Litera03z Finals Reviewer

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

LITERA03Z FINALS REVIEWER  In 2001, the second generation, Web 2.

0,
evolved to support more dynamic content
LESSON 7: THE WEB
creation, social interaction and
 The World Wide Web collaboration
 consists of a worldwide collection of
 Facebook is one of the best-known Web
electronic documents hyperlinked and
2.0 applications.
accessible via the Internet (Web pages)
 A Web site is a collection of related Web  is the name used to the describe the
pages and associated items second generation of the world wide web,
 Web Address called URL. where it moved static HTML pages to a
 Tim Berner’s Lee more interactive and dynamic web
 Inventor of World Wide Web experience.
 he implemented the first successful  WEB 3.0
communication between a HTTP client
and server via the internet in November  “Intelligent Web”
1989.
 Web pages are primarily text documents  It focuses on applications that
formatted and (HTML). automatically prepare personalized
content for users.
 Web Design
 encompasses many different skills and  searches for interrelationships among the
disciplines in the production and data (e.g., the effect of weather and traffic
maintenance of websites. on an individual’s planned daily commute
 A Web site is a collection of related Web to work
pages and associated items
 HTML and XML (+ CSS + JavaSript)  automatically presents relevant
 Web Browser information to the user (e.g., sends an
early morning message to the individual’s
 is a software application for accessing
smartphone regarding expected bad
information on the World Wide Web.
weather and/or traffic delays)
 a software program that allows a user to
locate, access, and display web pages.  UNIFORM RESOURCE LOCATOR
 TRIVIA: What was the world’s first
browser?  A Web page has a unique address called
a URL or Web address
EVOLUTION OF WEB
 SEARCH ENGINES
• WEB 1.0
 is a software system that is designed to
 The first generation of the web search for information on the World Wide
Web.
 focused on linking existing information. In
this generation search programs, like  SERPs
Google Search (read-only!)
 Two types of search tools are search
 were created to provide links to websites engines and subject directories
containing specific words or phrases.
TOP 10 SEARCH ENGINES
 set of static websites that were not yet
providing interactive content.  GOOGLE

 WEB 2.0  BING

 YAHOO
 ASK.COM  WHAT IS CONVERGENCE?

 AOL.COM  the merging of distinct devices, industries,


or technologies into a unified whole.
 BAIDU
 DIGITAL CONVERGENCE 
 WOLFRAMALPHA
 refers to the convergence of four
 DUCKDUCKGO industries into one conglomerate, ITTCE
 INTERNET ARCHIVE (Information Technologies,
Telecommunication, Consumer
 XANDEX.RU Electronics, and Entertainment).
A search engine is helpful in locating  TECHNOLOGICAL CONVERGENCE
items such as:
 A process by which telecommunications,
information technology and the media
sectors that originally operated largely
Images Videos Audio News independent of one another are growing
together.

 combination of two or more different


People or
Maps Blogs technologies in a single device.
Businesses
 CONVERGED NETWORK
• WEB SITES CONTENT
 Telecommunications convergence is
 Information presented on the Web the term used to describe emerging
must be evaluated for ACCURACY telecommunications technologies, and
network architecture used to migrate
 No one oversees the content of Web
multiple communications services into a
pages
single network.
 MULTIMEDIA
 MEDIA CONVERGENCE
 refers to any application that combines
 …books, newspaper, radio, camera, TV,
text with:
these are all forms of older media.

 What about “Digital Media”, the modern


Graphics Animation Audio media? What are they?

