It Handbook
It Handbook
It Handbook
A Handbook
DATA PROCESSING
and
Compiled by -
Important Definitions
1. RDBMS :
RDBMS stands for Relational Database Management System. RDBMS data is structured
in database tables, fields and records. Each RDBMS table consists of database table
rows. Each database table row consists of one or more database table fields.
RDBMS store the data into collection of tables, which might be related by common
fields (database table columns). RDBMS also provide relational operators to manipulate
the data stored into the database tables. Most RDBMS use as database query language
The most popular RDBMS are MS SQL Server, DB2, Oracle and MySQL.
2. SQL :
SQL is an acronym for Structured Query Language and is a standard relational query
language used for interaction with databases.
SQL was developed by IBM in 1970s and has its roots in the relational algebra defined
by Codd in 1972. SQL functionality goes beyond the relational algebra, allowing to
retrieve data, insert data, modify existing data and delete data from/to a RDBMS. SQL
features arithmetic operators like division, multiplication, subtraction and addition, and
comparison operators (=, >=, <=). SQL also defines several aggregate functions like
MAX, MIN, AVG, COUNT, and SUM.
SQL defines many keywords, which can be divided into several categories. The first
SQL keyword category is for keywords used for data retrieval like the SELECT keyword.
The second category is for the SQL keywords used for data manipulation like the
INSERT, UPDATE, and DELETE SQL keywords. The third category is the transactional
SQL keywords category, featuring keywords like COMMIT and ROLLBACK. Another SQL
keyword category is the SQL Data Definition Language category featuring words like
CREATE and DROP. Yet another category of SQL keywords controls the authorization
and permission aspects of RDBMS (GRANT and REVOKE keywords). SQL is pronounced
as “S-Q-L” or “see-quill”.
There are many SQL implementations also called SQL dialects and SQL extensions. For
example MS SQL Server specific version of the SQL is called Transact-SQL, Oracle
version of SQL is called PL/SQL, MS Access version of SQL is called JET SQL.
Dr. Edgar Frank Codd (August 23, 1923 – April 18, 2003) known as “Ted” and in his
published articles known as E. F. Codd was a British computer scientist and the original
developer of the relational data model back in 1970 while he was working for IBM as a
researcher. He is also known as the father of the relational database.
Note: Dr. Codd actually defined 13 rules 0 – 12 but they are referred to as Codd's 12
Rules for the relational model
4. The Internet :
5. The Intranet :
http://intranet.uiic.com, http://10.85.147.210
6. Extranet Definition
An extranet is a private network that uses the Internet protocol and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users
outside the company. Think of an extranet as being a private portion of the Internet. If
you were to remove the secure aspects of an extranet then you would in effect have
just another piece of the Internet.
An extranet requires security and privacy. These require firewall server management,
the issuance and use of digital certificates or similar means of user authentication,
encryption of messages, and the use of virtual private networks (VPN) that tunnel
through the public network.
Eg. Connecting Motor Dealers to issue Web Covernote assessing our Servers.
Office automation software is the grail of business computing. The business world relies
on a combination of word processing, spreadsheet, and presentation software to make
the most of their organization's information.
The main component of the office suits are – Word Processor, Spread Sheet,
Presentation Database
Some of the common Office Suites are – MS Office, Star Office, Lotus Smart Suite,
Open Office
8. Operating System :
The operating system acts as a host for applications that are run on the machine. As a
host, one of the purposes of an operating system is to handle the details of the
operation of the hardware. This relieves application programs from having to manage
these details and makes it easier to write applications. Almost all computers, including
handheld computers, desktop computers, supercomputers, and even video game
consoles, use an operating system of some type.
Common contemporary operating systems include Microsoft Windows, Mac OS, Linux,
Unix and Solaris
9. Computer Virus :
Computer Virus is a computer program that can copy itself and infect a computer
without permission or knowledge of the user. The original virus may modify the copies,
or the copies may modify themselves, as occurs in a metamorphic virus. A virus can
only spread from one computer to another when its host is taken to the uninfected
computer, for instance by a user sending it over a network or the Internet, or by
carrying it on a removable medium such as a floppy disk, CD, or USB drive.
Meanwhile viruses can spread to other computers by infecting files on a network file
system or a file system that is accessed by another computer.. Worms and Trojans
may cause harm to either a computer system's hosted data, functional performance, or
networking throughput, when executed. Some can't be seen when the program is not
running, but as soon as the infected code is run, the Trojan horse kicks in. That is why
it is so hard for people to find viruses and other malware themselves and why they
have to use spyware programs and registry processors.
Some of the common Anit Virus Packages – Etrust Anti Virus, Norton, Quick Heal,
Macfee
10. NETWORK :
A group of two or more computer systems linked together. There are many types of
computer networks, including:
Distiguish :
I. System software :
System software is any computer software which manages and controls computer
hardware so that application software can perform a task. Operating systems, such as
Microsoft Windows, Mac OS X or Linux, are prominent examples of system software.
System software contrasts with application software, which are programs that enable
the end-user to perform specific, productive tasks, such as word processing or image
manipulation.
