Wednesday, October 7, 2009

test 2 esei,,8sept09,,question2

the process of developing a new system will have to follow a strict order of a cycle called the system development cycle.there are five phases in how to develop a new system.first, planning the proposal.we need to plan first what is the users' requirement, the feasibility of the system will be tested and the products want to be developed.the right proposal can build a good system.

for the second phase is analyzing.we have to analyze the proposal or plan that we have made.the system will be analyzed whether it is useful or not.this is to avoid the system from having any problem.

and the third one is designing.after analyzing the system, we can design the system according to the suitability of system.this will make the user to recognize the system easily.

then for the fourth phase is implementation.for the implementation phase, they will install and try the new programs.this program is also will train the users when using it.then they can develop into the new program.

for the last one is operating,supporting and security.the system will be operated and supported by any other programs so that they can be used.then, the system will be included with security so that the users can use it safely.

test 2 esei,,8sept09,,question1

feasibility means measure of how suitable system development will be to the company.there are four tests to evaluate feasibility which is operational feasibility,schedule feasibility,technical feasibility and economic feasibility which is also called cost or benefit feasibility.

the final activity in the implementation phase is to convert the old system to the new one.this change can take place using one or more conversion strategies.first is direct conversion.this conversion change the old system to the new system alternating.so this will be no confusion for the users to convert it.the other conversion is parallel conversion.this conversion is using both of old and new system in the same time.this make the users can make check and balance.for the phased conversion it is using one system in one time.for this the feasibility has not been tested.and the last conversion is called pilot conversion.in this conversion they use both of the system differently.for the users they cannot identified which is the best system.between all of the conversion strategies,whether it is good or not it is in the users' choice to choose the best one.

Thursday, September 17, 2009

n da last chapter!12!!

what is enterprise computing?

enterprise means large organization such as multinational corporation,university,hospital,research laboratory, or government organization.meanwhile enterprise computing, meaning that use of computers in networks that encompass variety of operating systems,protocols and network architectures.this chapter tells us what is the purpose of enterprise computing and the uses.

we can know more about the technologies,e-commerce,computer hardware and many more that related to this enterprise.moreover we also can know how to make computer backup to save our important files to be lost.so that we do not have to worry about it anymore.there are also the ways how to recover disasters if this happen.

information system,development and programming languages

information system means that a set of components that interact to achieve common goal.for businesses use many types of systems.there are 5 phases of system development cycle which is planning,analysing,design,implementation and operating,support and security.to develop the system we have to follow these phases one by one in order.so that there will no problem in developing new system.

there are 2 level of programming languages which is low-level languages and procedural languages.we can identify and differentiate between them.we can also develop web page.mostly for big companies.

b0ut chapter 10

in this chapter i learn about computer security,ethics and privacy.

this chapter shows that how we can protect our computer from viruses,worms,Trojan horses,bot nets,denial of service attacks,back doors and spoofing.Spoofing means that someone can duplicate anyone else ID.this have to be stopped before they can intrude computer's privacy.so there are so many ways we can prevent this thing.

another thing we should know in this chapter is how to prevent health-related disorders when using computers.there are some types of injuries causes by due to using computers too much.so it is important for us to know too.

Friday, August 7, 2009

reach @ chapter 9,,huhu...

what is database??well it is a collection of data organized so you can access, retrieve and use it...that is what i learn in this lesson,,database management...how to use it easily.to manage it we have to know bout their database software.there are some advantages of organizing the data in a database.so that the content in it do not be mess.but to organize it we have to know the methods for maintaining the high-quality data..

of course there were a lot of type of databases we should know..they have their own role to analyze and administrate the datas...

n0w in chapter 8,,,

n0w in chapter 8...the lesson is about communications and network...how they work through the world in universal way,,there are a lots of network too we can use and learn.this lesson also told us how the computers joint with another device into a various network.

there are also various communications devices, media and procedures we can learn in this chapter.this can lead us to know and connect with more people in the world.