 Media Convergence is the joining of


distinct technologies into one.
Virtual
Video LESSON 8: INFORMATION SYSTEM
Reality
• ORGANIZATIONAL INFORMATION
 UBIQUITOUS COMPUTING FLOW
 is a concept where computing is made to
appear anytime and everywhere.  Computerized information systems do
 can occur using any device, in any not just keep track of transactions and
location, and in any format.  day to-day business operations.
 Use of computers and other digital devices  They also support the vertical and
in everyday life. horizontal flow of information within the
 AKA Ubicomp or Pervasive computing organization.
 Effective operations require an
efficient and coordinated flow of
information throughout the
organization
FIVE BASIC ORGANIZATIONAL
FUNCTIONS
1. ACCOUNTING
2. MARKETING
3. HUMAN RESOURCES
4. PRODUCTION
5. RESEARCH

 ACCOUNTING records all financial


activity from billing customers to paying • COMPUTER-BASED INFORMATION
employees. SYSTEMS
 MARKETING plans, prices, promotes,
sells, and distributes the organization’s  Almost all organizations have computer-
goods and services. based information systems.

 HUMAN RESOURCES FOCUSES on  Large organizations typically have formal


people—hiring, training, promoting, and names for the systems designed to collect
any number of other human-centered and use the data.
activities within the organization

 PRODUCTION creates finished goods


and services using raw materials and
personnel.

 RESEARCH identifies, investigates,


and develops new products and
services.
LEVELS OF MANAGEMENT

 Supervisors: Supervisors manage and


monitor the employees or workers day-
to-day events. operational matters.

 Middle management: deal with


control, planning (called tactical
COMMON NAMES OF COMPUTER-BASED
planning), implement the long-term
INFORMATION SYSTEM
goals of the organization.
 TPS – Transaction Processing System
 Top management: concerned with
 MIS – Management Information System
long-range planning (called strategic
 DSS – Decision Support System
planning). need plan the
 ESS – Executive Support System
 future growth and direction of the
organization. COMMUNICATION CHANNELS
 TPS records day-to-day transactions, such  Consist of sophisticated software that, like
as customer orders, bills, inventory levels, an MIS or a DSS, can present,
and production output. summarize, and analyze data from an
organization’s databases.
TPS FOR ACCOUTING SYTEM
 Easy to use by top managers
 SALES ORDER PROCESSING  gives a condensed account of activities

