+1 (951) 902-6107 info@platinumressays.com

Input Device Dialogue

The choice of an appropriate input device for a product is often based on both the type of device being used and the target market for that device. For instance, a device targeted to college students and one targeted to older individuals may use different input methods. Suppose that you are developing a device to be used primarily for Internet access that will be marketed to senior citizens. What type of hardware would you select as the primary input device? Why? What are the advantages and disadvantages of your selected input device? How could the disadvantages be minimized? What are other groups that have special technology needs? As future technology developers and innovators, do we have a responsibility to ensure technology is accessible to all groups? Incorporate Christian scripture and faith in your post and provide technical depth to all of your responses. 

Chapter 3 Storage

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Learning Objectives

• Name several general characteristics of storage systems. • Describe the three most common types of hard drives

and what they are used for today. • Discuss the various types of optical discs available today

and how they differ from each other. • Identify some flash memory storage devices and media

and explain how they are used today. • List at least three other types of storage systems. • Summarize the storage alternatives for a typical personal

computer.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2

Overview

• This chapter covers: – The characteristics common among all storage systems – The primary storage for most personal computers—the

hard drive – How optical discs work and the various types that are

available today – Flash memory storage systems – Network and cloud storage, smart cards, and the storage

systems used with large computer systems – Storage alternatives for a typical personal computer

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3

Storage System Characteristics

• A storage system consists of a storage medium and a storage device – The storage medium is the hardware where data is stored

• DVD disc, flash memory card, etc. – The storage device is the hardware into which the storage

medium is inserted • DVD drive, flash memory card reader, etc. • Can be internal, external, or remote • Storage devices are typically identified by letter

– Some storage media is removable; some is not

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4

Examples of Storage Device Identifiers

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5

Volatility and Random vs. Sequential Access

• Volatility – Storage media are nonvolatile and, therefore, is used for

data to be saved for later use • Random vs. sequential access

– Random access (direct access) allows data to be retrieved from any location on the storage medium

• Virtually all storage devices use random access – Sequential access means that retrieval of data can occur

only in the order in which it was physically stored on the storage medium; for example, a magnetic tape drive

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6

Files, Filenames, and Folders

• A file is anything stored on a storage medium, such as a program, document, digital image, or song

• A filename is a name given to a file by the user • A folder is a named place on a storage medium

into which files can be stored

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7

Logical vs. Physical Representation and Types of Storage Technologies Used

• Logical file representation – Individuals view a document stored as one complete unit

in a particular folder on a particular drive • Physical file representation

– Computers access a particular document stored on a storage medium using its physical location or locations

• Types of storage technology – Magnetic (conventional hard drives) – Optical (optical discs) – Electrons (flash memory media)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8

Hard Drives

• A hard drive stores most programs and data for a personal computer – Can be internal or external – Available with built-in encryption that limits access to only

authorized users

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9

Magnetic Hard Drives

• A magnetic hard drive or hard disk drive (HDD) contains particles on the metal disks inside the drive that are magnetized to represent the data’s 0s and 1s

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10

Magnetic Hard Drives (cont’d)

• One or more metal hard disks are permanently sealed inside the drive along with an access mechanism and read/write heads

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11

Hard Disk Organization

• Tracks are concentric paths on the disk where data is recorded

• Sectors are small pieces of a track • Clusters consist of one or more sectors

• Smallest addressable area of a disk • Cylinders are a collection of tracks located in the same

location on a set of hard disk surfaces

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12

Examples of Tracks, Sectors, Clusters, and Cylinders

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13

Magnetic Hard Drive Technologies

• Traditional: Longitudinal magnetic recording aligns magnetic particles on a hard disk horizontally, parallel to the hard disk’s surface

• Newer: Perpendicular magnetic recording (PMR) places bits upright and closer together to increase capacity and reliability

• Newest: Shingled magnetic recording (SMR) squeezes more data onto disks by overlapping the data tracks on them like the shingles on a roof

• Emerging: Heat-assisted magnetic recording (HAMR) uses lasers to temporarily heat the surface of the hard disks when storing data in order to store more data

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14

How It Works

More Storage for Your Tablet • Tablets often have between

16 GB and 128 GB of storage • To extend storage, you can

transfer content to and from desktops or notebooks

• Easier to use a wireless hard drive and Wi-Fi – Download the

appropriate app The 2 TB Seagate Wireless Plus magnetic hard drive.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15

Inside the Industry

Data Recovery Experts • Recover data from damaged storage devices • Used when devices are physically damaged or just stop

working • It is important to back up data to prevent data loss

Data recovery. The data on this destroyed computer (left) was recovered by data recovery experts in a clean room (right).

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16

Solid-State Drives (SSDs)

• A solid-state drive (SSD) uses flash memory technology to store data – Uses less power and has no

moving parts – Much faster than magnetic

hard drives, but more expensive

– The norm for netbooks, mobile devices, and other portable devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17

Solid-State Hybrid Drives (SSHDs)

• A solid-state hybrid drive (SSHD) or hybrid drive uses a combination of magnetic disks and flash memory chips – The data that is most

directly associated with performance is stored in the flash memory

– Nearly as fast as solid-state drives (SSDs)

– Slightly more expensive than magnetic hard disk drives (HDDs)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18

Internal and External Hard Drives

• Internal hard drives are permanent storage devices located inside the system unit – Removed only if a problem develops

• External hard drives transport large amounts of data from one computer to another, for backup, and for additional storage – Full-sized external hard drives are often used for backup – Portable external hard drives: smaller and easier to

transport – Most connect with a USB connection, although some may

connect through wired or wireless networking connections © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19

Examples of External Hard Drives

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20

Hard Drive Speed and Disk Caching

• Disk access time is the total time that it takes for a hard drive to read or write data • Consists of seek time, rotational delay, and data

movement time • SSDs don’t require seek time or rotational delays

• Disk cache consists of memory used in conjunction with a magnetic hard drive to improve system performance – Typically consists of RAM-based disk cache located inside

the hard drive case – Can speed up performance and save battery life

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21

Hard Drive Partitioning

• Partitioning divides the physical capacity of a single drive logically into separate areas, called partitions – Each partition functions as an independent hard drive – Referred to as logical drives – Increases efficiency (smaller drives use smaller clusters)

• Partitions are used to create: – A recovery partition – A new logical drive

for data – A dual boot system

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22

Hard Drive File Systems and Interface Standards

• File system determines the partition size, cluster size, maximum drive size, and maximum file size – FAT, FAT32, and NTFS

• Interface standards determine how a drive connects to the computer

• Common standards – Serial ATA (SATA): most common internal hard drive

interface standard – Serial attached SCSI (SAS) – Fibre Channel – Internet SCSI (iSCSI)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23

Quick Quiz (1)

1. Of the following three options, the storage media that would likely hold the most data is a(n) __________. a. HDD b. USB flash drive c. SSD

