your computer that helps protect that computer from unauthorized incoming and outgoing data. Below is a listing of a few of the more widely used software firewall programs.
Note: A software firewall is only going to protect the computer that has the firewall installed on it.
In addition to the above listed firewall software programs many of the antivirus scanners released today also include their own version of a firewall program. If you have an antivirus scanner that also has a firewall program you do not need to worry about getting one of the above programs or another third-party firewall program.
Trojans, viruses, spyware, and other malware
Software Trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information.
To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.
Know how to handle e-mails
Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.
  • Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.
  • Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See the phishing definition for additional information about this term as well as examples of these e-mails.
Alternative browser
Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.
Run system scans to check for vulnerabilities
There are several sites on the Internet that allow users to check their computers for potential threats or issues their network or computer may have that can allow users unauthorized access to their computer. Below are a listing of recommend sites to try:
Gibson Research Corporation - The Gibson Research Corporation, or GRC, is a great location to learn about network security as well as well as test your computer or network for vulnerabilities.
Hacker Wacker - Another great site with computer security related information, help, and programs to help test your computer and network.

4. Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.
Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.
5. [1] Copy protection system
There are copy protection systems which you can use. They vary in features, and one widely used is SoftwarePassport (previously known as Armadillo). These cost something, but they’ll save time, nerves and money in a long run.
Small tip: If you choose to use this kind of anti-piracy options, make sure your copy protection doesn’t annoy customer.

[2] Separate demo and full version

This is another very fine way to copy protect your software: simply create separate versions of your product. Your demo version might contain only 30% of the assets, and when people purchase the full version you can give them the full 100% of the elements. It’s very practical and inexpensive way to copy protect your game.

[3] Online game features or online registration

If you have features that require Internet, you can use online copy protection for your product. One example could be that you wouldn’t send player server list unless user has sent a valid username and password to your game server. That way you couldn’t play the game illegally with others since you wouldn’t get their server information.

[4] Give discounts or lower the product price

I’m not really recommending this – just rather listing this one as a general way that might decrease piracy. I’m not even that convinced this one is really a solid answer to problems of piracy.
Some people say that this might help getting rid of some pirates. The problem with this approach is naturally that when you lower your price, you get less profits per sale. Then the problem continues: lowering your product price doesn’t not necessarily lead to increased sales.

[5] Give your product for free

Some people have done radical moves and are giving their product for free. These guys might use some different tactics (like these) to generate income while providing their product for no cost.

[6] Don’t give away your software source code

This might sound quite basic, but projects with multiple programmers carry a risk of shared source code. While I believe in open development, there is a risk that your source code gets stolen or leaked. If you keep your source code hidden, it means other people cannot get it – but then you face a problem regarding the product progress. I believe in open atmosphere and I focus on getting reliable people in the team, rather than focusing on protecting my code in case somebody isn’t reliable. Working with reliable guys has been better option rather than worrying piracy.
Nevertheless, you might need to consider this to protect your code.

[7] If your product ends up to some warez site, take legal actions

If your product ends up hacked and into some illegal site, contact the internet service provider of the warez site and tell them about the problem (not the warez people, but those who own and manage the servers physically). Since one email might get ignored, it’s useful to discuss about the warez site first in a forum. While 1 email might get ignored, 10 or 100 emails from different indies can help shutting down the illegal site.

6. Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail. Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest. Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks.

7. A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.

8. Optical Disk
Computer Resources does not recommend zip disks because of their unreliable track record. We do recommend that you burn a labeled and dated CD or DVD at every project milestone, then store them in different places. Why so many? In order to make CD/DVD writable media, the surface that gets written on needs to be a little soft in order to burn the data onto it (in contrast to the commercial CD/DVD made from a glass master mold), and that surface is easily scratched. A CD/DVD can also get lost or stolen. But as backups go, they're one of the easiest, most reliable things available, and relatively inexpensive. Discs are available from the vending machine on the 5th floor or many 3rd party retailers.