 ACCOUNTS RECEIVABLE OTHER INFORMATION SYSTEMS

 INVENTORY AND PURCHASING  Office Automation System - designed


primarily to support data workers. focuses
 ACCOUNTS PAYABLE on managing documents, communicating,
and scheduling. using word processing,
 PAYROLL
web authoring, desktop publishing, and
 GENERAL LEDGER other image technologies.
 Knowledge Work System - Knowledge
 MIS summarizes the detailed data of the workers use OAS systems.
transaction processing system in standard  they use specialized information systems
reports for middle-level managers. called knowledge work systems (KWSs)
 produces standardized reports in to create information in their areas of
summarized structured form expertise.
 It is used to support middle managers for  Like CAD/CAM systems
decision-making.  EXPERT SYSTEMS
 Whereas a transaction processing
 system creates databases, an MIS uses  also known as KNOWLEDGE-BASED
databases. SYSTEMS, are a type of artificial
 Types of Reports: Periodic, Exception, intelligence that uses a database to
Summary Report (weekly, monthly, provide assistance to users.
quarterly
 Use a database, known as a
 DSS helps middle-level managers and KNOWLEDGE BASE, contains facts and
others in the organization analyze a wide rules to relate these facts distilled from a
range of problems, such as the effect of human expert.
events and trends outside the
 Bird Species Identification, Midwives
organization.
Assistant, Oil Spill Advisor
 Managers often must deal with LESSON 9: SOCIAL NETWORKING
unanticipated questions. THEORY
 DSS enables managers to get answers to  SOCIAL NETWORKING THEORY
such unexpected and generally  is the study of how people, organizations
nonrecurring kinds of problems. or groups interact with others inside their
network.
 TPS records data, MIS summarizes data  Its perspective provides a set of methods
while DSS analyzes data. for analyzing the structure of whole social
 it produces reports that do not have a entities as well as a variety of theories
fixed format. explaining the patterns observed in these
structures.
 ESS it helps top-level managers oversee  Understanding the theory is easier when
the company’s operations and develop you examine the individual pieces starting
strategic plans. with the largest element, which is
networks, and working down to the something is, the more likely that
smallest element, which is the ACTORS. many people will share it.
IMPACT OF SOCIAL MEDIA  During a highly polarized election,
people are motivated to share
• Social media can be very influential
anything that supports their candidate
on society in both positive and
or, more likely, attacks the opposing
negative ways.
candidate.
• It gives people a way to stay in touch
 This can result in false stories widely
with people who live far away.
circulating. Even if false stories are
• It lets people share fun, interesting and discredited and recanted, the damage
informative content. It gives is already done.
businesses a way to engage with
 By the time a retraction is published,
customers.
millions of people may have already
• One of the problems, however, is that seen the story.
anybody can share anything, including
material that may not be accurate. SOCIAL NETWORK PRINCIPLES
Our base social network will is formed by the
• In some cases, real harm is done
when people spread inflammatory, interaction of three nodes (A, B, and C); with
the potential to form a social tie, but has not
unverified or outright false information.
yet done so — therefore, this network isn’t
• This can harm private individuals, as quite “social” yet.
when someone is bullied online. It can
also have a harmful impact on society.  Balance
 Let’s take the network above and begin
The Rise of Fake News Sites to add simulated interaction amongst
the nodes to demonstrate our principal
• Social media has made it very easy to
network pressures. Consider a scenario
spread information quickly. Because
where A has established a social tie to
Facebook and Twitter timelines move
both B and C; however, B and C have
so quickly, viewers don’t often verify
not yet formed such a tie.
what they’ve seen.
 The absence of this connection
• A great deal of content is also spread manifests as latent friction on the nodal
through images and memes, which relationships between A-B and A-C,
may or may not be based on valid degrading the connection.
information.  Unfortunately, simply introducing a B-C
relationship will not stabilize the
• Of course, many memes are created
network; it will slow the network’s rate
to be funny, cute or outrageous.
of decay but fails to secure increased
Others, however, are intended to
interaction amongst the nodes.
influence our thinking.
 This latent pressure destabilizes the
• Even links to real articles can be balance of the network.
misleading. It’s safe to say that most
people who see a headline and link  Exchange
never read the whole article.  Assume the same node relationship
 The Harmful Impact of Fake News (A-B and A-C are tied, yet B-C not
Social media stories, whether true or tied), if B was to form a social tie with
not, often go viral. The more C this might solicit more social
outrageous and newsworthy interactions via B; however, the new
relationship is not without  Example:
consequence. Consider an apartment building of n
residents and four known residents:
 The resulting release of exchange
Mary, Delano, Jackson, and Beth.
pressure has diminished the
Mary meets two neighbors, Delano
dependency of B on A for access to
and Beth, who have not yet met each
social information held by C.
other; thus establishing network
 Betweenness imbalance and increasing exchange
pressure through Mary. Before long
 We continue applying pressure to our Beth meets Jackson, the resulting
network by revisiting the newly formed expansion of her social network in the
social ties between B and C. Prior to building weakens her ability to stay
closing the relationship triangle, A connected to her ties equally (Mary
served as a broker to B in the form of and Delano via brokerage). Before
the described information access from long Mary and Beth’s connection
C. breaks due to a loss of interaction, the
network is fragmented from the effect
 This role instilled interaction growth
— before long no social network
between A and B but was weakened
exists.
upon formation. However, let’s now
add a new node to the mix, D, and PREVENTIVE & BRAGGADOCIAN
have it form a social tie with B. BEHAVIOR
 If D remains unconnected from A, the  BRAGGADOCIAN BEHAVIORS
network decay due to the loss of A’s  Social media has a number of benefits
former brokerage role between B and for human communication and thus
C can be slowed. millions of people have discovered
those benefits.
 Our ability to manage the
 Considering the burgeoning number of
betweenness of the network in this
social media users around the world,
way demonstrates how non-relational
we can say that there is a serious thirst
network growth accelerates social
and demand for social media,
network longevity in the face of decay.
regardless of geography and
 In the physical world the presence of demographics as well as economic and
mass produces the law of gravity, an social conditions.
invisible universal force shaping the
 Positive attitudes and behaviors of
growth and dissipation of reality.
constant social media users can be
 If a single node-node relationship discussed under certain headings.
exists in a network, decay is inflicted
 Although there are many techno-
upon the network — social decay is
psychological aspects of social media
the gravity of a social network — and if
related behaviors, the most common
it’s allowed to outpace growth, the
motives or drives can be summarized
result will be a mass exodus of nodes
as follows (Barak & Suler, 2008);
(users/citizens) from the network.
Fennemore cited in Schaefer, 2014;
 We must seek the balance our Turkle, 2012)
networks while increasing overall
 Social networks give people the
node-node activity to mitigate the
opportunity to post whatever their
effects of exchange pressure.
hearts desire.
 This can have its positive and negative  They think that they can continue
affect on via social media. Posting their way of life with traditional
picture of material items or extravagant technologies and survive without the
trips are displayed on your timeline to immersion of popular social media
show everyone what you are doing. applications.