2. True or False: SSDs are subject to mechanical failures just like magnetic hard drives.

3. The circular rings on a magnetic disk on which data is stored are called __________.

Answers: 1) a; 2) False; 3) tracks Understanding Computers: Today and Tomorrow, 15th Edition 24

Optical Discs

• Optical discs are thin circular plastic discs – Are read from and written to using laser beams – Are commonly used for software delivery – Divided into sectors like magnetic discs but use a single

spiral track (groove) – Have a relatively large capacity and are durable – Used for backup purposes and for storing and transporting

music, photos, video, etc.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25

Representing Data on an Optical Disc

• Pits and lands are used to represent 1s and 0s • The transition between a pit and a land represents a 1;

no transition represents a 0 • Read-only optical disc

– Surface of disc is molded or stamped to represent data • Recordable or rewritable disc

– The reflectivity of the disc is changed using a laser beam to represent the data

– Different types of optical discs use different types of laser beams

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26

How Recorded Optical Discs Work

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27

Optical Drives

• Optical discs are read by optical drives – The optical drive must support the type

of optical disc being used – Almost always backward-compatible – Recording data onto a optical disc is

called burning; requires burning software – Optical drives can be internal or external

• External drives typically connect via USB port

• External drives can be used with netbooks and other devices without an optical drive

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28

Optical Disc Shapes, Sizes, and Capacities

• Standard size is 120-mm (about 4.7 inches) – Mini discs are smaller (about 3 inches)

• Theoretically can be made into various shapes, but patent battle has resulted in custom shapes not being available

• Clear background is sometimes used to make a disc look custom shaped

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29

Advantage of Optical Discs

• Major advantage: Large capacity – CD discs are normally single layer and hold 700 MB – DVD discs hold 4.7 GB (single-layer) or 8.5 GB (dual-layer) – BD discs hold 25 GB (single-layer) or 50 GB (dual-layer) – BDXL standard uses even more layers to boost capacity up

to 128 GB – Newest BD discs are Ultra HD Blu-ray discs that hold up to

100 GB and are designed to deliver Ultra HD (4K) movies – Discs can also be double-sided

• Read on one side at a time; must be turned over to access the second side

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30

Summary of Optical Discs

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31

Read-Only Optical Discs: CD-ROM, DVD-ROM, and BD-ROM Discs

• CD-ROM, DVD-ROM, and BD-ROM discs can be written to, but not erased and reused – Pits are permanent – CD-ROM and DVD-ROM discs come prerecorded with

software, music, movies, etc. – BD-ROM discs come prerecorded with movies

• Ultra HD Blu-ray discs can be used for 4K movies – Additional proprietary read-only discs

• Gaming systems like Wii, Xbox, PlayStation, etc.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32

Recordable Optical Discs: CD-R, DVD-R, DVD+R, and BD-R Discs

• CD-R, DVD-R, DVD+R, and BD-R discs can be written to, but cannot be erased and reused – Pits are created in the disc when the disc is recorded – Most discs have a recording layer containing organic light-

sensitive dye between disc’s plastic and reflective layers • BD-R discs use inorganic material instead

– DVD-R DL and DVD+R DL are dual-layer discs – BD-R DL discs are dual-layer discs; BD-R XL use 3 or 4 layers – Used for backing up files, sending large files to others, and

storing multimedia files

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33

Rewritable Optical Discs: CD-RW, DVD- RW, DVD+RW, and BD-RE Discs

• CD-RW, DVD-RW, DVD+RW, and BD-RE discs can be written to, erased, and overwritten just like magnetic hard disks – Uses phase change technology

• Heating and cooling process is used to change the reflectivity of the disc

– The capacities are the same as their read-only and recordable counterparts

– Appropriate for transferring large files from one computer to another or otherwise temporarily storing data (disc can be reused)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 34

Trend

Ultra HD (4K) • Is the next big step in high-definition

(HD) TVs and content • Four times the resolution of ordinary HD • Requires four times as much data as

regular HD video • Many Internet connections are not fast

enough to support the large amounts of data required for 4K quality

• Available for those individuals who have the speed and bandwidth to support it; also available on Ultra HD discs

An example of a 4K movie.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 35

Quick Quiz (2)

1. The capacity of the standard DVD disc is _____. a. 50 GB b. 650 MB c. 4.7 GB

2. True or False: A DVD-RW disc can be written to and rewritten to.

3. The tiny depressions, dark areas, or otherwise altered spots on an optical disc that are used to represent data are called __________.

Answers: 1) c; 2) True; 3) pits

Understanding Computers: Today and Tomorrow, 15th Edition 36

Flash Memory Storage Systems

• Flash memory is a chip-based storage medium that represents data using electrons – Used in a variety of storage systems

• Embedded flash memory refers to flash memory chips embedded into products – Smartphones, tablets, smart watches, and even sunglasses

and wristwatches – Usually the primary storage for mobile devices such as

tablets and smartphones

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 37

Examples of Embedded Flash Memory

38© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

This tablet contains 64 GB of embedded flash memory.

An embedded flash memory chip.

Flash Memory Cards and Readers

• A flash memory card is a small card containing one or more flash memory chips, a controller chip, and metal contacts to connect the card to the device or reader being used – Available in a variety of formats; these formats are not

interchangeable – Secure Digital (SD) is one of the most widely used types of flash

memory media – Most common type of storage media for digital cameras,

smartphones, and other portable devices • Many devices today have a built-in flash memory card reader;

an external reader via USB port is also used • Adapters allow the use of smaller flash memory cards in a

larger slot of the same type (microSD to SD, etc.)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 39

Examples of Flash Memory Cards, Readers, and Adapters

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 40

Flash Memory Cards

• General-purpose flash memory card – Appropriate for most

applications • Specialized flash memory cards

– Professional flash memory cards

– Gaming flash memory cards – Encrypted flash memory cards

• Project Vault is a computer on a flash memory card

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41

USB Flash Drives

• USB flash drives (USB drives or flash drives) consist of flash memory media integrated into a self-contained unit that plugs into and is powered by a USB port – Designed to be very small and very portable – Available in a host of formats

• Low-profile drives, custom shapes, micro drives, etc. – Can be built into a consumer product – Additional related hardware becoming available

• USB duplicator systems

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 42

Examples of USB Flash Drives

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43

Technology and You

Tiny PCs • The size of a USB flash drive • Typically connect to a TV via an

HDMI port • May also have built-in storage and

a microSD • Capabilities vary; smart TVs can

display and stream Internet content

• The newest tiny PCs are fully functioning “computers-on-a- stick”

Intel Compute Stick

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44

Quick Quiz (3)

1. Flash memory cards are available today in capacities up to _____. a. 64 GB b. 512 MB c. 1 TB

2. True or False: Flash memory is the primary storage for mobile devices such as tablets and smartphones.

3. The most common type of flash memory card today is the __________ card.

Answers: 1) c; 2) True; 3) SD Understanding Computers: Today and Tomorrow, 15th Edition 45

