Jump to content

User:P858snake/Sandbox/009/IPT

From Wikipedia, the free encyclopedia

Database

[edit]

Usage

[edit]
  • Pro/Cons of DB usage
  • Different Designs/Types (eg: Access/MySql/MsSQL/Flat Files)
  • Field Types and uses
  • Query Design/Manipulation - Accessing stored data
  • Creating databases

Design

[edit]
  • Object role modeling
  • Normalization
  • Elementary Sentences
  • Constraints
  • Object-relational mapping
  • Conceptual schema diagrams

Programming

[edit]
  • PHP
  • VB.net

Software Piracy

[edit]
  • How widespread is the problem
  • How is software obtained illegally
  • What techniques software companies use to thwart illegal use
  • What techniques the illegal user adopts to thwart security measures
  • The availability of , and usefulness of, freeware or shareware

Networks

[edit]
  • Difference between styles
  • Peer to Peer
  • Server Client Models
  • Advantages/Disadvantages of networks
  • Share files/printers
  • Share internet connection
  • user authentication
  • settings of rights to restrict users
  • centralized backups
  • centralized virus checking
  • automated updates of programs
  • automated installs of programs
  • licensing monitoring
  • Signs of a virus
  • CPU usage – general slow down
  • Increase size usage
  • Files corrupted
  • Pop ups
  • Odd start up producers & processes
  • Hard drive usage
  • Preventing Viruses
  • Router or firewall
  • Antivirus program + updates
  • Avoid limewire & the like
  • Use a different os
  • Eg: apple/linux
  • User a different browser other than IE
  • Backup data
  • Keep original cds/dvds
  • Define network terms
  • Define these malware terms

General Computer

[edit]
  • Boot Sequence
  • Types of Raids (0-6)
  • Hardware Components