USB Memory Key

Another very good device for backup purposes is a Memory Key. They are inexpensive and easy to handle. Memory Keys are plug and play devices that can be used on Mac and PC platform interchangeably. Size of Memory Keys range, but something like 512 MB or 1 GB should be sufficient. They are very useful when working on multiple computers. You can use them to carry your files between computers and at the same time have a most recent copy of your work backed up. USB keys are available from the vending machine on the 5th floor.

Network Storage

Your home account is networked and available from anywhere on the internet, and the disc on which it lives is much less likely to fail than your internal local hard drive, which can be exposed to electromagnetic fluctuations, spilled coffee, and any number of other hazards associated with life on the trays.
However, if you accidentally delete a file from your home account or other network storage area, there is no chance of recovery. Without exception, every user is responsible for backing up their own work.
The GSD maintains many network storage areas, including every users' home account, in a temperature controlled, RAID protected environment that gets regularly backed up to tape and stored offsite.
Computer Resources restores files from tape only in the event of a system wide emergency.

9. Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.

10. A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.


Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following.
An electronic profile combines data about an individual's Web use with data from public sources, which then is sold.
A cookie is a file that a Web server stores on a computer to collect data about the user.
Spyware is a program placed on a computer that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window.
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information.
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 


Monday, August 1, 2011

QUIZ 8
1. A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies). The term "database" refers both to the way its users view it, and to the logical and physical materialization of its data, content, in files, computer memory, and computer data storage. This definition is very general, and is independent of the technology used. However, not every collection of data is a database; the term database implies that the data is managed to some level of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn often implies the use of a general-purpose Database management system (DBMS). A general-purpose DBMS is typically a complex software system that meets many usage requirements, and the databases that it maintains are often large and complex.
The term database is correctly applied to the data and data structures, and not to the DBMS which is a software system used to manage the data. The structure of a database is generally too complex to be handled without its DBMS, and any attempt to do otherwise is very likely to result in database corruption. DBMSs are packaged as computer software products: well-known and highly utilized products include the Oracle DBMS, Access and SQL Server from Microsoft, DB2 from IBM and the Open source DBMS MySQL. Each such DBMS product currently supports many thousands of databases all over the world. The stored data in a database is not generally portable across different DBMS, but can inter-operate to some degree (while each DBMS type controls a database of its own database type) using standards like SQL and ODBC. A successful general-purpose DBMS is designed in such a way that it can satisfy as many different applications and application designers as possible. A DBMS also needs to provide effective run-time execution to properly support (e.g., in terms of performance, availability, and security) as many end-users (the database's application users) as needed. Sometimes the combination of a database and its respective DBMS is referred to as a Database system (DBS).
A database is typically organized according to general Data models that have evolved since the late 1960s. Notable are the Relational model (all the DBMS types listed above support databases based on this model), the Entity-relationship model (ERM; primarily utilized to design databases), and the Object model (which has more expressive power than the relational, but is more complicated and less commonly used). Some recent database products use XML as their data model. A single database may be viewed for convenience within different data models that are mapped between each other (e.g., mapping between ERM and RM is very common in the database design process, and supported by many database design tools, often within the DBMS itself). Many DBMSs support one data model only, externalized to database developers, but some allow different data models to be used and combined.
The design and maintenance of a complex database requires specialist skills: the staff performing this function are referred to as database application programmers (different from the DBMS developers/programers) and database administrators, and their task is supported by tools provided either as part of the DBMS or as free-standing (stand-alone) software products. These tools include specialized Database languages including Data Description Languages, Data Manipulation Languages, and Query Languages. These can be seen as special-purpose programming languages, tailored specifically to manipulate databases; sometimes they are provided as extensions of existing programming languages, with added special database commands. Database languages are generally specific to one data model, and in many cases they are specific to one DBMS type. The most widely supported standard database language is SQL, which has been developed for the relational model and combines the roles of Data Description Language, Data manipulation language, and a Query language.
A way to classify databases involves the type of their contents, for example: bibliographic, document-text, statistical, multimedia objects, etc. Another way is by their application area, for example: Accounting, Music compositions, Banking, Manufacturing, Insurance, etc.

2. File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records to correct inaccurate data or to update old data with new data, and deleting records when they no longer are needed. Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.