Other Types of Storage Systems

• Remote storage refers to using a storage device that is not connected directly to the user’s computer

• Network storage: Using a storage device via a local network – Works in much the same way as using local storage – Network attached storage (NAS) devices are high

performance storage systems connected individually to a network

– A storage area network (SAN) consist of separate network of hard drives or other storage devices that are attached to the main network

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 46

Examples of Network Storage

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 47

Cloud Storage

• Cloud storage (online storage) is accessed via the Internet – Cloud applications (Flickr, Facebook, Google Docs, etc.) – Online storage sites (Box, Dropbox, OneDrive, etc.) – Growing in importance because more and more

applications are Web-based – Increasingly used for backup purposes – Files can be synched between PC and cloud storage – Many online storage sites offer some free storage – Business cloud storage is available; businesses can also

create private clouds © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 48

Example of Cloud Storage

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 49

Smart Cards

• A smart card is a credit card-sized piece of plastic that contains some computer circuitry (processor, memory, and storage) – Stores a small amount of data (about 64 KB or less) – Commonly used to store prepaid amounts of digital cash or

personal information – Smart card readers are built into or attached to a

computer, door lock, vending machine, or other device – Some smart cards store biometric data – Use of mobile smart cards is an emerging trend

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 50

Examples of Uses for Smart Cards

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 51

Storage Systems for Large Computer Systems

• Business storage needs are growing exponentially – Digital data produced is expected to double every two

years through 2020 • A storage server contains multiple high-speed hard drives

– Larger than typical NASs – Usually contain drawers of hard drives – Typically use fast Fibre Channel or iSCSI connections – Scalable so that more hard drives can be added as needed – Can use magnetic and/or SSD drives

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 52

Example of a Large Storage Systems

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 53

RAID

• RAID (redundant arrays of independent discs) is a method of storing data on two or more hard drives that work together to record redundant copies – Used to protect critical data on large storage systems – Helps to increase fault tolerance – Different levels of RAID:

• RAID 0 = disk striping (spread files over two or more hard drives)

• RAID 1 = disk mirroring (duplicate copy) • Other levels use a combination or striping and mirror

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 54

Two Primary RAID Techniques

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 55

Newer RAID Systems

• New storage systems are easier to set up and maintain so dedicated RAID personnel are not needed – For example, the Drobo system:

• Connects to a computer or a network via a USB cable • Contains drive bays into which hard drives can be

inserted • Has capacity and status indicators – drives can be

inserted and removed as needed

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 56

Archival Storage Systems

• Data archiving is the process of identifying and moving data that is no longer actively being used from regular storage systems to a separate long-term archival storage system

• Options for data archival systems: – Large hard drives, such as a helium hard drive (10 TB) – Magnetic tape

• Typically cartridge tapes; can be tape libraries – Higher capacity, archival Blu-ray Discs that are becoming

available; so are optical jukeboxes – Cloud storage

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 57

Examples of Data Archiving Options

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 58

Evaluating Your Storage Alternatives

• Product characteristics to consider: – Speed, compatibility, storage capacity, convenience, and

portability • Each storage alternative normally involves trade-offs • Research which devices and media are most appropriate

to your personal devices • All computers need at least one convenient USB port • Mobile device users

– Fewer options for storage alternatives – Require appropriate wireless connectivity

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 59

Quick Quiz (4)

1. An online photo sharing site is an example of __________. a. RAID b. cloud storage c. holographic storage

2. True or False: Smart cards today typically hold at least 1.44 MB of data.

3. A type of sequential storage that is sometimes used today for business data archiving and in some backup systems because of its low cost per terabyte is __________.

Answers: 1) b; 2) False; 3) magnetic tape Understanding Computers: Today and Tomorrow, 15th Edition 60

Summary

• Storage Systems Characteristics • Hard drives • Optical Discs And Drives • Flash Memory Storage Systems • Other Types of Storage Systems • Evaluating Your Storage Alternatives

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 61

  • Chapter 3�Storage
  • Learning Objectives
  • Overview
  • Storage System Characteristics
  • Examples of Storage Device Identifiers
  • Volatility and Random vs. Sequential Access
  • Files, Filenames, and Folders
  • Logical vs. Physical Representation and Types of Storage Technologies Used
  • Hard Drives
  • Magnetic Hard Drives
  • Magnetic Hard Drives (cont’d)
  • Hard Disk Organization
  • Examples of Tracks, Sectors, Clusters, and Cylinders
  • Magnetic Hard Drive Technologies
  • How It Works
  • Inside the Industry
  • Solid-State Drives (SSDs)
  • Solid-State Hybrid Drives (SSHDs)
  • Internal and External Hard Drives
  • Examples of External Hard Drives
  • Hard Drive Speed and Disk Caching
  • Hard Drive Partitioning
  • Hard Drive File Systems and Interface Standards
  • Quick Quiz (1)
  • Optical Discs
  • Representing Data on an Optical Disc
  • How Recorded Optical Discs Work
  • Optical Drives
  • Optical Disc Shapes, Sizes, and Capacities
  • Advantage of Optical Discs
  • Summary of Optical Discs
  • Read-Only Optical Discs: CD-ROM, DVD-ROM, and BD-ROM Discs
  • Recordable Optical Discs: CD-R, DVD-R, DVD+R, and BD-R Discs
  • Rewritable Optical Discs: CD-RW, DVD-RW, DVD+RW, and BD-RE Discs
  • Trend
  • Quick Quiz (2)
  • Flash Memory Storage Systems
  • Examples of Embedded Flash Memory
  • Flash Memory Cards and Readers
  • Examples of Flash Memory Cards, Readers, and Adapters
  • Flash Memory Cards
  • USB Flash Drives
  • Examples of USB Flash Drives
  • Technology and You
  • Quick Quiz (3)
  • Other Types of Storage Systems
  • Examples of Network Storage
  • Cloud Storage
  • Example of Cloud Storage
  • Smart Cards
  • Examples of Uses for Smart Cards
  • Storage Systems for Large Computer Systems
  • Example of a Large Storage Systems
  • RAID
  • Two Primary RAID Techniques
  • Newer RAID Systems
  • Archival Storage Systems
  • Examples of Data Archiving Options
  • Evaluating Your Storage Alternatives
  • Quick Quiz (4)
  • Summary

,

Chapter 4 Input and Output

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.

Learning Objectives (1)

• Explain the purpose of a computer keyboard and the types of keyboards widely used today.

• List several different pointing devices and describe their functions.

• Describe the purposes of scanners and readers and list some types of scanners and readers in use today.

• Explain what digital cameras are and how they are used today.

• Understand the devices that can be used for audio input.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 2

Learning Objectives (2)

• Describe the characteristics of a display device and explain some of the technologies used to display images.

