Review - Midterm #3

Download Report

Transcript Review - Midterm #3

Slide 1

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 2

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 3

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 4

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 5

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 6

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 7

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 8

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 9

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 10

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 11

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 12

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 13

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 14

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 15

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 16

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 17

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 18

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 19

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 20

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 21

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 22

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 23

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 24

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 25

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 26

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 27

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 28

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 29

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 30

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 31

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 32

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 33

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 34

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 35

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 36

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 37

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 38

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 39

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 40

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 41

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 42

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 43

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 44

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 45

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 46

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 47

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 48

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 49

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 50

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 51

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 52

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 53

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 54

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 55

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 56

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 57

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 58

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 59

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 60

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 61

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 62

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 63

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 64

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 65

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 66

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 67

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 68

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 69

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 70

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 71

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 72

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 73

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 74

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 75

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 76

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 77

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 78

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 79

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 80

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 81

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 82

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 83

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 84

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 85

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 86

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 87

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 88

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 89

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 90

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 91

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 92

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 93

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 94

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 95

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 96

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 97

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 98

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 99

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100


Slide 100

Welcome to CMPE003
Personal Computers:
Hardware and
Software
Dr. Chane Fullmer
Fall 2002
UC Santa Cruz

Class Information


Midterm #3
– Tuesday, December 3
– 4:00PM to 7:00PM
• (Or until we’re done..should take about 1 hour)

No Chapter 17 on Midterm #3
 No class meeting Wednesday, 11/27
 Last section is Tuesday, 11/26


November 25, 2002

2

Final Project


Due by December 3rd, at beginning of final
period
– May be turned in earlier 



Power Point Presentation
– Min 4 pages – Max 6
– 30% of grade based on your creativity
• Go crazy here…
– Pts for video (of self ), music, animations, sounds
– Pts for PPT tricks, styles, animations, buttons, etc..

– If you add animation or other special effects, include a
floppy/CD with your printout
– Emailed assignments will be rejected 
November 25, 2002

3

Midterm #3
Review

November 25, 2002

4

Security and Privacy:
Computers and the Internet
Chapter 11

Computer Crime
Stealing and using or selling of data:
Company data
Personal information in company files

November 25, 2002

6

Data, not equipment (cont)
Ways to secure data









Locked servers
Removable hard drives that are locked away when not in
use
Hard disk drives requiring special tools for detachment
Physical cages around computers that prohibit access
Passwording files

November 25, 2002

7

White-hat hackers



Professional Hackers..
Computer professionals hired to illicitly gain entry
into a system
– Reveal weak points
– Protect the points
– May not alert its own employees of the testing






Tiger teams
Intrusion tester
White hat hackers

November 25, 2002

8

Computer Crimes


Bomb
– Program to trigger damage
– Scheduled to run at a later date
– May be found in software for general public, especially
shareware



Data diddling
– Changing data before or as it enters the system



Denial of service attack (DOS)
– Hackers bombard a site with more request for service than it
can possible handle
– Prevents legitimate users from accessing the site
– Appearance of requests coming from many different sites
simultaneously

November 25, 2002

9

Computer Crimes


Salami technique
– Embezzlement
– A “little slice” from every transaction can add up 



Scavenging
– Search garbage and recycling bins for personal information



Trapdoor
– Illicit program left within a completed legitimate program
– Permits unauthorized and unknown entry to the program



Trojan horse
– Illegal instructions placed inside a legitimate program
– Program does something useful and destructive at the same time

November 25, 2002

10

Computer Crimes


Discovery
– Difficult
– Accidental
– 85% of computer crimes are never reported



Prosecution
– Legal representatives lack technical knowledge
to understand the crime

November 25, 2002

11

Security
System of safeguards designed to protect a
computer system and data from deliberate or
accidental damage






Natural disasters
Fire
Accidents
Vandalism

November 25, 2002







Theft
Theft or destruction of
data
Industrial espionage
Hackers
12

Security
Identification and Access



Provide access to authorized individuals only
Uses one of more of the following systems
– What you have
• Key, badge, token, etc..

