Huwebes, Agosto 4, 2011

Quiz 8 part 1

1. Define the term, database, and explain how a database interacts with data
and information.

database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies). The term "database" refers both to the way its users view it, and to the logical and physical materialization of its data, content, in files, computer memory, and computer data storage. This definition is very general, and is independent of the technology used. However, not every collection of data is a database; the term database implies that the data is managed to some level of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn often implies the use of a general-purpose Database management system (DBMS). A general-purpose DBMS is typically a complex software system that meets many usage requirements, and the databases that it maintains are often large and complex.
The term database is correctly applied to the data and data structures, and not to the DBMS which is a software system used to manage the data. The structure of a database is generally too complex to be handled without its DBMS, and any attempt to do otherwise is very likely to result in database corruption. DBMSs are packaged as computer software products: well-known and highly utilized products include the Oracle DBMS, Access and SQL Server from Microsoft, DB2 from IBM and the Open source DBMS MySQL. Each such DBMS product currently supports many thousands of databases all over the world. The stored data in a database is not generally portable across different DBMS, but can inter-operate to some degree (while each DBMS type controls a database of its own database type) using standards likeSQL and ODBC. A successful general-purpose DBMS is designed in such a way that it can satisfy as many different applications and application designers as possible. A DBMS also needs to provide effective run-time execution to properly support (e.g., in terms ofperformance, availability, and security) as many end-users (the database's application users) as needed. Sometimes the combination of a database and its respective DBMS is referred to as a Database system (DBS).


Database integrity ensures that data entered into the database is accurate, valid, and consistent. Any applicable integrity constraints anddata validation rules must be satisfied before permitting a change to the database.
Three basic types of database integrity constraints are:
  • Entity integrity, not allowing multiple rows to have the same identity within a table.
  • Domain integrity, restricting data to predefined data types, e.g.: dates.
  • Referential integrity, requiring the existence of a related row in another table, e.g. a customer for a given customer ID.


2. Describe file maintenance techniques (adding records, modifying records,deleting records) and validation techniques.

Database storage

Database storage is the container of the physical materialization of a database. It comprises the Internal (physical) level in the Database architecture above. It also contains all the information needed (e.g., metadata, "data about the data", and internal data structures) to reconstruct the Conceptual level and External level from the Internal level when needed. Though typically accessed by a DBMS through the underlying Operating system (and often utilizing the operating systems' File systems as intermediates for storage layout), storage properties and configuration setting are extremely important for the efficient operation of the DBMS, and thus are closely maintained by database administrators. A DBMS, while in operation, always has its database residing in several types of storage (e.g., Computer memory and external Computer data storage), as dictated by contemporary computer technology. The database data and the additional needed information, possibly in very large amounts, are coded into bits. Data typically reside in the storage in structures that look completely different from the way the data look in the conceptual and external levels, but in ways that attempt to optimize (the best possible) these levels' reconstruction when needed by users and programs, as well as for computing additional types of needed information from the data (e.g., when querying the database).
In principle the database storage (as computer data storage in general) can be viewed as a linear address space (a tree-like is a more accurate description), where every bit of data has its unique address in this address space. Practically only a very small percentage of addresses is kept as initial reference points (which also requires storage), and most of the database data is accessed by indirection using displacement calculations (distance in bits from the reference points) and data structures (see below) which define access paths (using pointers) to all needed data in effective manner, optimized for the needed data access operations.


The data

  • Data is encoded by assigning a bit pattern to each language alphabet character, digit, other numerical patterns, and multimedia object. Many standards exist for encoding (e.g., ASCII, JPEG, MPEG-4).
  • By adding bits to each encoded unit, the redundancy allows both to detect errors in coded data and to correct them based on mathematical algorithms. Errors occur regularly in low probabilities due to random bit value flipping, or "physical bit fatigue," loss of the physical bit in storage its ability to maintain distinguishable value (0 or 1), or due to errors in inter or intra-computer communication. A group of malfunctioning physical bits (not always the specific defective bit is known; group definition depends on specific storage device) is typically automatically fenced-out, taken out of use by the device, and replaced with another functioning equivalent group in the device, where the corrected bit values are restored (if possible; typically using the Cyclic redundancy check (CRC) method).