• List several types of printers and explain their functions. • Identify the hardware devices typically used for audio

output.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3

Overview

• This chapter covers: – The most common input devices – Hardware designed for capturing data in electronic form – Audio input – Types of display devices and how they work – Types of printers and how they work – Audio output devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4

Keyboards

• A keyboard is an input device used to enter characters at the location marked by the insertion point or cursor – Can be built-in, wired, or wireless – Typically contains:

• Standard alphanumeric keys • Numeric keypad • Function keys • Delete and Backspace keys • Ctrl and Alt keys • Arrow keys • Special-purpose keys

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5

A Typical Desktop Keyboard

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6

Keyboards for Mobile Devices

• Mobile devices often use: – Slide-out keyboard – Pen or touch input (on-screen keyboard)

• Can use an external keyboard (stand-alone or built into a case)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7

Pointing Devices

• Pointing devices are used to: – Select and manipulate objects – Input data – Issue commands to the computer

• Common types of pointing devices: – Mouse – Pen/stylus – Devices that use touch input

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8

Mice

• A mouse is a common pointing device that the user slides to move a pointer around the screen and clicks to make selections – Older mechanical mice use a ball – Optical or laser mice track with light – Touch mice support two-dimensional gestures – Used to start programs; open, move around, and edit

documents; draw or edit images; and more – Can be used with a variety of devices – Typically connect via a USB port or a wireless connection

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9

Common Mice and Mouse Operations

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10

Pens/Styluses

• A stylus is a pen-like device used to draw or write electronically on the screen – Also called digital pen, electronic pen, or pen – Pen input is being used for:

• Photography, graphic design, animation • Industrial design, document processing, and healthcare

applications • Navigating through a document • Issuing commands • Handwritten input and drawings

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11

Pen-Based Computers and Mobile Devices

• Pen input is often used with mobile devices and tablets • Can be used with desktop and portable computers if the

display screen supports it

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12

Digital Forms

• With handwriting recognition, written text can be converted to editable typed text

• The use of digital forms is increasingly

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13

Trend

Perceptual Computing • Users control devices with

3D gestures, voice commands, and facial expressions

• Noncontact system • Allows for full body input

and input from a slight distance away or through a glass window The Leap 3D System

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14

Other Uses for Digital Pens

• Digital writing systems are pen-based systems that capture handwritten input as it is being written – Requires special paper with a grid of dots – Transfers handwritten input to computer

• Graphics tablets are flat, touch sensitive tablets typically connected to computer using a USB port – Also called pen tablets or digitizing devices

• Signature capture devices are used to record signatures for credit card purchases, deliveries, etc.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15

Examples of Digital Pens in Use

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16

Touch Screens

• Touch screens are display devices that are touched with the finger to select commands or otherwise provide input to the computer – Common on portable computers, smartphones, and other

mobile devices – Multi-touch screens can recognize input from more than

one finger at a time – Some support both touch and pen input – Surface Hub (large multi-touch wall-mounted display) – Table PC (large computer either built into a table or

designed to be used on a table)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17

Examples of Touch Screens

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18

Other Pointing Devices

• Gaming devices • Trackballs • Control buttons and

wheels • Touch pads

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19

How It Works

Augmented Reality • Overlays computer generated

images on top of real-time images

• Today, most often with smartphones using camera input, location info, and other data

• Displays appropriate information related to images captured by the smartphone

A smartphone AR app pointing at a business district.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20

Quick Quiz (1)

1. Touch mice __________. a. support finger swipes and gestures b. navigate by a process called inking c. contain a scroll wheel on the top

2. True or False: With handwriting recognition, handwritten text can be converted to editable text.

3. On-screen forms that can convert handwritten text into editable typed text are called __________.

Answers: 1) a; 2) True; 3) digital forms © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21

Scanners, Readers, and Digital Cameras

• Some devices capture data initially in digital form • Others capture data from source documents

– Already exist in physical form (photographs, checks, invoices, or product labels)

– Source data automation • Saves time • Increases accuracy • Utilizes scanning or

reading devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22

Scanners

• A scanner (optical scanner) is an input device that captures an image of an object in digital form – Data is typically input as a single image – Can scan photos, documents, images, etc. – Types of scanners

• Flatbed scanners (scan flat objects one page at a time) • Portable scanners (scan objects while on the go) • 3D scanners (scan objects in 3D) • There are also task-specific scanners, such as receipt

and business card scanners

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23

Examples of Scanners

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24

Scanning Quality and Resolution

• Quality of scanned images indicated by optical resolution – Measured in number of dots per

inch (dpi) – Can often be specified when

image is scanned – Can be changed when scanned

image is edited • Higher resolution means better

quality but larger file size

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25

Barcodes and Barcode Readers

• Barcodes are machine-readable optical codes that represent data as a set of bars

• Barcode readers are input devices that read barcodes • Types of barcodes

– Read by traditional barcode reader • Universal Product Code (UPC) • ISBN • Code 39

– Read by mobile apps • QR Codes (two-dimensional; hold much more data) • Digital watermarks (icons)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26

Examples of Barcodes and Digital Watermark Icons

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27

Examples of Barcode Readers

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28

Radio Frequency ID (RFID)

• Radio Frequency Identification (RFID) is a technology that stores, reads, and transmits data located in RFID tags

• RFID tags contain tiny chips and radio antennas – Can be attached to objects – Read by RFID readers

• Handheld, portal, and stationary – Tags only need to be within range of

the reader, rather than in line of sight • Used for a variety of applications

– Tracking inventory and assets – Electronic toll collection – Tracking patients in hospitals – Ticketing applications – IDs (driver licenses, U.S. passports, etc.)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29

Near Field Communications (NFC)

• Near Field Communications (NFC) is a short-range wireless communication standard based on RFID – Used to transfer information between smartphones or

between a smartphone and an NFC-enable reader – Used for contactless mobile payments

• Credit card or smartphone containing the NFC technology needs to be within an inch or so of the NFC- enabled payment terminal

– More appropriate than conventional RFID for mobile payments

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30

Examples of RFID and NFC Applications

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31

Optical Mark Readers (OMR) and Optical Character Recognition (OCR)

• Optical mark readers (OMRs) input data from optical forms to score or tally exams, questionnaires, ballots

• Optical character recognition (OCR) recognizes text characters and converts them to electronic form as text, not images – Identifies each character and convert it to editable text – Used to process turnaround documents like monthly

bills – Read by OCR devices – Optical characters are designed to be read by OCR devices

but can still be read by humans

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32

OMR Readers and Optical Characters

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33

Magnetic Ink Character Recognition (MICR ) Readers

• Magnetic ink character recognition (MICR) is used primarily for banking to facilitate check processing – MICR readers (check scanners)

read the MICR characters printed at the bottom of checks

– Used by banks – Used by businesses to remotely

deposit checks – Individuals typically use ATMs or

mobile deposit instead

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 34

Technology and You

Mobile Payments and Digital Wallets • Digital wallets, like Apple Pay and

Google Wallet, store payment information to pay for purchases

• Mobile digital wallets are stored on mobile devices – Typically use NFC – Competing NFC readers

