1) The following code will add a value of 3 to the “count” variable: True or False -> False
int count = 1;
int count2 = 3
count = count + count
2) The following statement is false about hard drives: Answer is C
a. The use spinning platters
b. The use magnetism to store values
c. They are a form of volatile storage
d. They are a slower form of storage than RAM
3) Explain how a web site such as amazon.com provides you with a list of your recent orders. What type of code is involved in this process?
Amazon.com is a web application that ties into a database back end. Your orders are stored in a database in a table likely called “Orders”. When you access the page My Orders, the web application which is written with application code such as C# and rendered through the web with technologies such as HTML sends a SQL command to its database back end to retrieve a grid of data using a SQL Select statement. The results are sent back to the application server by the database server. The web site then loops through the results and displays them on the page utilizing the formatting and images provided in the HTML. The web site is accessed using the HTTP/HTTPS protocol which allows us to access the web application code over the internet.
The essay question seems very difficult for us since it contains everything. Is it possible to provide more essay questions in advance for us to prepare.
The essay question as well as the answer is just an example. You do not necessarily need to answer it in such great detail. I am looking for you to convey that you grasp the underlying concepts behind what we have covered in this class.
1) Write a C# statement that compares what name was entered into a textbox. If the name is “John” then place the value of MIS into a variable called Major. If the name is “Pat” set the value of major to Finance.
Web Application is a unique type of IT Security since the attacks are designed to exploit flaws in the application code. SQL injection specifically takes advantage of the code that works directly with the database.
Since web applications are made available to the public, security devices such as firewalls can be bypassed since the web site would not be hidden behind a firewall like many internal servers in an organization. The fact that web sites are public facing this provides an easy to access forum for potential attacks.
Could you go over how a PC starts and how hardwares interact with each other?
From my understanding, a PC starts when:
Electricity from the wall goes into the power supply which transform the electricity into a level of voltage that wont fry the hardwares. Power is then sent to hardisk and motherboard which powers up the memory and processor. If an OS is installed properly on the hardisk, the Windows logo will show on the screen and the PC will proceed to start.
From my understanding of how hardwares interact with each other:
User inputs a command using an input device. Command is sent and stored in the memory. Memory sends the command to the processor which executes the command. The completed command is sent back to the memory. The memory sends it to an output device which displays the completed command to the user.
Is this answers complete enough or is there anything I am missing?
You answer is very good Yang Li. Overall, I think you covered what I am looking for. Just remember that it is the Control Unit withing the Processor that move instructions to/from memory. Memory itself does not move anything as it is simply a holding area for instructions to be sent to/from the processor.
Computers operate in both the physical and virtual world. The physical world is the actual hardware that runs on things like electricity and magnetism. The virtual is the actual Operating System and the software installed on the OS, which runs entirely on binary (1’s and 0’s). The operating system must bridge this gap between electricity and binary since. Therefore, when a hardware device sends a pattern of electricity the OS must convert this to binary. When an application sends a command of 1’s and 0’s to a hard drive the OS must convert the binary into electricity.
Basically, there must be a conversion between binary and electricity between all devices in a computer at all times.
Wenlin Zhou says
Could you provide some example questions for the final exam?
Patrick J. Wasson says
Hi Wenlin,
Here are some sample questions:
1) The following code will add a value of 3 to the “count” variable: True or False -> False
int count = 1;
int count2 = 3
count = count + count
2) The following statement is false about hard drives: Answer is C
a. The use spinning platters
b. The use magnetism to store values
c. They are a form of volatile storage
d. They are a slower form of storage than RAM
3) Explain how a web site such as amazon.com provides you with a list of your recent orders. What type of code is involved in this process?
Amazon.com is a web application that ties into a database back end. Your orders are stored in a database in a table likely called “Orders”. When you access the page My Orders, the web application which is written with application code such as C# and rendered through the web with technologies such as HTML sends a SQL command to its database back end to retrieve a grid of data using a SQL Select statement. The results are sent back to the application server by the database server. The web site then loops through the results and displays them on the page utilizing the formatting and images provided in the HTML. The web site is accessed using the HTTP/HTTPS protocol which allows us to access the web application code over the internet.
Fangzhou Hou says
Hi Pat,
Could you also list some sample essay questions which related the coding? And what’s the requirement of those coding questions?
Thanks.
Wenlin Zhou says
Hi Professor,
The essay question seems very difficult for us since it contains everything. Is it possible to provide more essay questions in advance for us to prepare.
Thanks.
Patrick J. Wasson says
Hi Wenlin,
The essay question as well as the answer is just an example. You do not necessarily need to answer it in such great detail. I am looking for you to convey that you grasp the underlying concepts behind what we have covered in this class.
Pat
Patrick J. Wasson says
Hi Fangzhou,
A sample question would be:
1) Write a C# statement that compares what name was entered into a textbox. If the name is “John” then place the value of MIS into a variable called Major. If the name is “Pat” set the value of major to Finance.
Coding requirements will cover:
C# Coding
• Variables, Classes, Objects
• Conditional Logic (If, Then, Else, Case)
• Loops (For, While)
You will be required to write actual C# code to address the question.
Hope this helps.
Pat
Wenlin Zhou says
What makes Web Application Security different from other types of security? Is it the firewall?
Patrick J. Wasson says
Hi Wenlin,
Web Application is a unique type of IT Security since the attacks are designed to exploit flaws in the application code. SQL injection specifically takes advantage of the code that works directly with the database.
Since web applications are made available to the public, security devices such as firewalls can be bypassed since the web site would not be hidden behind a firewall like many internal servers in an organization. The fact that web sites are public facing this provides an easy to access forum for potential attacks.
Pat
Yang Li Kang says
Hi Patrick,
Could you go over how a PC starts and how hardwares interact with each other?
From my understanding, a PC starts when:
Electricity from the wall goes into the power supply which transform the electricity into a level of voltage that wont fry the hardwares. Power is then sent to hardisk and motherboard which powers up the memory and processor. If an OS is installed properly on the hardisk, the Windows logo will show on the screen and the PC will proceed to start.
From my understanding of how hardwares interact with each other:
User inputs a command using an input device. Command is sent and stored in the memory. Memory sends the command to the processor which executes the command. The completed command is sent back to the memory. The memory sends it to an output device which displays the completed command to the user.
Is this answers complete enough or is there anything I am missing?
Patrick J. Wasson says
You answer is very good Yang Li. Overall, I think you covered what I am looking for. Just remember that it is the Control Unit withing the Processor that move instructions to/from memory. Memory itself does not move anything as it is simply a holding area for instructions to be sent to/from the processor.
Yang Li Kang says
How do OS’s bridge between virtual and physical? Be able to describe the process from end-to-end.
I don’t understand what is this referring to. Could you please explain it. Thanks
Patrick J. Wasson says
Computers operate in both the physical and virtual world. The physical world is the actual hardware that runs on things like electricity and magnetism. The virtual is the actual Operating System and the software installed on the OS, which runs entirely on binary (1’s and 0’s). The operating system must bridge this gap between electricity and binary since. Therefore, when a hardware device sends a pattern of electricity the OS must convert this to binary. When an application sends a command of 1’s and 0’s to a hard drive the OS must convert the binary into electricity.
Basically, there must be a conversion between binary and electricity between all devices in a computer at all times.