It Handbook

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

A Hand Book for Para 13.2 Exam.

A Handbook

for Para 13.2 examination

DATA PROCESSING

and

MANAGEMENT INFORMATION SYSTEM (M.I.S.)

Compiled by -

Alok Jain, Asst. Manager - IT

UIIC RO – IT Jaipur 1 by Alok Jain


A Hand Book for Para 13.2 Exam. 2

Important Definitions

1. RDBMS :

RDBMS stands for Relational Database Management System. RDBMS data is structured
in database tables, fields and records. Each RDBMS table consists of database table
rows. Each database table row consists of one or more database table fields.

RDBMS store the data into collection of tables, which might be related by common
fields (database table columns). RDBMS also provide relational operators to manipulate
the data stored into the database tables. Most RDBMS use as database query language

The most popular RDBMS are MS SQL Server, DB2, Oracle and MySQL.

2. SQL :

SQL is an acronym for Structured Query Language and is a standard relational query
language used for interaction with databases.

SQL was developed by IBM in 1970s and has its roots in the relational algebra defined
by Codd in 1972. SQL functionality goes beyond the relational algebra, allowing to
retrieve data, insert data, modify existing data and delete data from/to a RDBMS. SQL
features arithmetic operators like division, multiplication, subtraction and addition, and
comparison operators (=, >=, <=). SQL also defines several aggregate functions like
MAX, MIN, AVG, COUNT, and SUM.

SQL defines many keywords, which can be divided into several categories. The first
SQL keyword category is for keywords used for data retrieval like the SELECT keyword.
The second category is for the SQL keywords used for data manipulation like the
INSERT, UPDATE, and DELETE SQL keywords. The third category is the transactional
SQL keywords category, featuring keywords like COMMIT and ROLLBACK. Another SQL
keyword category is the SQL Data Definition Language category featuring words like
CREATE and DROP. Yet another category of SQL keywords controls the authorization
and permission aspects of RDBMS (GRANT and REVOKE keywords). SQL is pronounced
as “S-Q-L” or “see-quill”.

There are many SQL implementations also called SQL dialects and SQL extensions. For
example MS SQL Server specific version of the SQL is called Transact-SQL, Oracle
version of SQL is called PL/SQL, MS Access version of SQL is called JET SQL.

3. Codd's 12 Rules For The Relational Model

Dr. Edgar Frank Codd (August 23, 1923 – April 18, 2003) known as “Ted” and in his
published articles known as E. F. Codd was a British computer scientist and the original
developer of the relational data model back in 1970 while he was working for IBM as a
researcher. He is also known as the father of the relational database.

UIIC RO – IT Jaipur 2 by Alok Jain


A Hand Book for Para 13.2 Exam. 3

In 1985 Dr. Codd published a list of 12 rules to define a relational database in


Computerworld magazine that still stand today as a “Guide” to Relational Database
Management Systems (RDBMS) such as Microsoft SQL.

Note: Dr. Codd actually defined 13 rules 0 – 12 but they are referred to as Codd's 12
Rules for the relational model

4. The Internet :

The Internet is best characterized as "the biggest network of computer networks on


earth."

A computer network is a data communications


system made up of hardware and software that
transmits data from one computer to another. In
part, a computer network includes physical
infrastructure like wires, cables, fiber optic lines,
undersea cables, and satellites. The other part of
a network is the software to keep it running.
Computer networks can connect to other
computer networks to get an even bigger
computer network.

The Internet is a set of connected computer


networks. For example www.yahoo.com,
www.indiatimes.com. www.uiic.co.in

5. The Intranet :

An intranet is a private network that is contained within an enterprise. It may consist of


many interlinked local area networks and also use leased lines in the wide area network.
Typically, an intranet includes connections through one or more gateway computers to
the outside Internet. The main purpose of an intranet is to share company information
and computing resources among employees. An intranet can also be used to facilitate
working in groups and for teleconferences.

http://intranet.uiic.com, http://10.85.147.210

6. Extranet Definition

An extranet is a private network that uses the Internet protocol and the public
telecommunication system to securely share part of a business's information or
operations with suppliers, vendors, partners, customers, or other businesses. An
extranet can be viewed as part of a company's intranet that is extended to users
outside the company. Think of an extranet as being a private portion of the Internet. If
you were to remove the secure aspects of an extranet then you would in effect have
just another piece of the Internet.

