Tuesday, April 21, 2015

Web Application Development

What are HTML5 and CSS? List some uses of JavaScript.

HTML5 specifies the structure of content displayed on a web page.

CSS (cascading style sheets)  describes the design and appearance of information on a webpage.

JavaScript allows users to interact with a page's content.

Uses of JavaScript:

  1. Often used to check  for appropriate values on web forms.
  2. Display alert messages. 
  3. Display menus on webpages.
  4. Control the appearance of a browser window.
  5. Read and write cookies 
  6. Display alert boxes.
  7. Detect the browser version in order to display a page especially designed for that browser.


Friday, April 17, 2015

Reasons for Backing Up a Database

List reasons for backing up a database. List some ways to back up a database.

Backing up a database is an important step to protect the the data. from loss. Databases should be back up a database on a regular basis:

  1. before modifying or deleting data.
  2. before performing any maintenance operations on the database.
  3. after adding data to the database.
Ways to back up database:
  • If the computer already has a back up program running, it might be backing up your database. Check your backups to determine whether the database is included in the back up. If not, configure the backup program to backup the database.
  • Copy the database to another storage device.
  • Copy the database to different folder on the same storage medium as the original database. This method is effective for keeping multiple copies in an accessible location, but you will lose both the original database and the back ups if the storage device fails. 


Tuesday, April 7, 2015

Communications and Networks

List various communication devices. List ways you can try to strengthen your wireless signal

Communication devices are:

  • Digital modems (Broadband modem) sends and receives data and information to and from a digital line.
  • Wireless modems uses a mobile phone provider's network to  to connect to the internet wirelessly from a computer or mobile device.
  • Wireless access points is a central communications device that allows computers ad devices to transfer data wirelessly among themselves or to transfer  data wirelessly to a wired network using wireless technologies such as Wi-fi.
  • Router connects multiple computers or other routers together and transmits data to its correct destination on a network.
  • Network card enables a computer or device that does not have built-in networking capability to access a network.
  • Hubs and Switches provides a central point for cables in a network.


Ways to strengthen wireless signal

  1. If your wireless routers has antennas, make sure they are extended completely.
  2. If you are going to remove the antennas, replace them with a wireless signal booster.
  3. If possible position the wireless router or wireless access point in a central location of your home and away from appliances. or electronic devices.
  4. Purchase a range extender for your wireless router or access point
  5.  If you still experience problem with the strength of your wireless signal after following the suggestions above, consider replacing the wireless routers or wireless access point.

Operating Systems

Describe the process of starting a computer. Differentiate between memory resident and nonresident.

When you start or restart a computer,  a series of  messages may appear on the screen. The information displayed  varies depending on the type of the computer and the equipment installed.
The start-up process is similar  for large and small computers. as described in the following steps:

1. When the computer or mobile device was turned on,  the power supply or battery sends an electrical current to circuitry in the computer or mobile device.

2. The charge of electricity causes the processor chip to reset itself and finds the firmware that contains start-up instructions.

3. The start-up process executes a series of tests to check the various components.

4. If the tests are successful, the kernel of the operating system  and other frequently used instructions load from the computer or mobile or mobile device's internal storage media  to its memory (RAM).
The kernel is the core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources. the kernel is memory resident  which means it remains in memory while the computer or mobile device is running while nonresident instructions remain on a storage medium until they are needed, at which time they are transfer to memory (Ram)

5. The operating system in memory takes control of the computer or mobile device and loads system configuration information.




Wednesday, April 1, 2015

Lifespan of a Memory Card

What is the lifespan of a memory card? List ways to care for a memory card.

A memory cards enable mobile user to easily transport digital photos, music, video, or other files to and from mobile devices and computers.

Depending on the card, manufacturers claim their media can last from 10 to 100 years with proper care, including the following:

  • Do not bend the card
  • Avoid dropping the card.
  • Keep cards away from direct sunlight.
  • Do not expose cards to extreme temperatures.
  • Do not remove the card while while data is transferring to or from it.


Tuesday, March 10, 2015

Printer Hacking

Define printer hacking. List steps you can take to secure printers.

Printer is an output device that produces text and graphics on a physical medium such as paper. Printer hacking is where an individual from within the organization or outside the building can print a document without permission if the network is connected to the internet.

Here are steps to take to secure printers:
  1. Place printers in a secure room, not out in the open.
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. Encrypt documents before sending them to the printer using a secured network.
  4. Restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5.  Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.


Cloud Computing

List some reasons that home and businesses choose cloud computing. In reference to cloud computing describe the front end and the back end.

Cloud computing refers to an environment of servers that house and provide access to resources users access via the Internet.

Home and business users choose cloud computing for various reasons:

1. Accessibility- Data and/or applications are available worldwide from any computer or device with an internet connection.

2. Cost saving- The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, shifts away from the user.

3. Space savings- Floor space required for servers, storage devices, and other hardware shifts away from the user.


4. Scalability- Provides the flexibility to increase or decrease computing requirement as needed.