Tuesday, March 29, 2011

JOM KITA 'FAMILIARIZE' KEYWORDS & ABBREVIATIONS UNTUK BAB 12 & 13

dari ku utuk mu... =)


(perhaps kalau masuk quiz...nnt boleh la tahu, xla ternganga-ngaga..skodeng mmber sebelah) HEHEHE...=)

 salah satu cara nak mulakan study smart。。。。

CHAPTER 12 : DATABASES

Data consists of facts or observations about people, places, things, and events.
TWO WAYS @ PERSPECTIVES TO VIEW DATA :
A) Physical view------> actual formats and location of data; very specialized computer professionals are concerned with this view.
B) Logical view------>focuses on meaning and content of data;end users and most computer professionals are concerned with this view.

DATA IS ORGANIZED BY THE FOLLOWING GROUPS :
  • CHARACTER
  • FIELD              
  • RECORD                           [ cha fie rec tab datab ]
  • TABLE                       ====>  [capik fikir rencong tebu dibuat]   
  • DATABASE

  • KEY FIELD = PRIMARY KEY

  • BATCH ( LATER )vs REAL TIME  ( NOW )
PROCESSING 

DBMS = Database management system
- DBMS engine
-data definition subsystem (using a data dictionary or schema)
-data manipulation subsystem, provides tools for data maintenance & data analysis; tools include query-by-example and structured query language (SQL).
 
 
-APPLICATION GENERATION SUBSYSTEM (creating data entry forms with specialized programming languages)
-DATA ADMINISTRATION SUBSYSTEM
-DATABASE ADMINISTRATORS (DBAs) are computer professionals who help define processing rights.
-multidimensional database, sometimes called a data cube.


CHAPTER 13 
system analysis and design

SAD is a 6-phase problem-solving:




P/S; DO THE BEST!! SELAMAT MENJAWAB QUIZ & SELAMAT MENJAWAB 'FINAL' 


Monday, March 28, 2011

Batch vs Real-Time Processing

Hye guys!!
Owh too lots of work..
So tired~~


smpaikan blog nie pun x terupdate..
So let we talk about Batch vs Real-time Processing.
Batch-processing
=
=
Data is collected over several hours,days or even weeks.
When you buy things and charge them to your credit card,


At the end oh the month,
the company's data processing department puts all those transactions together
and processes them at one time.
=
Then you will get your bill!!

Next

Real-time Processing
=
=
also known as online processing
occurs when data is processed at the same time the transaction occurs.
For example, when you use your ATM card
to withdraw cash.


Tuesday, March 22, 2011

tecnology use in 'smart card'


Hello everyone…
This time I would like to share something that really close to us.
We are frequently  use this ‘THING’ but…….
are we really what kind technology that been apply to this ‘THING’?
the ‘THING’that I mean is
.
.
.
.
.
.
                                                             
                                                                   

                                                        


All this medium are uses  to make our life more and more secure especially to individual security concerns by use this called
 ‘SMART CARD’
Why we should secure about our security by using technology medium?
.
.
.
This is because, by using this medium the responsible parties
cannot identified who the user 





COMMON
Issues for IT Security
…….
….

• Moving beyond user name and password
• Managing internal and remote IT access
• Developing a systems view of physical and logical security
• Servicing beyond the network edge





A personal database
– Store and safeguard information on an individual basis
                                – Local, portable storage of an individual’s private information





A personal firewall
– Intelligent guardian of cardholder data
– verifying that requestors are authorized to access information
– Cardholder control of release of information



                                                                                 

 • A personal terminal
– Validation of the authenticity and trustworthiness of card readers or terminals
– Strong validation of cardholder as rightful  owner of the ID card

DO YOU KNOW THAT……. 
ID (identity card) systems that require the highest degree of security are combining smart card and biometric technologies.







Medium that use to identify the user
‘READER PRODUCT’
.........
......
....
..
.




                                                                              ...
                                                                                .
                                                                               
    


Not this kind kind of reader

…………..
…….
..




    






                                                                    this is the reader that i mean


Challenges Facing the Secure Identification Industry?



• When is visual authentication not enough?
• The maturity of machine-readable technology with more standards-based choices at lower costs
• The recognized need that exists to bind the identity of the cardholder to the card – how do you do it?
• How do you increase security without sacrificing speed and convenience?
• Managing scalable ID solutions that need multiple technologies with security and privacy from point of issuance to the network edge.