An extranet requires security and privacy. These require firewall server management,
the issuance and use of digital certificates or similar means of user authentication,

UIIC RO – IT Jaipur 3 by Alok Jain


A Hand Book for Para 13.2 Exam. 4

encryption of messages, and the use of virtual private networks (VPN) that tunnel
through the public network.

Eg. Connecting Motor Dealers to issue Web Covernote assessing our Servers.

7. Office Automation Suite :

The integration of office information functions, including word processing, data


processing, graphics, desktop publishing and e-mail.

An Office Automation suite generally consists of a Word Processor, a Financial


Spreadsheet, a Database and some Presentation software. Email is either included in
the package or added separately. office automation almost always means a suite of
applications from the same vendor.

Office automation software is the grail of business computing. The business world relies
on a combination of word processing, spreadsheet, and presentation software to make
the most of their organization's information.

The main component of the office suits are – Word Processor, Spread Sheet,
Presentation Database

Some of the common Office Suites are – MS Office, Star Office, Lotus Smart Suite,
Open Office

8. Operating System :

An operating system (commonly abbreviated OS and O/S) is the software component


of a computer system that is responsible for the management and coordination of
activities and the sharing of the resources of the computer.

The operating system acts as a host for applications that are run on the machine. As a
host, one of the purposes of an operating system is to handle the details of the
operation of the hardware. This relieves application programs from having to manage
these details and makes it easier to write applications. Almost all computers, including
handheld computers, desktop computers, supercomputers, and even video game
consoles, use an operating system of some type.

Common contemporary operating systems include Microsoft Windows, Mac OS, Linux,
Unix and Solaris

9. Computer Virus :

Computer Virus is a computer program that can copy itself and infect a computer
without permission or knowledge of the user. The original virus may modify the copies,
or the copies may modify themselves, as occurs in a metamorphic virus. A virus can
only spread from one computer to another when its host is taken to the uninfected
computer, for instance by a user sending it over a network or the Internet, or by
carrying it on a removable medium such as a floppy disk, CD, or USB drive.

UIIC RO – IT Jaipur 4 by Alok Jain


A Hand Book for Para 13.2 Exam. 5

Meanwhile viruses can spread to other computers by infecting files on a network file
system or a file system that is accessed by another computer.. Worms and Trojans
may cause harm to either a computer system's hosted data, functional performance, or
networking throughput, when executed. Some can't be seen when the program is not
running, but as soon as the infected code is run, the Trojan horse kicks in. That is why
it is so hard for people to find viruses and other malware themselves and why they
have to use spyware programs and registry processors.

Some of the common Anit Virus Packages – Etrust Anti Virus, Norton, Quick Heal,
Macfee

10. NETWORK :

A group of two or more computer systems linked together. There are many types of
computer networks, including:

Distiguish :

A) System Software vs Application Software:

I. System software :

System software is any computer software which manages and controls computer
hardware so that application software can perform a task. Operating systems, such as
Microsoft Windows, Mac OS X or Linux, are prominent examples of system software.
System software contrasts with application software, which are programs that enable
the end-user to perform specific, productive tasks, such as word processing or image
manipulation.

System software performs tasks like transferring data from memory to disk, or
rendering text onto a display device. Specific kinds of system software include loading
programs, Operating systems, device drivers, programming tools, compilers,
assemblers, linkers, and utility software.