• Mobile payments can also be made via mobile credit card readers, mobile banking apps, or mobile payment apps (Square Cash or PayPal)

An NFC-enabled payment terminal.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 35

Biometric Readers

• Biometric readers are used to input biometric data such as an individual’s fingerprint or voice – Can be stand-alone

readers or built into another piece of hardware

– Most often used for access control, to authorize electronic payments, and to log on to secure Web sites

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 36

Digital Cameras

• Digital cameras take pictures and records them as digital images – Can be still cameras and/or video cameras – Integrated into portable computers, smartphones, and

tablets • Digital still cameras

– Primary appeal is that images are immediately available – Camera quality is measured in megapixels – Typically use flash memory for storage – Slight delay when taking photos

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 37

Examples of Digital Still Cameras

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 38

Digital Video Cameras

• Digital video cameras – Digital camcorders, PC video cameras (PC cams, webcams) – Built-in and stand-alone cameras – Store images on digital media (flash memory, DVDs, hard

drives, etc.) • Applications

– Live video feeds and recorded video

– Surveillance – Video conferences,

phone calls, and Webinars

– Face recognition systems

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 39

Audio Input

• Audio input – The process of entering audio data into the computer

• Voice input – Inputting spoken words and converting them to digital

form via microphone or headset – Used in conjunction with sound recorder software – Speech recognition systems enable the device being used

to recognize voice input as spoken words • Can be used for dictation as well to as to issue

commands to the device – Usually incorporated into smartphones, GPS systems, and

other mobile devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 40

Example of a Speech Recognition System

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41

Music Input Systems

• Music input systems input music into a computer or other device – Existing music can be input

using CDs or a Web download – For original compositions,

microphones, keyboard controllers, and guitar controllers can be used to input music

– Inputted music can be edited, saved, played, etc.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 42

Quick Quiz (2)

1. Which technology is used primarily by the banking industry to facilitate check processing? a. OCR b. MICR c. OMR

2. True or False: One disadvantage of digital cameras is the slight delay between when the user presses the button and when the camera takes the photo.

3. A voice input system typically requires software and a(n) __________ in order to input voice data or commands into a computer.

Answers: 1) b; 2) True; 3) microphone © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43

Display Devices

• Display devices present output visually on some type of screen – Monitors are display devices typically used with a desktop

computer – Display screens are built into a variety of devices

• Notebook and other portable computers • Smartphones and mobile devices • Handheld gaming devices, home entertainment

devices, kitchen appliances • Digital photo frames, e-book readers, smart watches • Digital signage systems, digital billboards

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44

Examples of Display Devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 45

Display Device Characteristics

• Color vs. monochrome displays – Images are formed using pixels – Most displays today are color displays

• CRT vs. flat-panel displays – Cathode ray tube (CRT) displays: large, bulky, and heavy – Flat-panel displays: take up less desk space; use less power

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 46

Size, Aspect Ratio, and Screen Resolution

• Size and aspect ratio – Device size measured diagonally from corner to corner – Wide variety of sizes available – Most are wide-screen displays (16:9 aspect ratio)

• Screen resolution – The number of pixels used on a display determines its

resolution – Affects the amount of information that can be displayed

on the screen at one time – Can be changed to match users’ preference

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 47

Video Adapters, Interfaces, and Ports

• Video cards determine the graphic capabilities of a computer

• VGA, DVI, and HDMI are the three most common interfaces to connect monitors to a computer

• Ports exposed in the system unit cases connect monitors to computers – Newer option is to use USB

ports

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 48

Example of a Video Card

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 49

Wired, Wireless, and High-Definition Displays

• Wired vs. wireless displays – Wired display are physically connected to the system via a

cable – Wireless displays connect using a wireless network

connection (Wi-Fi, Bluetooth) • High-definition displays

– Most common HD format is 1080p – Ultra HD (4K) uses about four times as many pixels as

1080p displays

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 50

Wireless Displays

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 51

Wearable and Touch Displays

• Wearable displays project images from a mobile device to a display screen – Smart glasses

• Touch and gesture capabilities – Kiosks – Portable gaming devices – Smartphones – Tablets

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 52

Flat Panel Display Technologies

• Liquid crystal displays (LCDs) use charged liquid crystals between sheets of glass or plastic – Requires backlighting

• Light emitting diode (LED) displays use LCD panels and LED backlighting

• Organic light emitting diode (OLED) displays use layers of organic material – Emit visible light so do not require backlighting – More energy efficient – Are thinner and have a wider viewing angle – Incorporated into many digital cameras, smartphones, TVs, and

other consumer devices

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 53

Organic Light Emitting Diode (OLED) Displays

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 54

Other Types of OLEDs

• FOLED (Flexible OLED) – OLED displays built on flexible surfaces such as plastic or

metallic foil • TOLED (Transparent OLED)

– Displays are transparent – Emit light toward top and bottom of display surface

• PHOLED (Phosphorescent OLED) – Process that results in much more conversion of electrical

energy into light instead of heat

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 55

Examples of Special Types of OLEDs

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 56

Inside the Industry

Wearable Holographic Displays • Project images on top of

what the person wearing the display is already seeing

• Microsoft HoloLens – Essentially a head-

mounted computer – Does not need to

connect to a smartphone or computer to function

Microsoft HoloLens

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 57

Electronic Paper (E-Paper) Displays

• Electronic paper (e-paper) displays use electronic ink (e-ink) – Used for e-readers and other

devices – Easier to read in direct sunlight – Content can change

wireless – Only uses power to

change images, not maintain an image

– Can be monochrome or color

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 58

Other Types of Flat Panel Displays

• Interferometric Modulator (IMOD) displays – Essentially a complex mirror

that uses external light to display images

– Designed initially for mobile phones and portable devices

– Images are bright and clear, even in sunlight

• Plasma displays use layers of gas between two plates of glass – Being replaced by LCDs

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 59

Data and Multimedia Projectors

• Data projectors (multimedia projectors) display output from a computer to a wall or projection screen – Found in classrooms and conference rooms – Can be wireless or integrated into devices – Some contain an iPod dock

• Pico projectors are pocket-size and connect to mobile and portable devices

• Keyboard projectors project virtual keyboards • 3D projectors can project images used with 3D glasses or

holograms

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 60

Examples of Data Projectors

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 61

Printers

• Printers produce hard copy – Impact printers (dot-matrix)

• Print mechanism strikes an inked ribbon to transfer ink to the paper

• Used to produce multipart forms – Non-impact printers (ink-jet/laser)

• Use liquid ink or toner • Produce higher quality images • Much quieter than impact printers

