User:P858snake/Sandbox/009/IPT

Usage

 * Pro/Cons of DB usage
 * Different Designs/Types (eg: Access/MySql/MsSQL/Flat Files)
 * Field Types and uses
 * Query Design/Manipulation - Accessing stored data
 * Creating databases

Design

 * Object role modeling
 * Normalization
 * Elementary Sentences
 * Constraints
 * Object-relational mapping
 * Conceptual schema diagrams

Programming

 * PHP
 * VB.net

Software Piracy

 * How widespread is the problem
 * How is software obtained illegally
 * What techniques software companies use to thwart illegal use
 * What techniques the illegal user adopts to thwart security measures
 * The availability of, and usefulness of, freeware or shareware

Networks

 * Difference between styles
 * Peer to Peer
 * Server Client Models


 * Advantages/Disadvantages of networks
 * Share files/printers
 * Share internet connection
 * user authentication
 * settings of rights to restrict users
 * centralized backups
 * centralized virus checking
 * automated updates of programs
 * automated installs of programs
 * licensing monitoring


 * Signs of a virus
 * CPU usage – general slow down
 * Increase size usage
 * Files corrupted
 * Pop ups
 * Odd start up producers & processes
 * Hard drive usage


 * Preventing Viruses
 * Router or firewall
 * Antivirus program + updates
 * Avoid limewire & the like
 * Use a different os
 * Eg: apple/linux
 * User a different browser other than IE
 * Backup data
 * Keep original cds/dvds


 * Define network terms
 * Define these malware terms

General Computer

 * Boot Sequence
 * Types of Raids (0-6)
 * Hardware Components