II. Application software

Application software is a subclass of computer software that employs the capabilities


of a computer directly and thoroughly to a task that the user wishes to perform. This
should be contrasted with system software which is involved in integrating a
computer's various capabilities, but typically does not directly apply them in the
performance of tasks that benefit the user. In this context the term application refers
to both the application software and its implementation.

A simple, if imperfect analogy in the world of hardware would be the relationship of an


electric light bulb (an application) to an electric power generation plant (a system). The
power plant merely generates electricity, not itself of any real use until harnessed to an
application like the electric light that performs a service that benefits the user.

Typical examples of software applications are word processors, spreadsheets, and


media players.

UIIC RO – IT Jaipur 5 by Alok Jain


A Hand Book for Para 13.2 Exam. 6

1) LAN :

A local area network (LAN) is a group of computers and associated devices that share a
common communications line or wireless link. Typically, connected devices share the
resources of a single processor or server within a small geographic area (for example,
within an office building). Usually, the server has applications and data storage that are
shared in common by multiple computer users. A local area network may serve as few
as two or three users (for example, in a home network) or as many as thousands of
users (for example, UIIC intranet, Payroll)

2) WAN:

A wide area network (WAN) is a geographically dispersed telecommunications network.


The term distinguishes a broader telecommunication structure from a local area
network (LAN). A wide area network may be privately owned or rented, but the term
usually connotes the inclusion of public (shared user) networks.

Q. What is the difference between a LAN, a MAN, and a WAN, and what is a
LAN connection?

A LAN (local area network) is a group of computers and network devices connected
together, usually within the same building. By definition, the connections must be high
speed and relatively inexpensive. Our Genisys is working in LAN environment

A MAN (metropolitan area network) is a larger network that usually spans several
buildings in the same city or town. Eg. all computes are connecting with RO

A WAN (wide area network), in comparison to a MAN, is not restricted to a


geographical location, although it might be confined within the bounds of a state or
country. A WAN connects several LANs, and may be limited to an enterprise (a
corporation or an organization) or accessible to the public. The technology is high
speed and relatively expensive. The Internet is an example of a worldwide public WAN.

B) Assembly language VS High Level (Machine) Language:-

I. Assembly language

The computation in assembly language program is less than machine language.


This program runs faster to produce the desired result as compared to high level
language. This program contains more instruction than High level language.
The program written on one computer can't be used on any other computer

II. High level language :-

The computation in high level language program is less than assembly language.
this program runs slower to produce the desired result as compared to Assembly
language. This program Contains less instruction than Assembly Language.
The program written on one computer can be used on other computer

UIIC RO – IT Jaipur 6 by Alok Jain


A Hand Book for Para 13.2 Exam. 7

C) System Analysis VS Computer Programming :

I. Systems Analysis -

The analysis of the role of a proposed system and the identification of the requirements
that it should meet. System Analysis is the starting point for system design. The term
is most commonly used in the context of commercial programming, where software
developers are often classed as either systems analysts or programmers. The systems
analysts are responsible for identifying requirements (i.e. systems analysis) and
producing a design. The programmers are then responsible for implementing it.

II. Computer Programming :

Computer programming (often shortened to programming or coding) is the


process of writing, testing, debugging/troubleshooting, and maintaining the source
code of computer programs. This source code is written in a programming language.
The code may be a modification of an existing source or something completely new.
The purpose of programming is to create a program that exhibits a certain desired
behavior (customization).

The process of writing source code requires expertise in many different subjects,
including knowledge of the application domain, specialized algorithms and formal logic.

Said another way, programming is the craft of transforming requirements into


something that a computer can execute.

D) System Flow Chart VS Program Flow Chart :

Diagram, often used in computing, to show the possible paths that data can take
through a system or program.

A system flow chart, or data flow chart, is used to describe the flow of data through a
complete data-processing system. Different graphic symbols represent the clerical
operations involved and the different input, storage, and output equipment required.
Although the flow chart may indicate the specific programs used, no details are given of
how the programs process the data.