System software performs tasks like transferring data from memory to disk, or
rendering text onto a display device. Specific kinds of system software include loading
programs, Operating systems, device drivers, programming tools, compilers,
assemblers, linkers, and utility software.
1) LAN :
A local area network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link. Typically, connected devices share the
resources of a single processor or server within a small geographic area (for example,
within an office building). Usually, the server has applications and data storage that are
shared in common by multiple computer users. A local area network may serve as few
as two or three users (for example, in a home network) or as many as thousands of
users (for example, UIIC intranet, Payroll)
2) WAN:
Q. What is the difference between a LAN, a MAN, and a WAN, and what is a
LAN connection?
A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive. Our Genisys is working in LAN environment
A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. Eg. all computes are connecting with RO
I. Assembly language
The computation in high level language program is less than assembly language.
this program runs slower to produce the desired result as compared to Assembly
language. This program Contains less instruction than Assembly Language.
The program written on one computer can be used on other computer
I. Systems Analysis -
The analysis of the role of a proposed system and the identification of the requirements
that it should meet. System Analysis is the starting point for system design. The term
is most commonly used in the context of commercial programming, where software
developers are often classed as either systems analysts or programmers. The systems
analysts are responsible for identifying requirements (i.e. systems analysis) and
producing a design. The programmers are then responsible for implementing it.
The process of writing source code requires expertise in many different subjects,
including knowledge of the application domain, specialized algorithms and formal logic.
Diagram, often used in computing, to show the possible paths that data can take
through a system or program.
A system flow chart, or data flow chart, is used to describe the flow of data through a
complete data-processing system. Different graphic symbols represent the clerical
operations involved and the different input, storage, and output equipment required.
Although the flow chart may indicate the specific programs used, no details are given of
how the programs process the data.
A program flow chart is used to describe the flow of data through a particular computer
program, showing the exact sequence of operations performed by that program in
order to process the data. Different graphic symbols are used to represent data input
and output, decisions, branches, and subroutines.
I. Transaction File
A collection of transaction records. The data in transaction files is used to update the
master files, which contain the data about the subjects of the organization (customers,
employees, vendors, etc.). Transaction files also serve as audit trails and history for the
organization. Where before they were transferred to offline storage after some period
of time, they are increasingly being kept online for routine analyses. For example
Employee salary, Policy Record, Expenses Details data stored in the files can be defined
as Transaction files
I. Sequential File
File in which the records are arranged in order of a key field and the computer can use
a searching technique, like a binary search, to access a specific record.
Definition: A file which stores keys and an index into another file. The index file may
have additional structure,
Note: An index file is helpful if records are large: the keys and indexes can be
extracted, sorted, and the original file accessed faster than the original file could be
rearranged into sorted order. Also if the file needs to be accessed by different keys at
the same time, it cannot be sorted by all of them. So a index file is maintained for each
different key.
OOO
Computer Abbreviation
# 3G Third-generation
A
ACL Access Control List
AIF Audio Interchange Format
AID Advertiser ID
AIP Association of Internet Professionals
ANSI American National Standards Institute
AJAX Asynchronous JavaScript and XML
API Application Program Interface
ARP Address Resolution Protocol
ASCII American Standard Code for Information Interchange
ACE Accredited System Engineer
ASF Advanced Streaming Format
ASIN Amazon.com Standard Item Number
ASP Active Server Pages or Application Service Provider
ASPN Apple Solution Professionals Network
ATM Asychronous Transfer Mode
DB Database
DBA Database Administrator
DBMS Database Management System
DCOM Distributed Component Object Model
DDE Dynamic Data Exchange
DDS Digital Data Storage
DIR Directory
DIVX Digital Video Express
DLC Data Link Control
DMOZ Directory Mozilla
DNS Domain Name Service
DHCP Dynamic Host Configuration Protocol
DHTML Dynamic Hyper Text Markup Language
DSU Data Service Unit
DTD Document Type Definition
DLL Dynamic Link Library
DOM Document Object Model
DRM Digital Restrictions Management
DSL Digital Subscriber Line
F
FAQ Frequently Asked Questions
FAT File Allocation Table
FDDI Fiber Distributed Data Interface
FFA Free For All
FSF Free Software Foundation
FTP File Transfer Protocol
L
LAMP Linux Apache MySQL PHP
LDAP Lightweight Directory Access Protocol
LILO Last In Last Out
LSI Latent Semantic Indexing
O
OCS Open Content Syndication
ODBC Open Database Connectivity
ODP Open Directory Project
OEM Original Equipment Manufacturer
OLE Object Linking and Embedding
OOP Object Oriented Programming
OPML Outline Processor Markup Language
OS Operating System
OSI Open System Interconnection
OSPF Open Shortest Path First
V
Veronica Very Easy Rodent Oriented Ntwk Index to Comp. Archives
VM Virtual Machine
VLAN Virtual LAN
VPN Virtual Private Network
VRML Virtual Reality Markup Language
VTAM Virtual Telecommunications Access Method