 Some people only go place and buy  They want a relatively discreet life
things is to make themselves look more which is free of the disturbance or
fortunate than someone else. Posting occupation of social media
everything you purchase, or every messages.
place is a way of braggadocian
behavior.  Social media as a whole creates
stress for them so that they try to
 Active Facebook and Instagram users avoid social media as much as
are in competition to post more possible.
expensive and lavish clothing, jewelry,
and cars.  They know that social media is
attractive, and one cannot stop
 PREVENTATIVE BEHAVIORS using them once started to
experience so that they try to seek a
 Qualman (2009) phrases the personal lifestyle without
essence of preventative behaviors involvement of social media.
as “What happens in Vegas stays on
YouTube”.  The basic motive behind this
behavior is that people who avoid
 This means that privacy is at risk. social media would like to have a
Stated differently, social media has simple life and they feel disturbed
certain pitfalls so that some people with the intrusion of social media
ignore or constrain their use of
social media, mainly due to mass WHY SOCIAL MEDIA BEHAVIOR
transparency and insufficient MATTERS: HOW DO WE BEHAVE IN
knowledge about these SOCIAL MEDIA
technologies.
 Our social behavior can never be
 Those who circumvent social media seen by company we applied for or
in their lives and do not use these the school we intend to enroll.
technologies unless it is an
 51% of job applicants were not hired
obligation can be analyzed under
due to their social media behavior.
several categories.
 According to Daymond John, a
 Unlike braggadocian behaviors,
popular fashion entrepreneur, they
preventative behaviors are similar to
Google every applicant they
each other in nature and closely
consider hiring.
overlap. Therefore, sometimes it is
difficult to distinguish them from one  Many students’ postings on social
another. media most on Facebook, cost them
their college scholarships.
 AVOIDANCE
 As the saying goes,” today your first
 Some people avoid social media
impression is likely to be the search
and continue their lives without
engine has to say about you.”
these tools and applications.
HOW CAN YOU IMPROVE YOUR SOCIAL  Twitter
MEDIA BEHAVIOR (AS SUGGESTED BY
FOSI)  is a free social networking
microblogging service that allows
 KPAPMO -Keep private and registered members to broadcast short
personal matters off lines posts called tweets.
 BMOWYP- Be mindful of what you  Twitter members can broadcast
post (on your site and other’s site) tweets and follow other users’ tweets
by using multiple platforms and
 KYTIC – Keep your tone in check
devices. Tweets and replies to tweets
 DYF – de-clutter your friends. can be sent by cell phone text
message, desktop client or by posting
 IWIAR – Interact with empathy and at the Twitter.com website.
respect
 Instagram
 SO – sign off
 is an online photo sharing service. It
 DOS – Don’t overshare allows you to apply different types of
photo filters to your pictures with a
SOCIAL MEDIA
single click, then share them with
TYPES OF KNOWLEDGE & SOCIAL MEDIA others.

