User:P858snake/Sandbox/009/IPT
Appearance
Database
[edit]Usage
[edit]- Pro/Cons of DB usage
- Different Designs/Types (eg: Access/MySql/MsSQL/Flat Files)
- Field Types and uses
- Query Design/Manipulation - Accessing stored data
- Creating databases
Design
[edit]- Object role modeling
- Normalization
- Elementary Sentences
- Constraints
- Object-relational mapping
- Conceptual schema diagrams
Programming
[edit]- PHP
- VB.net
Software Piracy
[edit]- How widespread is the problem
- How is software obtained illegally
- What techniques software companies use to thwart illegal use
- What techniques the illegal user adopts to thwart security measures
- The availability of , and usefulness of, freeware or shareware
Networks
[edit]- Difference between styles
- Peer to Peer
- Server Client Models
- Advantages/Disadvantages of networks
- Share files/printers
- Share internet connection
- user authentication
- settings of rights to restrict users
- centralized backups
- centralized virus checking
- automated updates of programs
- automated installs of programs
- licensing monitoring
- Signs of a virus
- CPU usage – general slow down
- Increase size usage
- Files corrupted
- Pop ups
- Odd start up producers & processes
- Hard drive usage
- Preventing Viruses
- Router or firewall
- Antivirus program + updates
- Avoid limewire & the like
- Use a different os
- Eg: apple/linux
- User a different browser other than IE
- Backup data
- Keep original cds/dvds
- Define network terms
Terms |
---|
|
- Define these malware terms
Terms |
---|
|
General Computer
[edit]- Boot Sequence
- Types of Raids (0-6)
- Hardware Components