Data compression
Data compression methods allow in many cases to represent a string of bits by a shorter bit string ("compress") and reconstruct the original string ("decompress") when needed. This allows to utilize substantially less storage (tens of percents) for many types of data at the cost of more computation (compress and decompress when needed). Analysis of trade-off between storage cost saving and costs of related computations and possible delays in data availability is done before deciding whether to keep certain data in a database compressed or not.
Data compression is typically controlled through the DBMS's data definition interface, but in some cases may be a default and automatic.

Data encryption
For security reasons certain types of data (e.g., credit-card information) may be kept encrypted in storage to prevent the possibility of unauthorized information reconstruction from chunks of storage snapshots (taken either via unforeseen vulnerabilities in a DBMS, or more likely, by bypassing it).
Data encryption is typically controlled through the DBMS's data definition interface, but in some cases may be a default and automatic.


Data storage types

As it is common in current computer technology the database consists of bits (a binary-digit which has two states: either 0 or 1). This collection of bits describes both the contained database data and its related metadata (i.e., data that describes the contained data and allows computer programs to manipulate the database data correctly). The size of a database can nowadays be tens of Terabytes, where a byte is eight bits. The physical materialization of a bit can employ various existing technologies, while new and improved technologies are constantly under development. Common examples are:
  • Magnetic medium (e.g., in Magnetic disk) - Orientation of magnetic regions on a surface of material (two directions, for 0 and 1).
  • Dynamic random-access memory (DRAM) - State of a miniature electronic circuit consists of few transistors (two states for 0 and 1).
These two examples are respectively for two major storage types:
  • Nonvolatile storage can maintain its bit states (0s and 1s) without electrical power supply, or when power supply is interrupted;
  • Volatile storage loses its bit values when power supply is interrupted (i.e., its content is erased).
Sophisticated storage units, which can, in fact, be effective dedicated parallel computers that support a large amount of nonvolatile storage, typically must include also components with volatile storage. Some such units employ batteries that can provide power for several hours in case of external power interruption (e.g., see the EMC Symmetrix) and thus maintain the content of the volatile storage parts intact. Just before such a device's batteries lose their power the device typically automatically backs-up its volatile content portion (into nonvolatile) and shuts off to protect its data.
Databases are usually too expensive (in terms of importance and needed investment in resources, e.g., time, money, to build them) to be lost by a power interruption. Thus at any point in time most of their content resides in nonvolatile storage. Even if for operational reason very large portions of them reside in volatile storage (e.g., tens of Gigabytes in computer volatile memory, for in-memory databases), most of this is backed-up in nonvolatile storage. A relatively small portion of this, which temporarily may not have nonvolatile backup, can be reconstructed by proper automatic database recovery procedures after volatile storage content loss.
More examples of storage types:
  • Volatile storage can be found in processors, computer memory (e.g., DRAM), etc.
  • Non-volatile storage types include ROM, EPROM, Hard disk drives, Flash memory and drives, Storage arrays, etc.

3. Discuss the terms character, field, record, and file

In computer and machine-based telecommunications terminology, a character is a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.
Examples of characters include letters, numerical digits, and common punctuation marks (such as '.' or '-'). The concept also includes control characters, which do not correspond to symbols in a particular natural language, but rather to other bits of information used to process text in one or more languages. Examples of control characters include carriage return or tab, as well as instructions to printers or other devices that display or otherwise process text.
Characters are typically combined into strings.

In computer science, data that has several parts can be divided into fields. Relational databases arrange data as sets of database records, also called rows. Each record consists of several fields; the fields of all records form the columns.
In object-oriented programming, field (also called data member or member variable) is the data encapsulated within a class or object. In the case of a regular field (also called instance variable), for each instance of the object there is an instance variable: for example, an Employee class has a Name field and there is one distinct name per employee. A static field (also called class variable) is one variable, which is shared by all instances.

In computer science, records (also called tuplesstructs, or compound data) are among the simplest data structures. A record is a value that contains other values, typically in fixed number and sequence and typically indexed by names. The elements of records are usually called fields or members.
For example, a date may be stored as a record containing a numeric year field, a month field represented as a string, and a numeric day-of-month field. As another example, a Personnel record might contain a name, a salary, and a rank. As yet another example, a Circle might contain a center and a radius. In this instance, the center itself might be represented as a Point record containing x and y coordinates.
Records are distinguished from arrays by the fact that their number of fields is typically fixed, each field has a name, and that each field may have a different type.

 file is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage. A file is durable in the sense that it remains available for programs to use after the current program has finished. Computer files can be considered as the modern counterpart of paper documents which traditionally are kept in offices' and libraries' files, and this is the source of the term.

Huwebes, Hulyo 21, 2011

7TH QUIZ 2ND part



7. Explain the purpose of communications 

software.

Communication software is used to provide

 remote access to systems and exchange files 

and messages in text, audio and/or video 

formats between different computers or user 

IDs. This includes terminal emulators, file

 transfer programs, chat and instant messaging programs, as well as similar functionality integrated within MUDs.



8. Describe various types of lines for communications 
over the telephone network.
       
   The word telephone
 comes from the Greek words
tele, meaning “far,” and phone, meaning "sound," and
refers to a telecommunications device that allows the
  1. human voice to travel across great distances. There are different types of telephones and corresponding types oftelephone systems. The three main types of telephone systems are Plain Old TelephoneService, cellular wireless phones, and Internet Protocol phones.



    Land-line telephone systems are part of the Plain Old
Telephone Service (POTS), the analog service with copper 

wiring that is the direct great-grand-baby of the original

 telephone system courtesy of Alexander Graham Bell. 

The advantages include standardized equipment, predictable 

sound quality, and — due to direct connections to the central 

office of the company — no need to share the system’s 

capacity with others. Because switches are in place, creating 

a private circuit for each phone call, it is also called the Public

Switched Telephone Network (PSTN). A new-fangled term, 

given the recent alternatives, is “landlines.”




  Internet Protocol (IP) telephone systems, also called Voice

 over Internet Protocol (VoIP), are another group of the

 telephone systems that are in use in the 21st century. This

 type oftelephone service piggy-backs on existing Internet 

service, either cable service or DSLbroadband. A device 

called an Analog Telephone Adaptor is the go between that

 connects whatever phone you happen to have with either

 your broadband modem—or your router, if you have one.



9. Describe commonly used communications devices.

Automated Voice Answering Systems 
Automated voice answering systems are used to take messages and to provide 
automated information retrieval requests. 







GPS Instruments and Modules
Global positioning system (GPS) instruments and GPS modules are radio-navigational
devices that provide accurate position information about objects on Earth, 
based on information from orbiting satellites.



Intercoms 
Intercoms are an electronic communications system generally composed of fixed microphone/speaker
units connected to a central control device.



Magnetic Receivers 
Magnetic receivers use the electromagnetic principle to receive and analyze signals. 
The simplest of these devices is the telephone.





Navigational Instruments 
Navigational instruments include products such as distance meters, range finders and mapping systems.
 


Pagers
Pagers are electronic communications devices that are used to notify or alert a user about an event.
They beep, vibrate, flash, display text, and use other alerts or methods of notification. 




Phone Switchboards
Phone switchboards are used for routing telephone calls and adding advanced features to telephone systems.





Radar Systems and Products 
Radar systems and radar products have synchronized transmitters and receivers that send radio waves and detect their reflections from objects, surfaces or sub-surface structures. 







Radios 
Radios are communication systems that send and/or receive electromagnetic waves. Devices such as citizens’ band (CB) radios, walkie-talkies, and handie-talkies are two-way radios that can be used for interpersonal communications.

 




Telephone Components and Accessories  
Telephone components and telephone accessories are used in telephone systems.






Telephones and Cellular Phones 
Telephones and cellular phones convert voice or other sound signals into a form that can be transmitted to another device that receives and reconverts the waves back into sound. 





10. Discuss different ways to set up a home network.

A home network is a must-have in the modern household. However, it's never as simple as merely connecting device A to device B.

What do you need from your network?

Before whipping out your credit card and buying up gear, figure out what you're trying to accomplish with your home network.
Are you just looking to connect a couple of laptops and maybe a Wi-Fi-equipped mobile phone to the internet for web access?
  •      You might be able to get by with a single 802.11n access point (802.11n is the current fastest Wi-Fi standard, offering throughput up to 300Mb per second). Do you work at home frequently, and require access to a corporate network through VPN (virtual private network) technology? You'll need a good router that can handle VPN passthrough.
  • Are you a serious online gamer? Do you connect to massively multiplayer online games or through services like PlayStation Network or Xbox Live frequently? You'll need not only to buy a good router but also to steep yourself in key router capabilities such as port forwarding.
  • Do you watch TV through the internet, using services like Hulu or the networks' own websites? If you're streaming video from the internet to multiple locations in your home, you'll want a reliable networking infrastructure - probably a wired network.
  • Determining the answers to such questions will go a long way toward ensuring that you build a network suitable for your home without spending too much in the process.






11. Identify various physical and wireless transmission media.
  

Wireless Media

Transmission of waves take place in the electromagnetic (EM) spectrum. The carrier frequency of the data is expressed in cycles per second called hertz(Hz). Low frequency signals can travel for long distances through many obstacles but can not carry a high bandwidth of date while high frequency signals can travel for shorter distances through few obstacles and carry a narrow bandwidth. Also the noise effect on the signal is inversely proportional to the power of the radio transmitter. The three broad categories of wireless media are:
  1. Radio - 10 Khz to 1 Ghz. It is broken into many bands including AM, FM, and VHF bands. The Federal communications Commission (FCC) regulates the assignment of these frequencies. Frequencies for unregulated use are:
    • 902-928Mhz - Cordless phones, remote controls.
    • 2.4 Ghz
    • 5.72-5.85 Ghz
  2. Microwave
    • Terrestrial - Used to link networks over long distances but the two microwave towers must have a line of sight between them. The frequency is usually 4-6GHz or 21-23GHz. Speed is often 1-10Mbps. The signal is normally encrypted for privacy. Two nodes may exist.
    • Satellite - A satellite orbits at 22,300 miles above the earth which is an altitude that will cause it to stay in a fixed position relative to the rotation of the earth. This is called a geosynchronous orbit. A station on the ground will send and receive signals from the satellite. The signal can have propagation delays between 0.5 to 5 seconds due to the distances involved. The transmission frequency is normally 11-14GHz with a transmission speed in the range of 1-10Mbps.
  3. Infared - Infared is just below the visible range of light between 100Ghz and 1000Thz. A light emitting diode (LED) or laser is used to transmit the signal. The signal cannot travel through objects. Light may interfere with the signal. The types of infared are
    • Point to point - Transmission frequencies are 100GHz-1,000THz . Transmission is between two points and is limited to line of sight range. It is difficult to eavesdrop on the transmission. The speed is 100Kbps to 16Mbps
    • broadcast - The signal is dispersed so several units may receive the signal. The unit used to disperse the signal may be reflective material or a transmitter that amplifies and retransmits the signal. Normally the speed is limited to 1Mbps. The transmission frequency is normally 100GHz-1,000THz with transmission distance in 10's of meters. Installation is easy and cost is relatively inexpensive for wireless.
Terms:
  • wireless bridge - Microwave or infared is used between two line of site points where it is difficult to run wire.
  • CDPD - Cellular Digital Packet Data will allow network connections for mobile users using satellites.

Physical Media

  1. Twisted pair - Wire twisted to avoid crosstalk interference. It may be shielded or unshielded.
    • UTP-Unshielded Twisted Pair. Normally UTP contains 8 wires or 4 pair. 100 meter maximum length. 4-100 Mbps speed.
    • STP-Shielded twisted pair. 100 meter maximum length. 16-155 Mbps speed. Lower electrical interference than UTP.
  2. Coaxial - Two conductors separated by insulation such as TV 75 ohm cable. Maximum length of 185 to 500 meters.
    1. Thinnet - Thinnet uses a British Naval Connector (BNC) on each end. Thinnet is part of the RG-58 family of cable*. Maximum cable length is 185 meters. Transmission speed is 10Mbps. Thinnet cable should have 50 ohms impedance and its terminator has 50 ohms impedance. A T or barrel connector will have no impedance. Maximum thinnet nodes are 30 on a segment. One end of each cable is grounded.
    2. Thicknet - Half inch rigid cable. Maximum cable length is 500 meters. Transmission speed is 10Mbps. Expensive and is not commonly used. (RG-11 or RG-8). A vampire tap or piercing tap is used with a transceiver attached to connect computers to the cable. 100 connections may be made. The computer has an attachment unit interface (AUI) on its network card which is a 15 pin DB-15 connector. The computer is connected to the transceiver at the cable from its AUI on its network card using a drop cable. Maximum thicknet nodes are 100 on a segment. One end of each cable is grounded.
    The RG value for cable types refers to its size. Coax cable types:
    • RG-58 /U - 50 ohm, with a solid copper wire core for thin ethernet.
    • RG-58 A/U* - 50 ohm, with a stranded wire core.
    • RG-58 C/U* - Military version of RG-58 A/U.
    • RG-59 - 75 ohm, for broadband transmission such as cable TV.
    • RG-62 - 93 ohm, primarily used for ArcNet.
    • RG-6 - Used for satellite cable (if you want to run a cable to a satellite!).
    • RG-8 - 50 ohm thick ethernet.
    • RG-11 - 75 ohm thick ethernet.
    *Only these are part of the IEEE specification for ethernet networks.
  3. Fiber-optic - Data is transmitted using light rather than electrons. Usually there are two fibers, one for each direction. Cable length of 2 Kilometers. Speed from 100Mbps to 2Gbps. This is the most expensive and most difficult to install, but is not subject to interference. Two types of cables are:
    1. Single mode cables for use with lasers has greater bandwidth and costs more. Injection laser diodes (ILD) work with single mode cable.
    2. Multimode cables for use with Light Emitting Diode (LED) drivers. All signals appear to arrive at the same time. P intrinsic N diodes or photodiodes are used to convert light to electric signals when using multimode.



Cable Standards

The Electronic Industries Association and Telecommunications Industries Association (EIA/TIA) defined a standard called EIA/TIA 568 which is a commercial building wiring standard. It defines transmission speed and twists per foot.
Category
Speed
Notes
1
None
Used for old telephone systems
2
4Mps

3
10Mps
The minimum category for data networks
4
16Mps

5
100Mps
Cat 5 network cable, used by most networks today
6

Data patch, Two pair with foil and braided shield
7

Undefined
8

Flat cable for under carpets with two twisted pair
9

Plenum cable with two twisted pair. It is safe if you're having a fire.
The maximum transmission length is 100 meters. This cable is susceptible to interference.

STP

Shielded twisted pair has a maximum cable length of 100 meters (328 feet). Data rate from 16 to 155 Mbps. Cables require special connectors for grounding. Resists interference. Costs more than UTP or Thinnet, but not as much as Thicknet or Fiber-optic

Terms

  • Attenuation - Signal loss due to impedance.
  • Bandwidth - Indicates the amount of data that can be sent in a time period. Measured in Mbps which is one million bits per second.
  • Impedance - The amount of resistance to the transmission device.
  • (ILD) - Injection laser diodes work with single mode cable.
  • Interference - Electromagnetic Interference (EMI). Crosstalk - When wires pick up electromagnetic signals from nearby wires also carrying signals.
  • Plenum - Space above a false ceiling in an office area where heat ducts and cables may be run. Plenum cabling is special fire resistant cabling required for use in these areas due to fire hazards.
  • Shielding - Used to minimize interference.