A program flow chart is used to describe the flow of data through a particular computer
program, showing the exact sequence of operations performed by that program in
order to process the data. Different graphic symbols are used to represent data input
and output, decisions, branches, and subroutines.

E) Transaction File VS Master File :

I. Transaction File

A collection of transaction records. The data in transaction files is used to update the
master files, which contain the data about the subjects of the organization (customers,
employees, vendors, etc.). Transaction files also serve as audit trails and history for the
organization. Where before they were transferred to offline storage after some period
of time, they are increasingly being kept online for routine analyses. For example

UIIC RO – IT Jaipur 7 by Alok Jain


A Hand Book for Para 13.2 Exam. 8

Employee salary, Policy Record, Expenses Details data stored in the files can be defined
as Transaction files

II. Master File :

A collection of records pertaining to one of the main subjects of an information system,


such as customers, employees, products and vendors. Master files contain descriptive
data, such as name and address, as well as summary information, such as amount due
and year-to-date sales. Contrast with transaction file. Like Agent Master, Surveyor,
Emplyee Master etc.

F) Sequential File VS Index File :

I. Sequential File

File in which the records are arranged in order of a key field and the computer can use
a searching technique, like a binary search, to access a specific record.

II. Index File

Definition: A file which stores keys and an index into another file. The index file may
have additional structure,

Note: An index file is helpful if records are large: the keys and indexes can be
extracted, sorted, and the original file accessed faster than the original file could be
rearranged into sorted order. Also if the file needs to be accessed by different keys at
the same time, it cannot be sorted by all of them. So a index file is maintained for each
different key.

OOO

UIIC RO – IT Jaipur 8 by Alok Jain


A Hand Book for Para 13.2 Exam. 9

Computer Abbreviation
# 3G Third-generation

A
ACL Access Control List
AIF Audio Interchange Format
AID Advertiser ID
AIP Association of Internet Professionals
ANSI American National Standards Institute
AJAX Asynchronous JavaScript and XML
API Application Program Interface
ARP Address Resolution Protocol
ASCII American Standard Code for Information Interchange
ACE Accredited System Engineer
ASF Advanced Streaming Format
ASIN Amazon.com Standard Item Number
ASP Active Server Pages or Application Service Provider
ASPN Apple Solution Professionals Network
ATM Asychronous Transfer Mode

B2B Business to Business


B2C Business to Consumer
BBS Bulletin Board System
bin Binary
bps Bits Per Second
BLOB Binary Large Object
BLOG Web Log
BSD Berkley Software Distribution

CAD Computer Aided Design


CAT-5 Category 5
CCA Citrix Certified Administrator
CCDA Cisco Certified Design Associate
CCDP Cisco Certified Design Professional
CCEA Citrix Certified Enterprise Administrator
CCI Citrix Certified Instructor
CCIP Cisco Certified Internetwork Professional
CCNP Cisco Certified Network Professional
CCNA Cisco Certified Network Administrator
CERN European Particle Physics Laboratory
CFML Cold Fusion Markup Language
CCSP Citrix Certified Sales Professional
CCIE Cisco Certified Internetwork Expert

UIIC RO – IT Jaipur 9 by Alok Jain


A Hand Book for Para 13.2 Exam. 10

CSS Cascading Style Sheet


CGI Common Gateway Interface
CHAP Challenge Handshake Authentication Protocol
CHMOD Change Mode
CHTML Compact HTML
CISSP Certified Information System Security Professional
CIW Certified Internet Webmaster
CMS Content Management System
CNA Certified Novell Administrator
CNE Certified Novell Engineer
COM Component Object Model
CORBA Common Object Request Broker Architecture
CPA Cost Per Action
CPM Cost Per Thousand Impressions
CPC Cost Per Click
CPU Central Processing Unit
CRM Customer Relationship Management
CSU Channel Service Unit
CSV Comma Separated Value
CTEC Microsoft Certified Technical Education Center
CTO Chief Technology Officer
CWNA Certified Wireless Network Administrator
CWNI Certified Wireless Network Integrator
CWNE Certified Wireless Networking Expert
CWNP Certified Wireless Network Professional
CYMK Cyan Magenta Yellow Black
CWP Certified Web Professional
CWSP Certified Wireless Security Professional