– Can be color or black-and-white printers

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 62

Examples of Dot-Matrix and Color Printers

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 63

Printer Characteristics

• Print resolution – Measured in dpi (dots per inch) or images per minute (IPM) – More dots per inch results in higher quality output – 300 dpi for general purpose printing; 1,200 dpi for

photographs; 2,400 dpi for professional applications • Print speed

– Measured in pages per minute (PPM) – Range from about 15 to 65 ppm

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 64

Printer Capabilities

• Personal vs. network printers – Personal printers connect directly to a single computer – Network printers connect directly to a home or an office

network; some can perform cloud printing • Connection options

– USB connection, wired network, Wi-Fi, Internet

• Multifunction devices (MFDs) or all-in-ones – Copy, fax, scan, print

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 65

Cloud Printing

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 66

Laser Printers

• Laser printers use toner powder and technology similar to that of a photocopier to produce images on paper

• The standard for business documents – Print one entire page at a time – Generally faster and have better quality output than ink-jet

printers • Use toner cartridges; toner is transferred to the paper

and fused with heat • Color printers use four toner cartridges

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 67

How Color Laser Printers Work

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 68

Ink-Jet Printers

• Ink-jet printers spray droplets of ink to produce images on paper – Use ink cartridges – Usually print in color – Often the choice for home use – Relatively inexpensive with good-quality output – Print more slowly than laser printers – Potential applications for the future

• Dispensing liquid metal, computer chips, “printing” human tissue, silk and protein ink, etc.

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 69

How Ink-Jet Printers Work

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 70

Special Purpose Printers

• Barcode printers (print a variety of barcodes)

• RFID printers (encode RFID tabs)

• Label printers (print labels and/or postage)

• Photo printers • Portable printers (used

while on the go or by service professionals)

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 71

Integrated and Large-Format Ink-Jet Printers

• Integrated printers (built into a smartphone, digital camera, etc.)

• Large-format ink-jet printers (print posters, maps, signs, blueprints, etc.) – Sometimes called

plotters – Print up to about 120

inches in width – Some print on fabric

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 72

3D Printers

• 3D printers form output in layers to build a 3D version of the desired output – Can print using plastic, metal,

ceramic, wood, glass, sugar, etc. – Additive manufacturing – Print customized objects on demand

• Personal products • Medical products • Prototypes or custom parts • Can contain moving parts

– Issues such as 3D-printed weapons © 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 73

Audio Output

• Audio output includes voice, music, and other audible sounds – Common audio output devices

• Computer speakers • Headphones, headsets, and earbuds

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 74

Quick Quiz (3)

1. Which display devices takes up the largest amount of room on a desk? a. CRT monitor b. OLED display c. LCD display

2. True or False: Laser printers can only print in black and white. 3. 3D printers typically form output in layers with a process

known as __________ manufacturing.

Answers: 1) a; 2) False; 3) additive

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 75

Summary

• Keyboards • Pointing and Touch Devices • Scanners, Readers, and Digital Cameras • Audio Input • Display Devices • Printers • Audio Output

© 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. 76

  • Chapter 4�Input and Output
  • Learning Objectives (1)
  • Learning Objectives (2)
  • Overview
  • Keyboards
  • A Typical Desktop Keyboard
  • Keyboards for Mobile Devices
  • Pointing Devices
  • Mice
  • Common Mice and Mouse Operations
  • Pens/Styluses
  • Pen-Based Computers and Mobile Devices
  • Digital Forms
  • Trend
  • Other Uses for Digital Pens
  • Examples of Digital Pens in Use
  • Touch Screens
  • Examples of Touch Screens
  • Other Pointing Devices
  • How It Works
  • Quick Quiz (1)
  • Scanners, Readers, and Digital Cameras
  • Scanners
  • Examples of Scanners
  • Scanning Quality and Resolution
  • Barcodes and Barcode Readers
  • Examples of Barcodes and Digital Watermark Icons
  • Examples of Barcode Readers
  • Radio Frequency ID (RFID)
  • Near Field Communications (NFC)
  • Examples of RFID and NFC Applications
  • Optical Mark Readers (OMR) and Optical Character Recognition (OCR)
  • OMR Readers and Optical Characters
  • Magnetic Ink Character Recognition (MICR ) Readers
  • Technology and You
  • Biometric Readers
  • Digital Cameras
  • Examples of Digital Still Cameras
  • Digital Video Cameras
  • Audio Input
  • Example of a Speech Recognition System
  • Music Input Systems
  • Quick Quiz (2)
  • Display Devices
  • Examples of Display Devices
  • Display Device Characteristics
  • Size, Aspect Ratio, and Screen Resolution
  • Video Adapters, Interfaces, and Ports
  • Example of a Video Card
  • Wired, Wireless, and High-Definition Displays
  • Wireless Displays
  • Wearable and Touch Displays
  • Flat Panel Display Technologies
  • Organic Light Emitting Diode (OLED) Displays
  • Other Types of OLEDs
  • Examples of Special Types of OLEDs
  • Inside the Industry
  • Electronic Paper (E-Paper) Displays
  • Other Types of Flat Panel Displays
  • Data and Multimedia Projectors
  • Examples of Data Projectors
  • Printers
  • Examples of Dot-Matrix and Color Printers
  • Printer Characteristics
  • Printer Capabilities
  • Cloud Printing
  • Laser Printers
  • How Color Laser Printers Work
  • Ink-Jet Printers
  • How Ink-Jet Printers Work
  • Special Purpose Printers
  • Integrated and Large-Format Ink-Jet Printers
  • 3D Printers
  • Audio Output
  • Quick Quiz (3)
  • Summary

week 16

Week 16 Assignment

Complete the following assignment in one MS Word document:
Chapter 14–discussion questions #1, #3, #4 & exercise 2
APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
All work is due by Wednesday this week!

    Cyber and Digital Forensics

    Selecting a Topic

    • Choose a topic of interest below, or select one relevant to Cyber and Digital Forensics. Submit your topic as the Week 1 research paper submission. Your instructor may make recommendations on the appropriateness/breadth of your submission. The idea for a research topic may come from your curiosity, coursework, interactions with colleagues, faculty members, and general observation. All topics must be related to the contents of this course.
    • Explore the idea; examine its significance and feasibility. Conduct preliminary research on the idea. Review the relevant literature. Examine the gap areas in research and identify issues you want to address.
    • Prepare a rough outline of the research proposal you would like to submit. Discuss the topic, draft a proposal with your instructor, exchange ideas, and incorporate suggestions.
    • Conduct further research on the topic.
    • Make a detailed proposal.
    • In the project proposal, you should:
    1. Introduce the topic
    2. Explain your rationale for selecting the project
    3. Describe the significance of the project
    4. State the objective of the project and project outline
    5. Describe the methodology to be adopted
    6. State the timeline for the project completion

    Alternative Topics (but not limited to):

    1. Analyze different phases of forensic investigation and recommend a strategy to use digital forensics for assessing the vulnerability of various components of an information system.
    2. Compare and contrast different forensics techniques and analyze the legal implications of those techniques.
    3. Compare and contrast various techniques of recovering data on different operations systems.

    Include references in APA format.

    https://www.volersystems.com/design-tips/122-data-acquisition-basics/%22

    https://www.youtube.com/watch?v=PxrlD3MEJQE

     https://www.youtube.com/watch?v=PxrlD3MEJQE 

      Module 02 Course Project – Audit Template

       This is the perfect opportunity to review current standards and findings around our selected questions. The goal here is to create awareness. The sections where you may not have full disclosure give your best interpretation. This exercise is meant for you to be more aware of what is happening within your organizations and the potential risks and gaps you may find. You may use your current employer if this information is available or if the information is not available or if you are not employed in the IT area you will need to extend your research using outside sources such as the Rasmussen Library or the internet. You may choose a company you might want to work for and answer the audit questions based on your findings. Documentation should be submitted in APA format. 

      Week 2 Audit Template

      Information Security Management Audit

      Auditor Name: Audit Date:

      Security Policy

      Section

      Audit Question

      Findings

      Compliance Y/N

      Information Security Policy document

      A policy that states management commitment and sets out the organizational approach to managing information security

      Does there exists an Information security policy, which is approved by the management, published and communicated as appropriate to all employees?

      Review of Informational Security Policy

      Whether the information Security policy has an owner, has approved management responsibility for development, review and evaluation of the security policy.

      Whether the information security policy is reviewed at planned intervals, or if significant changes occur to ensure it continuing suitability, adequacy and effectiveness.

      Management commitment to information security

      Whether management demonstrates active support for security measures within the organization. This can be done via clear direction, demonstrated commitment, explicit assignment and acknowledgement of information security responsibilities.

      Information security coordination

      Whether information security activities are coordinated by representatives from diverse parts of the organization, with pertinent roles and responsibilities.

      Allocation of information security responsibilities

      Whether responsibilities for the protection of individual assets, and for carrying out specific security processes, were clearly identified and defined.

      Confidentiality agreements

      Whether the organization’s need for Confidentiality or Non-Disclosure Agreement (NDA) for protection of information is clearly defined and regularly reviewed.

      Does this address the requirement to protect the confidential information using legal enforceable terms?

      Contact with authorities

      Whether there exists a procedure that describes when, and by whom: relevant authorities such as Law enforcement, fire department etc., should be contacted, and how the incident should be reported.

      Independent review of information security

      Whether the organization’s approach to managing information security, and its implementation, is reviewed independently at planned intervals, or when major changes to security implementation occur.

      Addressing Security when dealing with customers

      Whether all identified security requirements are fulfilled before granting customer access to the organization’s information or assets.

      Inventory of assets

      Whether all assets are identified and an inventory or register is maintained with all the important assets.

      Acceptable use of assets

      Whether regulations for acceptable use of information and assets associated with an information processing facility were identified, documented and implemented.

      Roles and responsibilities

      Whether employee security roles and responsibilities, contractors and third-party users were defined and documented in accordance with the organization’s information security policy.

      Were the roles and responsibilities defined and clearly communicated to job candidates during the pre-employment process?

      Information security awareness, education and training

      Whether all employees in the organization, and where relevant, contractors and third-party users, receive appropriate security awareness training and regular updates in organizational policies and procedures as it pertains to their job function.

      Disciplinary process

      Whether there is a formal disciplinary process for the employees who have committed a security breach.

      Termination responsibilities

      Whether responsibilities for performing employment termination, or change of employment, are clearly defined and assigned.

      2

      Module 02 Course Project – Change Management Template and Change Request Form Module 02 Course Project – Change Management Template and Change Request Form

       

      You may use outside sources to complete these documents. If you source something elsewhere, follow the integrity of the language, but make the document your own. Do not copy/paste from other established documentation.

      There are examples in the templates, but there are many deviations and styles that can be used.

      Change Request Form Version: 1.0

      Change Request Form (e xample)

      SUBMITTER – GENERAL INFORMATION

      CR#

      Submitter Name

      Brief Description of Request

      Date Submitted

         

      Date Required

      Priority

      |_| Low

      |_| Medium

      |_| High

      |_| Mandatory

      Reason for Change

      Other Artifacts Impacted

      Assumptions and Notes

      Attachments or References

      |_| Yes

      |_| No

      Link:

      INITIAL ANALYSIS

      Hour Impact

      Duration Impact

      Schedule Impact

      Comments

      Recommendations

      CHANGE CONTROL BOARD – DECISION

      Decision

      |_| Approved

      |_| Approved w/Conditions

      |_| Rejected

      |_| More Info

      Decision Date

      Decision Explanation

      Conditions

      Revision Date: 1/1/2018 Page 1

      Change Request Form

      ,

      <Organization Name>

      <Organizational Name>

      Change Management PLAN

      Version < >

      <mm/dd/yyyy>

      <Project Name> Change Management Plan Version: <1.0> <Draft>

      Revision Date: Error! Unknown document property name. Page 2 of 12

      CDC_UP_Change_Management_Plan_Template.doc

      VERSION HISTORY

      [Provide information on how the development and distribution of the Change Management Plan, up to the final point of approval, was controlled and tracked. Use the table below to provide the version number, the author implementing the version, the date of the version, the name of the person approving the version, the date that particular version was approved, and a brief description of the reason for creating the revised version.]

      Version #

      Implemented

      By

      Revision

      Date

      Approved

      By

      Approval

      Date

      Reason

      1.0

      <Author name>

      <mm/dd/yy>

      <name>

      <mm/dd/yy>

      <reason>

      Note to the Author

      [This document is a template of a Change Management Plan. The template includes instructions to the author, boilerplate text, and fields that should be replaced with the values specific to the organization.

      · Red italicized text enclosed in square brackets ([text]) provides instructions to the document author, or describes the intent, assumptions and context for content included in this document.

      · Red italicized text enclosed in angle brackets (<text>) indicates a field that should be replaced with information specific to the organization.

      · Text and tables in black are provided as boilerplate examples of wording and formats that may be used or modified as appropriate to your organization. These are offered only as suggestions to assist in developing your organizational plan.

      When using this template for your project document, it is recommended that you follow these steps:

      1. Replace all text enclosed in angle brackets (i.e., <Organizational Name>) with the correct field values. These angle brackets appear in both the body of the document and in headers and footers. To customize fields in Microsoft Word (which display a gray background when selected):

      1. Modify boilerplate text as appropriate to your organization.

      2. To add any new sections to the document, ensure that the appropriate header and body text styles are maintained. Styles used for the Section Headings are Heading 1, Heading 2 and Heading 3. Style used for boilerplate text is Body Text.

      3. To update the Table of Contents, right-click and select “Update field” and choose the option- “Update entire table”

      4. Before submission of the first draft of this document, delete this “Notes to the Author” page and all instructions to the author, which appear throughout the document as red italicized text enclosed in square brackets.]