– What you know
• Password, PIN number

– What you do
• Signature

– What you are
• Biometrics – fingerprint, retinal scan
November 25, 2002

13

Security
The Internet
The Internet is NOT Secure
Firewall
Dedicated computer that governs
interaction between internal
network and the Internet

Encryption
Data Encryption Standard (DES)
November 25, 2002

14

Disaster Recovery Plan
Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction

November 25, 2002

15

Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year

November 25, 2002

16

Backup
What Can Cause Data Loss?






Incorrect software use
Input data incorrectly
Software may harm data
Hard disk malfunctions
Accidentally delete files
– “format c:” – oops…



Virus infection

November 25, 2002

17

Viruses
 Illicit

instructions that pass themselves
on to other programs
– Benign
– Damaging to computer

 Digital

November 25, 2002

vandalism

18

Viruses
Vaccine or antivirus software




Stops the spread of and eradicates the virus
Install software
Download signature files (ie, updates)
regularly

November 25, 2002

19

Viruses


Retrovirus
– Fights the vaccine and may delete the antivirus
software



Costs
– Billions of dollars a year
– Aggravation to individual users

November 25, 2002

20

Virus
Getting Infected






Executing the virus program
Booting from a diskette containing an infected
boot sector including accidentally leaving a “nonsystem disk” in the floppy drive
Downloading an infected file and executing it
Opening an infected e-mail attachment
– Including M$ Word documents



By viewing e-mail in some versions of Microsoft
Outlook

November 25, 2002

21

Privacy
Where is my data?
 How is it used?
 Who sees it?
 Is anything private anymore?


Everything about you is in at least
one computer file
November 25, 2002

22

Privacy
Monitoring by Web Sites
Records:






City
Site you just left
Everything you do while on the site
Hardware and software you use
Click stream
– Series of clicks that link from site to site
– History of what the user chooses to view

November 25, 2002

23

Privacy
Monitoring by Web Sites
Cookies




Stores information about you
Located on your hard drive
Beneficial uses

– Viewing preferences
– Online shopping
– Secure sites retain password in cookie



Controversial use

– Tracking surfing habits for advertisers





Can set browser to refuse cookies or warn before
storing
Software available to manage cookies

November 25, 2002

24

Word Processing
and
Desktop Publishing:
Printing It
Chapter 12

Word Processing
Software that assists in preparation and
printing of text documents
WYSIWYG 
What you see is what you get..

November 25, 2002

26

Word Processing
Features


Insertion point – blinking cursor
– Where will the next typed character appear?



Scrolling
– Screen is window into document
– Brings other parts of document into view

November 25, 2002

27

Word Processing
Features


Word wrap

– Automatically determines when to go to a new
line
• Justifies text automatically

to signal end of paragraph


Easy corrections





(deletes to the left)

(deletes to the right)
Undo
(<^Z> in M$ Word)
Insert vs. overwrite mode ()

November 25, 2002

28

Formatting Features
Adjust the physical appearance of the document





Vertical centering
Line centering
Margins
– Default can be changed
– Automatic reformatting of text




Tabs
Indentation
– Ordered, unordered lists

November 25, 2002

29

Formatting Features


Justification
– Fully justified
– Left justified – ragged-right
– Right justified – ragged-left




Line spacing
Bullets and Numbering

November 25, 2002

30

Font
Weight – visual heaviness, thickness
 Style – visual design of letters
 Point size


– Point – 1/72 inch
– Measured from top of highest rising letter to
bottom of lowest descending letter

November 25, 2002

31

Leading and Kerning


Leading
– Space between the lines of type
– Vertical measurement from base of one line to base of
next
– Measured in points



Kerning
– Space between characters
– Each font has a default kerning

November 25, 2002

32

Ergonomics
Study of the interaction of
humans and machines

November 25, 2002

33

Ergonomics
Types of Injury


Repetitive stress injury (RSI)
– Carpal tunnel syndrome

Eyestrain
 Back problems


November 25, 2002

34

Ergonomics
Tips to Prevent Injury


Reduce glare
– Window glare
– Glare deflector
– No overhead lights



Avoid arm and wrist fatigue
– Place keyboard in low position
– Do not bend wrists
– Use a wrist rest