DB Database
DBA Database Administrator
DBMS Database Management System
DCOM Distributed Component Object Model
DDE Dynamic Data Exchange
DDS Digital Data Storage
DIR Directory
DIVX Digital Video Express
DLC Data Link Control
DMOZ Directory Mozilla
DNS Domain Name Service
DHCP Dynamic Host Configuration Protocol
DHTML Dynamic Hyper Text Markup Language
DSU Data Service Unit
DTD Document Type Definition
DLL Dynamic Link Library
DOM Document Object Model
DRM Digital Restrictions Management
DSL Digital Subscriber Line

UIIC RO – IT Jaipur 10 by Alok Jain


A Hand Book for Para 13.2 Exam. 11

ECMA European Computer Manufacturer's Association


EOF End of File

F
FAQ Frequently Asked Questions
FAT File Allocation Table
FDDI Fiber Distributed Data Interface
FFA Free For All
FSF Free Software Foundation
FTP File Transfer Protocol

Gbps Giga Bits Per Second


GBps Giga Bytes Per Second
GHz Gigahertz
GIF Graphics Interchange Format
GIMP GNU Image Manipulation Program
GML Generalized Markup Language
GPL GNU Public License
GREP Global Regular Expression Print
GUI Graphical User Interface

HCL Hardware Compatibility List


HDML Handheld Device Markup Language
HSB Hue Saturation Brightness
HTI Home Technology Integrator
HTML Hyper Text Markup Language
HTTP HTTP
HWG HTML Writers Guild

IAB Internet Architecture Board


IANA Assigned Numbers Authority
ICANN Internet Corp for Assigned Names and Numbers
ICII Internet Certification Institute International
IEEE Institute of Electrical and Electronic Engineers
IETF Internet Engineering Task Force
IIS Internet Information Server
IMAP Internet Messaging Access Protocol
IPC Interprocess Communication
IPX Internetnetwork Packet Exchange
IRTF Internet Research Task Force

UIIC RO – IT Jaipur 11 by Alok Jain


A Hand Book for Para 13.2 Exam. 12

ISAPI Internet Server API


ISBN International Standard Book Number
ISDN Integrated Services Digital Network
ISO International Standards Organization
ISOC Internet Society
ISP Internet Service Provider
IT Information Technology
ITU International Telecomunications Union
IWA International Webmasters Association

J2EE Java 2 Platform Enterprise Edition


JAR Java Archive
JDBC Java Database Connectivity
JIT Just In Time
JDK Java Development Kit
JPEG Joint Photographics Expert Group
JSP Java Server Page
JVM Java Virtual Machine

Kbps Kilo Bits Per Second


KBps Kilo Bytes Per Second
KDE K Desktop Environment

L
LAMP Linux Apache MySQL PHP
LDAP Lightweight Directory Access Protocol
LILO Last In Last Out
LSI Latent Semantic Indexing

MAC Media Access Control


Mbps Mega Bits Per Second
MBps Mega Bytes Per Second
MCAD Microsoft Certified Application Developer
MCDBA Microsoft Certified Database Administrator

MCSD Microsoft Certified Systems Developer


MCP Microsoft Certified Professional
MCSE Microsoft Certified Systems Engineer
MFA Made for AdSense
MIB Management Information Base
MIME Multipurpose Internet Mail Extensions
MMC Microsoft Management Console
MOUS Microsoft Office User Specialist

UIIC RO – IT Jaipur 12 by Alok Jain


A Hand Book for Para 13.2 Exam. 13

MP3 MPEG Layer 3


MPEG Moving Picture Experts Group

NAP Network Access Point


NCSA National Center for Supercomputing Applications
NIC Network Interface Card
NTFS NT File System