3. Character is a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.
Field (also called data member or member variable) is the data encapsulated within a class or object.
Records (also called tuples, structs, or compound data) are among the simplest data structures. A record is a value that contains other values, typically in fixed number and sequence and typically indexed by names. The elements of records are usually called fields or members.
Computer file is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage. A file is durable in the sense that it remains available for programs to use after the current program has finished. Computer files can be considered as the modern counterpart of paper documents which traditionally are kept in offices' and libraries' files, and this is the source of the term.

4. Data dictionary, or metadata repository, as defined in the IBM Dictionary of Computing, is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format." The term may have one of several closely related meanings pertaining to databases and database management systems (DBMS): 
  • a document describing a database or collection of databases
  • an integral component of a DBMS that is required to determine its structure
  • a piece of middleware that extends or supplants the native data dictionary of a DBMS
File maintenance is a procedure that keeps computer files current by applying all necessary transactions (adjustments) against the file. A file maintenance procedure must be performed prior to generating any output, such as labels, reports, or list rental selections, from the file. Transactions include changes of address, addition and deletion of records, application of payments to credit orders, and so forth. In on-line systems, file maintenance is performed continuously. In batch systems, it is scheduled according to the frequency with which output must be generated. File retrieval is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Often the data are being salvaged from storage media such as internal or external hard disk drives, solid state drives (SSD), USB flash, storage tapes, CDs, DVDs, RAID, and other electronics. Recovery may be required due to physical damage to the storage device or logical damage to the file system that prevents it from being mounted by the host operating system.
Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data.
Backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. The verb form is back up in two words, whereas the noun is backup.
Backups have two distinct purposes. The primary purpose is to recover data after its loss, be it by data deletion or corruption. Data loss is a very common experience of computer users. 67% of internet users have suffered serious data loss. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required.
Though backups popularly represent a simple form of disaster recovery, and should be part of a disaster recovery plan, by themselves, backups should not alone be considered disaster recovery. Not all backup systems and/or backup applications are able to reconstitute a computer system, or in turn other complex configurations such as a computer cluster, active directory servers, or a database server, by restoring only data from a backup.

5. A database co-ordinate the physical and logical access to data while a file - processing system only co-ordinates physical access to the data

6. Relational database matches data by using common characteristics found within the data set. The resulting groups of data are organized and are much easier for many people to understand.
For example, a data set containing all the real-estate transactions in a town can be grouped by the year each transaction occurred, the sale price, a buyer's last name and so on. Such a grouping uses the relational model (a technical term for this is schema). Hence, such a database is called a "relational database."
The software used to do this grouping is called a relational database management system (RDBMS). The term "relational database" often refers to this type of software.
Relational databases are currently the predominant choice in storing data like financial records, medical records, personal information and manufacturing and logistical data.
Object database (also object-oriented database management system) is a database management system in which information is represented in the form of objects as used in object-oriented programming. Object databases are a niche field within the broader database management system (DBMS) market dominated by relational database management systems. Object databases have been considered since the early 1980s and 1990s, but they have made little impact on mainstream commercial data processing, though there is some usage in specialized areas. 


Multidimensional database (MDB) is a type of database that is optimized for data warehouse and online analytical processing (OLAP) applications. Multidimensional databases are frequently created using input from existing relational databases. Conceptually, a multidimensional database uses the idea of a data cube to represent the dimensions of data available to a user. For example, "sales" could be viewed in the dimensions of product model, geography, time, or some additional dimension. In this case, "sales" is known as the measure attribute of the data cube and the other dimensions are seen as feature attributes. Additionally, a database creator can define hierarchies and levels within a dimension (for example, state and city levels within a regional hierarchy).

7.Using the Microsoft Visual Web Developer Web development tool, you can create Web pages that work with data from a variety of sources, including databases, XML files, and business objects. This walkthrough shows you how to work with data in a Microsoft Access database. Access databases do not have the same capacity and are not as scalable as other types of databases, such as Microsoft SQL Server. Generally, if you are creating a Web site that will support only light traffic or a limited number of users, an Access database is sufficient. However, if the Web site will support more throughput or a larger number of users, you should consider using SQL Server or another database that is suited for production Web sites.

8. Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses, cyberextortionist, and cyberterrorist.    

Computer security is a branch of computer technology known as Information Security as applied to computers and networks.

Types of perpetrators:

A hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.

Cracker, sometimes white cracker, is a pejorative term for white people.
Script kiddie or skiddie, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites
Computer Spies are interested in information, not just computers
Cyberextortionist are criminals increasingly using a method known as Distributed Denial of Service (DDOS) attacks.
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses

9. While designing a relational database, it is a good idea to distribute the information in multiple tables. It is not advisable to store all the information in a single table, although it is easier to design. When your database grows in size, the efficiency decreases accordingly, For example, if you are planning to make a simple database of your employees, then you can divide the employees’ information in 3 tables. In one table you can store the contact info, in second you can store the salary and department details and in third table you can store the bonus history of the employees
10. Through Operating system and software patches and updates, Passwords, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall, Get a hardware or software firewall and Get a hardware or software firewall.




Monday, July 25, 2011

QUIZ 7
1. Discuss the components required for successful communications.

Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network.

2. Identify various sending and receiving devices.
Sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
·        Microcomputers
·        Minicomputers
·        Mainframes
·        Internet appliances and web enabled handheld computers

3. Describe uses of computer communications.
 4. List advantages of using a network.
<!--[if !supportLists]-->·                               <!--[endif]-->share software
<!--[if !supportLists]-->·                               <!--[endif]-->share information with others on networks
<!--[if !supportLists]-->·                               <!--[endif]-->share peripherals
<!--[if !supportLists]-->·                               <!--[endif]-->speed of sharing software and information files
<!--[if !supportLists]-->·                               <!--[endif]-->cheaper than buying individual software and hardware for each standalone especially if for a school, network software often offers deals for amount being purchased
<!--[if !supportLists]-->·                               <!--[endif]-->security, files can be copy inhibit mode
<!--[if !supportLists]-->·                               <!--[endif]-->centralized software management- software being loaded onto one computer but also this loads software to entire network at one time
<!--[if !supportLists]-->·                               <!--[endif]-->electronic mail(e-mail) between network users, ideal for office memos
<!--[if !supportLists]-->·                               <!--[endif]-->flexible access- access you files from any computer on the network unlike standalone which would mean only being able to access your data from the one computer you uploaded data onto
5. Differentiate among client/server, peer-to-peer, and P2P networks.
Client/server-describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.
Peer-to-peer (P2P)-computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

6. Describe the various network communications standards.

7. Explain the purpose of communications software.
Communication software is used to provide remote access to systems and is also used to exchange messages in text, audio and video format for the purpose of communication. This software sends and receives data over telephone lines through modems. The communication software allows computers in different geographical regions to communicate with each other through terminal emulators, file transfer programs, chat and instant messaging programs.
8. Describe various types of lines for communications over the telephone network.
9. Describe commonly used communications devices.
Radios are communication systems that send and/or receive electromagnetic waves and consist of a transmitter, receiver, and antenna. Pagers are electronic communications devices that are used to notify or alert a user. Communication received by pagers may be numeric or alphanumeric, depending on the model and complexity of the device.
Other types of communication devices include navigation systems, such as global positioning systems (GPS) instruments and radar systems. GPS communication devices receive satellite communications and use it to provide position information. Radar communication devices use synchronized transmitters and receivers to send radio waves and detect their reflections from objects, surfaces and sub-surface structures.

10. Discuss different ways to set up a home network.

11. Identify various physical and wireless transmission media.
For physical transmission Media there are:
<!--[if !supportLists]-->1.   <!--[endif]-->Twisted-Pair Cable
<!--[if !supportLists]-->2.   <!--[endif]-->Coaxial Cable
<!--[if !supportLists]-->3.   <!--[endif]-->Fiber-Optic Cable
For wireless trasmission media there are:

i. Broadcast Radio
ii. Cellular Radio
iii. Microwaves
iv. Communication Satellite