 Social media  While is a rather basic service,


 is a computer-based technology that Instagram’s simplicity has helped it
facilitates the sharing of ideas, gain widespread popularity.
thoughts, and information through the
 Blogging
building of virtual networks and
communities. By design, social media  refers to writing, photography, and
is Internet-based and gives users other media that’s self-published
quick electronic communication of online.
content.
 the content includes personal  Blogging started as an opportunity for
information, documents, videos, and individuals to write diary-style entries,
photos. Users engage with social but it has since been incorporated into
media via a computer, tablet, or websites for many businesses.
smartphone via web-based software or  Vlogging
applications.
 Vlog stands for a video blog or video
 Facebook
log and refers to a type of blog where
 defined as an online social networking most or all the content is in a video
website where people can create format.
profiles, share information such as  Vlog posts consist of creating a video
photos and quotes about themselves,
of yourself where you talk on a
and respond or link to the information particular subject such as reporting or
posted by others.
reviewing a product or an event.
 The most popular social networking TWITTING & TERMINOLOGY
site, which allows anyone to share
photos, comments, and videos online.  How to create a vlog?
You can post your vlog anywhere, but the first followers is just as important as what you
step is to know how to make a video & to do are tweeting.
this you will need:
 Replies
— an interesting story or topic
 The @ sign is used in the beginning of a
— a recording device, like a webcam or tweet to reply to someone. Only the
dedicated video camera – you can even use person you are replying to or people that
your smartphone! follow both of you will see the reply.
— a microphone  Mentions
— a good location that is well lit without too  When you mention @ and a person’s
much background sound Twitter name anywhere else except in the
18 Twitter Terms to Know: very beginning of a tweet, everyone who
follows you will see it. Both replies and
 Engagement mentions become links to that person’s
 To be engaging is to create conversations twitter profile.
(talking, listening, and sharing) and
 Retweet / RT
meaningful relationships on Twitter or
other social networks.  Since Twitter is about sharing information,
 It creates human relationships online that a retweet makes it easy for you to share
may continue to be nurtured online and/or someone else’s tweet to your followers.
go offline. Engagement is the essence of Retweets give the original tweeter credit
what makes a business’s social media for the tweet with “RT @username” and
presence successful. can be retweeted in its original format or
 Trends / Trending Topic with comments from the person retweeting
 Current events or popular topics that are if space allows.
being talked about the most at any given
time can be seen in “Trending”.  # / Hashtag

 Tweet  People use hashtags on Twitter to make


them easily searchable on a specific topic.
 “Tweet” can be both a verb and a noun. It They are often simple keywords but can
is your update typed in the “What’s also be unique phrases or acronyms that
happening?” status bar to the people who allow people to follow a trending
are following you, in 140 characters or conversation.
less. A person who Tweets can be called
a Tweeter.  URL Shortener

 Follow / Following  When you want to include website


addresses in your tweet, you will probably
 These are all the people that you are want to use a URL (website address)
following, and whose updates you will see shortener, so it does not take up your 140
on your homepage. To follow someone on characters. Although Twitter does try to
Twitter, just hit the “follow” button. shorten the link for you, it may be better to
try a URL shortener like Tiny URL or Bit.ly
 Followers
to give you more space for re-tweets.
 these are all the people on Twitter that are
 Follow Friday / FF
following you and are seeing your updates
on their homepage. If you are following  #FF or #Followfriday is a hashtag used
someone, it doesn’t necessarily mean they with @mentions to suggest to their
will follow you back. Attracting the right
followers which other interesting people  Searches
they should follow.
 If you are searching for a specific topic,
 Direct Message / DM username, or hashtag, you can enter the
word or phrase in the search bar and see
 This is a private message that only the
the most recent tweets with the phrase.
person you are sending it to can see. It
From there, you can better define your
still can only be 140 characters. You
search or save your search for future
cannot send a DM to a person who does
reference.
not follow you, but you can reply to them.
LESSON 10: SMART TECHNOLOGY
 Home / Timeline / Feed
 Internet of Things (IoT)
 This is where you will see the constant
real-time status updates from the people  describes a growing industry of digital
you are following. technology being harnessed to the
Internet in ways that will improve the
 Avatar lives of every person on this planet.
 Your profile picture or image that you use  describes the network of physical
to identify yourself and tie to your twitter objects— “things”—that are embedded
account is your avatar. If you don’t upload with sensors, software, and other
a picture, it will default as an egg graphic. technologies for the purpose of
 Favorite connecting and exchanging data with
other devices and systems over the
 You can click the “star” icon next to any Internet.
tweet to indicate that it is one of your
favorites, for easy reference later. Others  is a system of interrelated computing
can view your list of favorite tweets also. devices, mechanical and digital
machines, objects, animals or people
 Username / Handle that are provided with unique
identifiers (UIDs) and the ability to
 “Handle” refers to your specific URL on transfer data over a network without
Twitter, so for instance my Twitter requiring human-to-human or human-
username is @jkaufenberg and my twitter to-computer interaction.
handle is http://twitter.com/jkaufenberg.
 The Presence of IoT in Today's
 You can make your username be anything World
you want, as long as it is not already
taken, and it is 15 characters or less. A  The IoT is all around us.
username on Twitter has an @ before it
 The IoT helps individuals to
and becomes a link to that persons Twitter
improve quality of life.
profile.
 The IoT also helps industries to
 Listed / Lists
become more efficient.
 You can create lists and add people on
 IoT Solutions
Twitter to group them into categories. You
can also see who has placed you on their  The rapid IoT growth has
lists, when you click on “listed” on your introduced new challenges.
profile.
 Cisco IoT System reduces the
complexities of digitization.
 Six Pillars of the Cisco IoT  A sensor may be connected to a
System are: controller either directly or remotely.
 Network Connectivity • ACTUATORS
 Fog Computing  An actuator is a basic motor that can
be used to control a system.
 Cybersecurity and
Physical Security  Can be hydraulic, electric or
 Data Analytics pneumatic.

 Management and  can be responsible for transforming an


Automation electrical signal into physical output.

 Application Enablement • CONTROLLERS


Platform  Responsible for collecting data from
sensors and providing network
connectivity.
 Introduction to the Internet of
Things course (I2IoT)  Controllers may have the ability to
make immediate decisions.
 explains what the IoT is, what it does,
how it is part of digital transformation,  May also send data to remote and
and how you can become part of this. more powerful computer for
analysis.
 You will learn about the exponential
increase of intelligent devices • IoT Process Flow
connected to the internet and you will  A simple IoT system include sensors
learn to program one of these connecting, through a wireless or
intelligent devices. wired connection, to actuators or
controllers.
BUILDING BLOCKS OF AN IOT SYSTEM  Some devices can have more than
• Overview of a Controlled System one function.

 Feedback loops are used to provide 1.1.3 PROCESSES IN CONTROLLED


real-time information to its controller SYSTEMS
based on current behavior. • Processes
 In a closed loop, feedback is  A process is a series of steps or
continuously being received by the actions taken to
controller from its sensors. achieve a desired result by the
 The controller continuously analyzes consumer of the
and processes information, and use process.
actuators to modify conditions. • Feedback
• Sensors  Feedback is when the output of a
 A sensor is a device that can be used process affects the input.
to measure a physical property by  Feedback is often referred to as a
detecting some type of information feedback loop.
from the physical world.
 Feedback loops can be positive or • TCP and OSI Models
negative.
 Both OSI and TCP/IP models are
• Control Systems used to describe network
connections and often used
 Includes a controller that uses inputs interchangeably.
and outputs to manage and regulate
 The TCP/IP model is commonly
the behavior of the system in an
referred to as the Internet model.
attempt to achieve a desired state.
 The OSI model provides an
 The controlled portion of the system is extensive list of functions and
often called the plant. services that can occur at each
layer.
 Choosing the adjustments to apply to
a plant to achieve a desired output is • IoT World Forum Reference Model
called control theory.  Developed as a common framework
 Control theory is applied to many to guide and to help accelerate IoT
systems, including driving a car. deployments.