O
OCS Open Content Syndication
ODBC Open Database Connectivity
ODP Open Directory Project
OEM Original Equipment Manufacturer
OLE Object Linking and Embedding
OOP Object Oriented Programming
OPML Outline Processor Markup Language
OS Operating System
OSI Open System Interconnection
OSPF Open Shortest Path First

PAD Portable Application Description


PDA Personal Digital Assistant
PDF Portable Document Format
PERL Practical Extraction and Report Language
PGP Pretty Good Privacy
PHP Hypertext Preprocessor
PID Publisher ID
PNG Portable Network Graphics
POP Post Office Protocol
PPC Pay Per Click
PPP Point to Point Protocol
PPTP Point to Point Tunneling Protocol
PR Page Rank

QOS Quality of Service

RAID Redundant Array of Independent Disks


RAS Remote Access Server
RDBMS Relational Database Management System
RDF Resource Decription Framework
RFC Request For Comments
RGB Red, Green, Blue

UIIC RO – IT Jaipur 13 by Alok Jain


A Hand Book for Para 13.2 Exam. 14

RHCE Red Hat Certified Engineer


RHCP Red Hat Certified Professional
RIP Routing Information Protocol
RMON Remote Monitoring
ROI Return on Investment
RON Run of Network
ROS Run of Site
RSS Rich Site Summary
RTF Rich Text Format

SAP Service Advertising Protocol


SAX Simple API for XML
SCNA Security Certified Network Architect
SCNP Security Certified Network Professional
SCP Security Certified Program
SDK Software Development Kit
SED Stream Editor
SGML Standard Generalized Markup Language
SEM Search Engine Marketing
SEO Search Engine Optimization
SERP Search Engine Results Page
SID Security Identifier
SLIP Serial Line Internet Protocol
SMIL Synchronized Multimedia Integration Language
SMP Simple Management Protocol
SMS Systems Management Server
SMTP Simple Mail Transfer Protocol
SNA Systems Network Architecture
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol
SPX Sequenced Packet Exchange
SQL Structure Query Language
SSH Secure Shell
SSI Server Side Include
SSL Secure Sockets Layer
SVG Scalable Vector Graphics

TCP/IP Transmission Control Protocol/Internet Protocol


TFTP Trivial File Transfer Protocol
TLD Top Level Domain
TOS Terms of Service
TTL Time To Live

UCE Unsolicited Commercial E-Mail (spam)

UIIC RO – IT Jaipur 14 by Alok Jain


A Hand Book for Para 13.2 Exam. 15

UDDI Universal Description, Discovery and Integration


UDP User Datagram Protocol
UI User Interface
UML Unified Modeling Language
UMTS Universal Mobile Telecommunications System
URL Uniform Resource Locator

V
Veronica Very Easy Rodent Oriented Ntwk Index to Comp. Archives
VM Virtual Machine
VLAN Virtual LAN
VPN Virtual Private Network
VRML Virtual Reality Markup Language
VTAM Virtual Telecommunications Access Method

W3C World Wide Web Consortium


WAIS Wide Area Information Server
WAN Wide Area Network
WAP Wireless Application Protocol
WBT Web-based Training
WECA Wireless Ethernet Compatibility Alliance
WEP Wired Equivalency Privacy
WIPO World Intellectual Property Organization
WLAN Wireless Lan
Wi-Fi Wireless Fidelity
WM Webmaster
WML Wireless Markup Language
WSDL Web Services Description Language
WWW World Wide Web
WYSIWYG What You See Is What You Get

XBRL Extensible Business Reporting Language


XHTML Extensible Hyper Text Markup Language
Xlink XML Linking Language
XLS Extensible Stylesheet Language
XSLT Extensible Stylesheet Language Transformations
XML Extensible Markup Language
XQL XML Query Language
XSD XML Schema Definition
XUL Extensible User Interface Language
Y2K Year 2000

UIIC RO – IT Jaipur 15 by Alok Jain

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy