Unformatted text preview:

CMPE-003: Computer Concepts Final exam Review of Chapters 6, 10, 12, 13, & 14Chapter 6: Storage and Multimedia - The Facts and MoreChapter 10: Security and Privacy: Computers and the InternetChapter 12: Spreadsheets and Business Graphics: Facts and FiguresChapter 14: Systems Analysis and Design: The Big PictureCMPE-003: Computer Concepts Final exam Review of Chapters 6, 10, 12, 13, & 14 Chapter 6: Storage and Multimedia - The Facts and More Important Points: 1. LIST THE BENEFITS OF SECONDARY STORAGE a. Space b. Reliability c. Convenience d. Economy 2. IDENTIFY AND DESCRIBE STORAGE MEDIA AVAILABLE FOR PERSONAL COMPUTERS a. Magnetic disk storage i. data represented in magnetic spots 1. magnetized spot = 1 (generates an electronic impulse) 2. non-magnetized spot = 0 (does not generate an electronic impulse) b. Optical disk storage i. data is written with a laser ii. read-only media iii. Write-Once, Read-Many media (WORM) iv. Magneto-Optical (MO) v. Compact Disks 1. Compact Disk Read-Only Memory (CD-ROM) 2. Compact Disk-Recordable (CD-R) 3. Compact Disk-Rewritable (CD-RW) vi. Digital Versatile Disk 1. Digital Versatile Disk Read-Only Memory (DVD-ROM) 2. Writable version of Digital Versatile Disk (DVD-RAM) c. Magnetic tape storage i. data represented in magnetic spots ii. primarily used for backup 3. DIFFERENTIATE AMONG THE PRINCIPAL TYPES OF SECONDARY STORAGE a. Diskette i. low capacity – small files ii. portable iii. flexible Mylar coated with metallic substance iv. hard plastic jacket for protection v. 3 ½ inch vi. 1.44 MB b. High-capacity portable disks i. larger files ii. portable iii. 120/200 MB iv. zip disk – 250 MB c. Hard Disk i. various sizesii. non-portable iii. rigid platter coated with metallic substance iv. disk pack – several platters combined to handle storage needs d. Optical disk i. laser writes on metallic material spread over the surface of disk ii. technology 1. read-only media 2. WORM (Write-Once, Read-Many media) 3. Magneto-Optical (MO) • • • • • • • • • • • • • • • • • • • hybrid high-volume capacity written multiple times iii. Compact Disks (CD) 1. CD-ROM (Compact Disk Read-Only Memory) high-capacity portable read multiple times cannot record 2. CD-R (Compact Disc-Recordable) high capacity portable write once read multiple times 3. CR-RW (Compact Disk-Rewritable) high capacity portable read multiple times record multiple times iv. DVD Digital Versatile Disk) 1. DVD-ROM larger capacity than CD-ROM data is packed more densely read multiple times cannot record 2. DVD-RAM writable version of DVD e. Magnetic tape storage i. plastic tape with magnetic coating ii. inferior to disks 1. not as reliable 2. sequential access to data iii. inexpensive iv. primarily for backup 4. DESCRIBE HOW DATA IS STORED ON A DISK a. Read/write operation i. disk drive reads and writes ii. disks rotate in the disk drive iii. access arm moves read/write head over a particular location iv. read/write operation begins and continues until complete v. data is transferred to/from memory b. Logical layout of a diski. tracks 1. concentric circles ii. sector 1. pie-shaped divisions 2. holds a fixed number of bytes (512 bytes) iii. each track and sector stores the same amount of data 1. data packed densely on inner tracks 2. outer tracks do not store data as efficiently iv. zone recording 1. assigns more sectors to tracks in outer zones 2. more sectors = more data storage available v. cluster 1. adjacent sectors treated as a unit of storage 2. fixed number (two to eight sectors) 3. minimum space allocated to a file vi. cylinder 1. same track on each platter 2. files too large for one track are stored in cylinder (across multiple platters) 5. DISCUSS THE BENEFITS OF MULTIMEDIA a. Presents information with text, illustrations, photos, narration, music, animation, film clips b. See and hear c. Support for animation d. Enhances business and education 6. EXPLAIN HOW DATA IS ORGANIZED, ACCESSED, AND PROCESSED a. Organization i. character ii. field iii. record iv. file v. database b. Access i. sequential ii. direct iii. indexed c. Processing i. business processing 1. transaction – updates a record 2. master file – contains all the data ii. types 1. batch • • • • • • collect transactions update periodically 2. transaction processed immediately real-time – online terminals connected to the computer that returns results immediately immediate access to stored data immediate updating of stored data3. computer system may use both processing types based upon the application • • • Chapter 10: Security and Privacy: Computers and the Internet Important Points: 1. EXPLAIN THE DIFFERENT TYPES OF COMPUTER CRIME AND THE DIFFICULTIES OF DISCOVERY AND PROSECUTION. a. Computer crime often involves stealing and using or selling company and personal data. b. Employers and individuals need to recognize the possible danger from computer systems and protect their assets. c. Data communications capabilities provide new challenges. Home computers can be used to invade computer systems. d. Computers can be used to transfer or change assets in the criminal’s favor. e. Discovery i. difficult ii. accidental iii. 85% of computer crimes are never reported f. Prosecution i. victims lack technical knowledge to understand the crime ii. computer fraud and abuse act – 1986 1. computer criminals subject to fines jail time confiscation of hardware iii. computer forensics 1. uncovering computer-stored information suitable for use in course of law 2. DESCRIBE THE DIFFERENT ASPECTS OF SECURING CORPORATE DATA, INCLUDING SOFTWARE AND DATA SECURITY, DISASTER RECOVERY PLANS, AND SECURITY LEGISLATION. a. Protect a computer system and data from deliberate or accidental damage b. Provide access to authorized individuals only i. what you have ii. what you know iii. what you do iv. what you are c. Disaster recovery plan i. restoring computer processing operations and data files if operations are halted or files are damaged by major destruction ii. approaches 1. use manual services temporarily 2. purchase time from a service bureau 3. mutual aid pact 4. consortium d. Software security i. company ownership if programmer is employeeii. contractual agreement governs ownership if the programmer is not an employee iii. software can


View Full Document

UCSC CMPE 003 - CMPE-003 Final Exam Review

Download CMPE-003 Final Exam Review
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CMPE-003 Final Exam Review and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CMPE-003 Final Exam Review 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?