November 25, 2002

35

Ergonomics
Tips to Prevent Injury
Support your lower back with the
appropriate seat
 Sit with your feet firmly on the floor
 Enlarge fonts (or overall document) while
editing then return them to their normal size


November 25, 2002

36

Spreadsheets
and
Business Graphics:

Facts and Figures
Chapter 13

Why Use Spreadsheets?
Plan ahead (What if)
 Make the computer do the work
 See the results of change


November 25, 2002

38

Electronic Spreadsheets
Labor Saving
Automatic recalculation
Change one value
 All dependent values are recalculated
 A single change can affect many
calculations


November 25, 2002

39

Electronic Spreadsheets
Labor Saving
“What If” Analysis
The process of changing one or more spreadsheet values
and observing the resulting calculated effect

What if we reduce the price by 5%?

What if we buy a home and the mortgage rate
increases (or decreases) by .5%?
November 25, 2002

40

Electronic Spreadsheets
Fundamentals


Screen
– Window into the spreadsheet
– Scroll using mouse or cursor-movement
keys



Rows and columns
– Row – number
– Column – letters

November 25, 2002

41

Electronic Spreadsheets
Fundamentals


Cell
– Junction of a row and column
– Cell address (cell reference) – letter and
number



Active cell (current cell)
– Highlighted with border or reverse video
– Can enter or edit data in active cell only

November 25, 2002

42

Cell Contents


Label
– Descriptive text
about entries
– Not used for
calculations



Value
– Number
– May be used in
calculations

November 25, 2002

43

Cell Contents
Formula


Calculation instruction
=M5+N5+((O5+2)*0.3)+(P5*0.3)+(Q5*0.3)+R5



Contains







Cell address
One or more arithmetic operators
Functions

Result appears in the cell containing the formula
Calculation appears in the formula bar

November 25, 2002

44

Cell Contents
Functions






Pre-programmed formulas
=AVERAGE(L5:L189)
Used in formulas in place
of operators
Common






SUM
AVERAGE
COUNT
MIN
MAX

November 25, 2002

45

Cell Ranges








November 25, 2002

Group of one or more
adjacent cells occurring in
a rectangular shape
Treated as a unit during an
operation
Indicate the upper-left and
lower-right cells of the
block
May be referenced in a
formula or function
46

Formatting Features








Column width
Row height
Headings
Number styles – commas, number of
decimals, dollar and percent signs
Appearance of data
– Justification
– Text font and style

November 25, 2002

47

Excel features – HW#6


To use a function, type in formula bar/cell:
=SUM(A1:A4), result value shows in cell



To highlight cells based on their value
– Format->Conditional Formatting
• Set color, pattern, font, border



To include row/column headings in printouts
– File->Page Setup -> Sheet
• Select Row and column headings

November 25, 2002

48

Business Graphics








Generate and sustain the interest of an audience
Make a lesson, report, or business document
more attractive
Help get a point across
Can reveal a trend that is lost in a column of
numbers
Presenter appears more prepared and organized

November 25, 2002

49

Line Graphs
• Axis
• Plot area

• Data point
• Labels
• Titles

Shows trends or cycles over time
November 25, 2002

50

Bar Graphs





Comparisons
Rectangular area up to the height of the point being
plotted
Easy to absorb

November 25, 2002

51

Pie Charts


Proportions
Relationship between parts and whole





One time period
Exploded pie chart
One wedge pulled slightly away from the pie

November 25, 2002

52

Database Management:
Getting Data Together
Chapter 14

Computer Databases
Track information
 Allows higher productivity as a result of
better information


November 25, 2002

54

Hierarchy of Data


Field
– Smallest meaningful unit of data
– Group of one or more characters that has a specific
meaning
– Used as “key” to locate records



Record
– Set of fields containing all information known about one
entity
– Each record contains the same fields in the same sequence



File
– Collection of related records
November 25, 2002

55

Sequential Access
Records are stored and accessed in order
 All records prior to the one requested
must be read
 Magnetic tape storage idea for this type of
file.


November 25, 2002

56

Direct / Random Access



Records are not physically stored in any order
Go directly to the record to read
– Hashing – apply a formula to the key to produce the
address of the record
– Collision – same address from different keys



Updating in place
– Read, change, and return a record to the same place
on disk



DASD – Direct-Access Storage Device needed
– ie, Disk Drive
November 25, 2002

57

Batch Processing




Collect transactions into a transaction file and perform
periodic updates
Process








Transactions are sorted by key field
Computer matches the master and transaction keys
Performs requested action – add, revise, delete
New master file created
Error report is printed

Master file only current immediately after processing
November 25, 2002

58

Transaction Processing




Processed upon request
Real-time – process handled immediately
Disk storage
– Direct access to desired record needed
• Immediate access to stored data
• Immediate updating of stored data

November 25, 2002

59

Database Models


Database Types







Relational
Object-oriented
Hierarchical
Network

Each type structures, organizes and uses
data differently

November 25, 2002

60

Relational Database


Organizes data into related tables
– (files)

Table consists of rows and columns
 Tables linked based upon a common field


– (key)

November 25, 2002

61

Relational Database
Key


Primary key
– A field whose value uniquely identifies a record



Foreign key
– Primary key of another table
– Used as link to other table
– May have duplicate values

November 25, 2002

62

Data Integrity



Degree to which data is accurate and reliable
Integrity constraints – rules
– Acceptable values for a field (range, type)
– Primary key values
– Foreign keys



Integrity constraints must be enforced when data is
entered or data is unreliable
– GIGO (Garbage in, garbage out)
November 25, 2002

63

DBMS
Database Management System
Basic functions





Create a database
Enter data
Modify the data as required
Retrieve information from the database

November 25, 2002

64

DBMS
Data Retrieval
Extracting the desired data from the
database
 Primary forms


– Queries
– Reports

November 25, 2002

65

Query
Ask a question about the data
 Present criteria that selects data from the
database
 Results in smaller portion of the database


– Zero or more records can be retrieved


Query Language
– Prepare your query using English-like statements
– Proprietary query language in DBMS

November 25, 2002

66

Concurrency Control
Databases are used concurrently by many
users
 Problem if several users attempt to update the
same record at the same time
 Record locking


– First user requests record
– Others are locked out for update

November 25, 2002

67

Looking at the Data
Data Warehouses
Databases are designed to support ongoing
operations
 Data is captured from the db over time


– Summary form
– Regularly scheduled basis


May include data from external sources
– Ie, NYSE, weather, etc…

November 25, 2002

68

Systems Analysis and Design:
The Big Picture
Chapter 15

Systems Analysis and Design
What is it?


Systems analysis
Process of studying an existing system to
determine how it works and how it meets user
needs



Systems design
Process of developing a plan for an improved
system, based upon the results of the systems
analysis

November 25, 2002

70

SDLC
Systems Development Life Cycle
Preliminary investigation
 Analysis
 Design
 Development
 Implementation


November 25, 2002

71

SDLC
Preliminary Investigation
Feasibility study / System survey
 Determine the problem
 Describe the problem
 Understand management decisions


– Organizational chart, informal hierarchy

Results in a rough plan and what to do
November 25, 2002

72

SDLC
Analysis


Understand the existing system
– Gather data
– Analyze data



Establishes current system requirements

November 25, 2002

73

SDLC
Design
Planning the new system
 Two phases


– Preliminary design
– Detail design

November 25, 2002

74

SDLC
Preliminary Design
Create an overall plan
 Offer alternatives that meet requirements
 Explain differences
 Evaluate costs
 Build a prototype


November 25, 2002

75

SDLC
Detail Design
Parts of detail design phase








Output requirements
Input requirements
Files and databases
Systems processing
Systems controls and backup

November 25, 2002

76

SDLC
Development


Programming
– Refine the design
– Detailed logic flowcharts and pseudocode



Testing
– Unit testing
– System testing
– Volume testing
November 25, 2002

77

SDLC
Implementation











Converting to the new system
Training
Equipment conversion
File conversion
System conversion
Auditing
Evaluation
Maintenance
– Ongoing for the life of the system

November 25, 2002

78

Programming Languages:
Telling the Computers
What to Do
Chapter 16

What is a Program?
A set of instructions written in a
programming language that tells the
computer what to do

November 25, 2002

80

The Programming Process
Defining the problem
 Planning the solution
 Coding the program
 Testing the program
 Documenting the program


November 25, 2002

81

The Programming Process
Defining the Problem
What is the input
 What output do you expect
 How do you get from the input to the
output


November 25, 2002

82

The Programming Process
Planning the Solution


Algorithms
– Detailed solutions to a given problem
• Sorting records, adding sums of numbers, etc..



Design tools
– Flowchart
– Pseudocode
• Has logic structure, but no command syntax



Desk-checking
– Personal code design walk through



Structured walk through
– “Code walk through” – peer examination of source code
November 25, 2002

83

The Programming Process
Coding the Program
Translate algorithm into a formal
programming language
 Within syntax of the language
 How to key in the statements?


– Text editor
– Programming environment
• Interactive Development Environment (IDE)
November 25, 2002

84

The Programming Process
Testing the Program


Translation – compiler
– Translates from source module into object module
– Detects syntax errors



Link – linkage editor (linker)
– Combines object module with libraries to create
load module
– Finds undefined external references



Debugging
– Run using data that tests all statements
– Logic errors
November 25, 2002

85

The Programming Process
Documenting the Program



Performed throughout the development
Material generated during each step








Problem definitions
Program plan
Comments within source code
Testing procedures
Narrative
Layouts of input and output
Program listing

November 25, 2002

86

Language Generations
Low levels closer to binary
 High levels closer to human code
 Five Generations:


– Procedural Languages

• Machine language
• Assembly language
• High-level language – 3GL

– Nonprocedural Languages

• Very high-level language – 4GL
• Natural language – 5GL

November 25, 2002

87

Machine Language


Written in strings of 0 and 1
– Displayed as hexadecimal

Only language the computer
understands
 All other programming languages
are translated to machine language
 Computer dependent


November 25, 2002

88

Assembly Language


Mnemonic codes
– Add, sub, tst, jmp…

Names for memory locations
 Computer dependent
 Assembler translates from Assembly to
machine language


November 25, 2002

89

3GL
High-Level Languages



1960s
Languages designed for specific types of
problems and used syntax familiar to the
people in that field
– FORTRAN: (FORmula TRANslator)
• Math

– COBOL: (COmmon Business Oriented Language)
• Business


Compilation translates from high-level
language to machine language
November 25, 2002

90

4GL
Very High-Level Languages
Programmer specifies the desired results;
the language develops the solution
 Ten times more productive with a 4GL
than a procedural language
 Query Languages


– Retrieve information from databases
– Easy to learn and use
November 25, 2002

91

5GL
Natural Languages






Resemble natural or
spoken English
Translates human
instructions into
code the computer
can execute
Commonly used by
non-programmers to
access databases
November 25, 2002

92

Third Generation Languages
Traditional Programming
 Describe

data
 Describe procedures or operations
on that data
 Data and procedures are separate

November 25, 2002

93

Third Generation Languages


FORTRAN (FORmula TRANslator)
– 1954
– Represent complex mathematical formulas
– C/C++ has replaced FORTRAN



COBOL (Common Business Oriented Language)





1959
Business
Large complex data files
Formatted business reports

November 25, 2002

94

Third Generation Languages


BASIC (Beginners All-purpose Symbolic Instruction
Code)
– 1965
– Popularity grew with PC popularity (1970s)
– Easy to learn
– Used little memory
– Bill Gates beginnings.. M$ Basic



RPG (Report Program Generator)
– 1965
– Report generation – quickly creates complex reports
November 25, 2002

95

Third Generation Languages


C
– 1972
– Efficient code – the language of UNIX
– Portability



C++
– Enhancement of C (Object Oriented)



M$ Visual Basic





1987
Create complex user interfaces
Uses standard Windows features
Event-driven – user controls the program

November 25, 2002

96

Third Generation Languages
Java
Cross-platform
 Java Virtual Machine (JVM)


– Sits on top of computer’s regular platform
– Translates compiled Java code into instructions
for the specific platform


Applets

November 25, 2002

97

Javascript & Power Point


From HW #5
– Something related to example file



From Final Project – Power Point
– Something from command set

November 25, 2002

98

November 25, 2002

99

November 25, 2002

100