Thursday, March 10, 2011

CHAPTER 5: DATABASE PROCESSING

A Database is a collection of incorporated records. An example of a great database would be Wal-Mart which could be considered the world's largest database with more than half a petabyte. Theirretail link allows suppliers to access large amounts of online, real-time, item-level data to help those suppliers improve operations. Unlike a typical database that can get slower as it expands and requires more time to complete backups and virus scans , their database is designed to scale without the management restrictions of other databases. Every purchase made by a customer is sent to their data warehouse and shows what people are buying, what is popular, how much of a certain product is needed at a specific Walmart, their database helps them run their company efficiently and enables suppliers to send needed products when their out of stock. A database management is a program that is used to create, process, and administer a database. Walmarts vendor isNCRs Teradata division and supports those many bytes of data and says that their systems can scale without hiccups even at an extreme number so their database is pretty accurate. Other DBMs are DB2 from IBM, Oracle, etc. Processing the database requires 4 operations which is to read, insert, modify, or delete data. In the operation phase in administering the Database, DBMS can be used to create a security system which involve user accounts, passwords, permissions, and limits for processing the database. Most Companies will not allow any outsiders to access their database, my sjsu has a username and password that when accessed shows all payments, reminders, schedules, etc. You can track problems and find resolutions to the problem and monitor the data performance. The backup and recovery can be very crucial for professors because if they for some reason lose all their notes, powerpoints, grades, etc it can be detrimental if their is not a database that has a backup. One of my professors recently lost all her data because of a trojan spam and went to an IT professional in order to manage her backups and recover her lost files. She went to individuals who understand and know how to operate backup procedure and was able to recover all of her files. Adaption is where you can set up a tracking system and manage configuration change. All changes can be recorded and manage your changes of the database. A database application is a collection of forms, reports, queries, and applications needed to process a database. Different database applications include membership application, class application, and personal training applications. I believe that knowing how to create a database is a very essential and beneficial tool to know because it can keep all business transactions in order, to date and have a company running more smoothly.

Thursday, March 3, 2011

CH:4 HARDWARE AND SOFTWARE

What is Hardware? Hardware contains electronic components which inputs, processes, outputs, and stores data based on the instructions encoded into the programs and software. The basic components from a hardware are inputs, processes and storage and finally to outputs. Inputs consist of the keyboard, upc reader, microphone, mouse, and scanner. The processes is the main memory, cpu, special function cards and the storage which is a magnetic disk or optical disk. From processes, the output is displayed which is the video display, what is being printed, speakers, and slide projector. The CPU is considered to be the brain of the computer such as an ecu would be to an engine of a car. It gives instructions to your computer and stores certain operations in memory.
Computer Data
Virtually all computer data is characterized by bits which can potentially be data for numbers, characters, currency, amounts, photos, or recordings which all are merely a string of bits. Bits are assembled into 8-bit chunks named bytes. They are used to measure the number of bits from one character.
A Client computer can be used for word processing, spreadsheets, etc. They have software installed that enables users to connect to the internet, use word, print. Could be public or private. Ex: San Jose State has a computer lab in the business building with the same internet router to be used from registered students and a printer everyone can use. For students using the school wireless, it is private for students and you also need a username and password. A server provides service which could be email, web sites, or all functions. Server computers need to be fast and have multiple CPUs because they need lots of main memory.
Operating Systems
The two most popular and most used operating systems  are Windows and Mac OS. 
Windows Microsoft is for the most part the most beneficial software not only for business users, but also for students. There are different versions of windows and exist in more than 85 percent of the world's desktop. You need it to create word documents, spreadsheets, power-points, etc.
Mac OS Mac developed their own operating system named Mac OS X and their applications are macintosh applications plus word, excel and can run windows through macintosh hardware. 
The Application Software carries out a service or function. Such software would be Microsoft Excel or Word. A Horizontal-market application offer different functions that are similar across all organizations and industries. Ex: Word Processors, graphics programs, spreadsheets, presentation programs.
Vertical Market Applications are specific applications to that specific business needs. A Hair Salon can use a software to schedule appointments and take payments.
One-of-a-kind Application is exclusively designed for a company. Ex: The IRS has such a software that no other organization has. It is unique.
Firmware
Firmware is a computer software that is installed into devices such as printers, print servers and other types of communication devices. Ex: A great example would be a universal remote. You program your remote to your specific television set and other devices. You enter a code and becomes part of your remote's memory.
Thin vs Thick Clients
Client-server apps need a code for both the client and the server. Ex: Microsoft Outlook
Think Client- Requires only a browser.
Thick Client- Requires additional programs other than just a browser. They don't need to be connected to a network.
Open Source Codes are available and can be read by humans. Closed Source Codes are highly protected and only accessible by trusted employees. Facebook has many codes that can only be changed by a programmer.
As students, it may not be so important to know the ins and outs of hardware and software, but as you move forward into a business professional or manager, such information can be deeply beneficial and essential for making important decisions as to what products and software will be essential to your type of project. I work at Chilis, and the company changed from paper schedules to an online website specifically for their branches. They made the business decision that seems more profitable because they are saving money by printing hundreds of pages of schedules every two weeks, it is also faster and the managers are to make changes online which is also easier and more essential.