LBSC 690 Fall 98 Final Review There will be about 5 questions on the final, and each question will be worth about the same number of points. Questions may, however, have several parts. You may bring a calculator, and I expect that use of one or more of the computer applications for which there was homework assigned (Internet, Web, Database, Spreadsheet, and/or Java) will be a part of the exam. You will have two hours to complete the exam, starting as soon as we have gone over the instructions and the questions. "Seven" uses of the Internet - Characteristics o One way vs. two way o Person to person vs. person to computer vs. computer to computer o One to one vs. many to many o Synchronous vs. asynchronous - Web Pages o how to read a URL o How to find a web page + Alta Vista + Yahoo - Telnet o VT-100 - FTP o anonymous FTP - Email o How to read an email address o MIME attachments - USENET News - Talk - IRC Hardware - CPU o Bus - Memory o Cache, RAM, ROM o Floppy Disk o Hard Disk o CDROM o Tape Backup - Communications o MODEMs o LAN + Ethernet o WAN + Routers Accommodating different hardware speeds - CPU - Cache - Memory - Disk - Network Software - Operating systems - Programming languages - Application software - Embedded software Document Creation - Editors o ASCII - Advantages and limitations - Word Processors - Structured documents o Email o HTML + Style Document retrieval - Frequent terms - Selective terms Spreadsheets - Uses - Layout - Style - How to use Excel Databases - Uses - Types (flat files, relational) - Why split tables o Functional relationship o Redundancy o Consistency - Operations o Restrict o Project o Join - How to use Access Programming - Overview o Special purpose languages o Model building - History o Machine code o Assembly language o High level language (FORTRAN) o Structured programming (C) o Object oriented language (Java) - Program design o Variables o Operators o Statements o Control flow (sequential, conditional, loop) o Methods o Classes o Objects + Instantiation o Compilation + Architecture independence + Bytecode o Buy vs. rent - Project Management o The mythical person-month Multimedia - Image coding + Lossless vs. lossy compression + GIF vs. JPEG + MPEG - Audio coding o Compression: Music vs. voice - Transmission o MIME o Streaming audio and video - Virtual reality Human Computer Interaction - Interfaces o Input devices o Output devices - Models o User model o System model - Types of systems o Life critical o Custom commercial o Office and Home o Creative - User characteristics o Physical o Cognitive o Perceptual o Personality + Cultural - Command languages - Direct manipulation o Icons - Menus o Depth vs. bredth - Dynamic queries Computer Supported Cooperative Work - Focus o Cooperative work - Types o Synchronous local o Synchronous remote o Asynchronous remote - Technology issues o Standards o Security o Replication Library automation - Systems Analysis o Task analysis o Information flow + Acquisition + Cataloging + OPAC + Circulation + Collection Policy o Environment o Problems with non-automated approaches - Systems issues o Availability o Capacity o Flexibility o Architecture o Batch o Timesharing o Client-Server - Management issues o Retrospective conversion o Training o Privacy o Management information Educational Computing - Clifford Stoll o Jobs of the future o "Information is power" + Data + Information + Understanding + Wisdom - Rationales o Social o Vocational o Pedagogic + Computer classrooms vs. computers IN classrooms o Catalytic - Uses of computing o Computer Assisted Education + Most conditions for success are organizational o Computer Managed Instruction o Computer Mediated Communication o Computer-based Multimedia - Media characteristics o Books o Video o Computers - Distance education Computing as a social process - Ownership o Access policy o Access control o Denial of service - Identity o Attribution o Impersonation - Integrity o Substitution - Privacy o Privacy rights o Sources of information about users o Ways of maintaining privacy + Encryption + Obscurity - Evils o Viruses o Trojan horses - Access control o Physical security o Password protection + Password crackers + Password sniffers + Guidelines for selecting passwords o Firewalls - Encryption o Public read key/Private write key + Digital signatures certify authorship + Prevents undetected substitution o Public write key/Private read key + Protects privacy - Policy approaches o Authenticate o Authorize o Audit o Supervise Computing for social puproses - Limiting use o Purposes o Approaches + Access control + Copy protection + Digital watermarks + Shareware - Anonymity o Anonymous remailers o Pseudonyms - Nettiquite Complex systems - Understandability o Nature of bugs - Availability for critical systems - Auditability Digital Libraries - Characteristics of digital objects o Perfect reproduction o Inexpensive and rapid distribution o Compact storage o Easily searched - Limitations o Display technology o Relative cost of organizing information - Access o End-user searching o Intermediated search o Recommender systems - Legal issues o WIPO implementing leglislation --------------------------------------- End -----------------------