MODELS OF COMMUNICATION  Its intent is to provide common


terminology and help clarify how
• Models of Communication information flows and is processed
 Layered networking models are used for a unified IoT industry.
to illustrate how a network operates. • Simplified IoT Architecture
Benefits include:
 Several architectures exist to help
• Assists in protocol design. facilitate the design and creation of
• Fosters competition. IoT systems.

• Promotes technology or  The OSI model, TCP/IP model, and


capability independence. the IoT World Forum Reference
model have been presented as
• Provides a common language to examples.
describe networking
functions and capabilities.  A simpler approach is based on
connection levels. The levels are:
• Standardization
• Device-to-Device
 The challenge for the IoT is to ensure
these emerging IoT devices can • Device-to-Cloud
connect securely and reliably to the • Device-to-Gateway-to-Cloud
Internet and to each other.
• Device-to-Gateway-to-Cloud-to-
 Consistent, secure, and commonly Application
recognized technologies and
standards is needed. LAYERS OF CONNECTIONS

 Organizations such as the Industrial • Connections Within Networks


Internet Consortium, OpenFog
 Connections can have different
Consortium, and the Open
contexts.
Connectivity Foundation, are helping
to develop standard architectures and  Power connections, circuit
frameworks. connections or network connections.
• Physical Connections  Metadata is not usually seen by a
user.
 Relate to the media and cable type.
• The Impact of IoT on Privacy
 Common media types include
copper, fiber optics and wireless.  Suggestions and design
considerations concerning privacy
• Data Link and Network Connections
include:
 Network communication requires • Transparency
protocols to establish the rules of
communications. Data Link • Data Collection and Use
protocols:
• Data Access
• Allow the upper layers to access
• Challenges for Securing IoT
the media
Devices
• Prepare network data for the
 Some IoT network security impacting
physical network
factors include:
• Control how data is placed and
received on the media  Increasing Number of Devices

• Exchange frames between nodes  Non-Traditional Location of Devices


over a physical network media,  Changing Type and Quantity of
such as copper or fiber-optic Gathered Data
• Receive and directing packets to
 Lack of Upgradeability
an upper layer protocol
SUMMARY
• Perform error detection
 The Internet of Things (IoT) is all
 The most popular data link layer
around us. An IoT system is usually
connection used in wired networks is
made up of sensors to monitor
Ethernet.
events, actuators to influence the
 Other data link protocols include environment, hardware to create the
wireless standards such as IEEE platform and its connections, and
802.11 (Wi-Fi), IEEE 802.15 software to provide a framework to
(Bluetooth), and cellular 3G or 4G execute processes.
networks.
 A process is a series of steps or
 LoRaWAN and NB-IoT are actions taken to achieve a desired
examples of emerging IoT result.
supporting technologies.
 Layered networking models are
IMPACT OF CONNECTIONS ON PRIVACY used to illustrate and model how
AND SECURITY devices communicate. Physical,
data link, and network layers are
• Metadata concepts that are used to illustrate
 Metadata refers to the data about how network communication
data. operates.

 Metadata can be embedded within a  Security and privacy issues must be


digital object, or it can be stored considered in all phases of creation
separately. of an IoT system. Each level of
connectivity brings with it different o Character – single alphabetic,
requirements and concerns. numeric or another symbol
LESSON 11: DATABASE: CONCEPTS AND  Fields
APPLICATIONS
Last Name  C
 Why Study Databases? haracters “B R
E I M E R” form
 Databases have incredible value to Breimer
a field
businesses.
 A field is an attribute of an entity
o Very important technology for
supporting operations.

 Vastly superior to file processing


systems

 Businesses cannot survive without


 Records
quality data about them
o internal operations and  A bunch of fields form a record

o external environment.  A record is an entity

FOUNDATION DATA CONCEPTS

 ABSTRACT CONCEPTS

 Entity
 Tables
o person, place, object, or event
 A bunch of records forms a table
o stored as a record or a table row
 A table is a group of related entities
 Attribute
o characteristic of an entity

o stored as field or table column

 DATABASE CONCEPTS
o Database – a collection of related  Databases
tables
 A bunch of tables form a database
o Tables – a collection of related
 A database can represent a single
records
business or an entire market
– collection of related entities
o Record – collection of fields (table
row)
–represents an entity
o Field – collection of characters (table
column)
– represents an attribute  But databases are not just a bunch of
tables
 A database also includes relationships
between the different tables

 Many to Many

 Examples?
RELATIONSHIPS & QUERIES IN  Analysis Technique
DATABASES
o Consider Thing A and Thing B
Types of Relationships
o Can Thing A be related to more
 One to One
than one Thing B?
 Examples? o Can Thing B be related to more
 Analysis Technique than one Thing A?

o Consider Thing A and Thing B o If the answers are yes and yes,
then the relationship is many
o Can Thing A be related to more than one to many.
Thing B?
o Can Thing B be related to more than one
Thing A?
o If the two answers are NO, then it is a
one-to-one relationship.

HOW TO MODEL RELATIONSHIPS

 One to Many

 Examples?

 Analysis Technique
o Consider Thing A and Thing B

o Can Thing A be related to more than one


Thing B?
o Can Thing B be related to more than one
Thing A?
o If only one answer is yes, then you have
a one-to-many relationship
 Database Definition
o Language and graphical tools to
define entities, relationships, integrity
constraints, and authorization rights

 Application Development
o Graphical tools to develop menus,
data entry forms, and reports

 Transaction Processing
o Controls to prevent interference from
simultaneous users and
o Controls to recover lost data after a
failure

 File Processing:  Database Tuning

 Data is organized, stored, and o Tools to monitor and improve


processed in independent files of data database performance
records
 Database Interrogation
PROBLEMS OF  Capability of a DBMS to report
FILE PROCESSING information from the database in
response to end users’ requests
 Data Redundancy –
 Query Language – allows easy,
o duplicate data requires immediate access to ad hoc data
update to many files requests
 Lack of Integration –  Report Generator - allows quick, easy
o data stored in specification of a report format for
separate files information users have requested
hard to combine data NATURAL LANGUAGE VS. SQL QUERIES
 Data Dependence –
o changing the file format requires
changing the program…
DATABASE MANAGEMENT APPROACH

 Consolidates data records into one


CENTRAL database that can be accessed
by many different application programs. SCHEMAS
DATABASE MANAGEMENT SOFTWARE  A description of the database
(DBMS)
 Subschema – describes a subset of
 Software that controls the creation, the database and which users have
maintenance, and use of databases access to this subset
DBMS SOFTWARE COMPONENTS
 Today, even non-technical staff can
use tools to build little programs that
use a database.
o Database Management Systems have
all kinds of tools to develop custom
application programs and interfaces.

 Example: The College’s MIS (Banner)


is actually an application built on top of
an Oracle Database.

 Data Definition Language

 Language Used to describe Schemas


and Subschemas

 Describes relationships between


different data

 Provides a Logical view of the data

 Data Dictionary Entry

 A more detailed description of the data


in a database

 Specifies data types and ranges

 Assists programmers in understanding


the data

 Physical vs. Logical

 DBMS concentrate on Physical access


to the underlying tables
o Concurrency control

o Query’s

o Creating/deleting tables

 MIS systems are (Logically)


interface with a DBMS
o monthly reports

o charts

o automated inquiries

APPLICATION DEVELOPMENT

You might also like