      TABLE OF CONTENTS

      1 Introduction 4

      1.1 Purpose of The Change Management Plan 4

      2 Change management Process 4

      2.1 Change Request Process Flow Requirements 4

      2.2 Change Request Form and Change Management Log 5

      2.3 Evaluating and Authorizing Change Requests 5

      2.3.1 Change Control Board 6

      3 Responsibilities 6

      Appendix A: Change Management Plan Approval 7

      Appendix B: References 8

      Appendix C: Key Terms 9

      Appendix D: Change Request Form Example 10

      Introduction

      Purpose of The Change Management Plan

      [Provide the purpose of the Change Management Plan. This document should be tailored to fit the particular organizational needs.]

      The Change Management Plan documents and tracks the necessary information required to effectively manage change from the inception to delivery.

      The Change Management Plan is created during the Planning Phase of the project. Its intended audience is the project manager, project team, project sponsor and any senior leaders whose support is needed to carry out the plan.

      Change management Process

      The Change Management process establishes an orderly and effective procedure for tracking the submission, coordination, review, evaluation, categorization, and approval for release of all changes to the project’s baselines.

      Change Request Process Flow Requirements

      [Outline the project teams agreed upon change request (CR) process flow. The following outlines a generic change request process flow.]

      Step

      Description

      Generate CR

      A submitter completes a CR Form and sends the completed form to the Change Manager

      Log CR Status

      The Change Manager enters the CR into the CR Log. The CR’s status is updated throughout the CR process as needed.

      Evaluate CR

      Project personnel review the CR and provide an estimated level of effort to process, and develop a proposed solution for the suggested change

      Authorize

      Approval to move forward with incorporating the suggested change into the project/product

      Implement

      If approved, make the necessary adjustments to carry out the requested change and communicate CR status to the submitter and other stakeholders

      Change Request Form and Change Management Log

      [List and define the data elements the project team needs to include on the Change Request Form. Examples of this is provided in Appendix D. At a minimum, the following data should be included on the project’s Change Request Form.]

      Element

      Description

      Date

      The date the CR was created

      CR#

      Assigned by the Change Manager

      Title

      A brief description of the change request

      Description

      Description of the desired change, the impact, or benefits of a change should also be described

      Submitter

      Name of the person completing the CR Form and who can answer questions regarding the suggested change

      Phone

      Phone number of the submitter

      E-Mail

      Email of the submitter

      Product

      The product that the suggested change is for

      Version

      The product version that the suggested change is for

      Priority

      A code that provides a recommended categorization of the urgency of the requested change (High, Medium, Low)

      Evaluating and Authorizing Change Requests

      [In order to evaluate and prioritize a change request, the “priority” and “type” of the change are taken into consideration. Use the first and second tables below to list and define the “priority” and “type” data elements that are applicable for the project. The third table provides examples of commonly used project status types. The list of elements is at the discretion of the project manager.]

      Change requests are evaluated using the following priority criteria:

      Priority

      Description

      High

      <Insert the definition the project assigns to a high priority CR>

      Medium

      <Insert the definition the project assigns to a medium priority CR>

      Low

      <Insert the definition the project assigns to a low priority CR>

      <priority>

      <Insert the definition the project assigns to this level of priority CR>

      Change requests are evaluated and assigned one or more of the following change types:

      Type

      Description

      Scope

      Change affecting scope

      Time

      Change affecting time

      Duration

      Change affecting duration

      Cost

      Change affecting cost

      Resources

      Change affecting resources

      Deliverables

      Change affecting deliverables

      Product

      Change affecting product

      Processes

      Change affecting process

      Quality

      Change affecting quality

      <change type>

      <define this change type>

      Change requests are evaluated and assigned one of the following status types:

      Status

      Description

      Open

      Entered/Open but not yet approved or assigned

      Work in Progress

      CR approved, assigned, and work is progressing

      In Review

      CR work is completed and in final review prior to testing

      Testing

      CR work has been reviewed and is being tested

      Closed

      CR work is complete, has passed all tests, and updates have been released.

      <status type>

      <define this status type CR>

      Change Control Board

      [A Change Control Board (CCB) is a formally constituted group of stakeholders responsible for approving or rejecting changes to within the organization. This group may meet on a predefined schedule or on an as needed basis. The table below provides a brief description of personnel acting as the Change Control Board (CCB) and their role/level of authority within that group.]

      Role

      Name

      Contact

      Description

      [Insert Role]

      [Insert Name]

      [Insert Contact #]

      [Insert Role Description]

      Responsibilities

      [Provide a brief description of persons responsible for each step of the change management process for the project.]

      Role

      Name

      Contact

      Description

      Project Manager

      Change Manager

      [Insert Role]

      [Insert Name]

      [Insert Contact #]

      [Insert Role Description]

      Appendix A: Change Management Plan Approval

      The undersigned acknowledge they have reviewed the <Project Name> Change Management Plan and agree with the approach it presents. Changes to this Change Management Plan will be coordinated with and approved by the undersigned or their designated representatives.

      [List the individuals whose signatures are desired. Examples of such individuals are Business Steward, Project Manager or Project Sponsor. Add additional lines for signature as necessary. Although signatures are desired, they are not always required to move forward with the practices outlined within this document.]

      Signature:

      Date:

      Print Name:

      Title:

      Role:

      Signature:

      Date:

      Print Name:

      Title:

      Role:

      Signature:

      Date:

      Print Name:

      Title:

      Role:

      Appendix B: References

      [Insert the name, version number, description, and physical location of any documents referenced in this document. Add rows to the table as necessary.]

      The following table summarizes the documents referenced in this document.

      Document Name and Version

      Description

      Location

      <Document Name and Version Number>

      [Provide description of the document]

      <URL or Network path where document is located>

      Appendix C: Key Terms

      [Insert terms and definitions used in this document. Add rows to the table as necessary. Follow the link below to for definitions of project management terms and acronyms used in this and other documents.

      The following table provides definitions for terms relevant to this document.

      Term

      Definition

      [Insert Term]

      [Provide definition of the term used in this document.]

      [Insert Term]

      [Provide definition of the term used in this document.]

      [Insert Term]

      [Provide definition of the term used in this document.]

      Appendix D: Change Request Form Example

      The attached example Change Request Form can be used to submit changes during the life of the project.

      Page 10 of 10

      image1.wmf

      information Assurance

       

      For this discussion, you are asked to consider whether ethical behavior can be assured using the Personnel Security (PS) family of controls (as specified in NIST SP 800-53). Or is a Code of Ethics a better tool for promoting ethical behavior with respect to the use of information and information systems within a specific organization?

      Write your response in the form of an opening statement for a debate. Pick one of the two positions below and construct a 3 to 5 paragraph argument for your position. Your argument will be strengthened by the use of authoritative sources and examples — this means you need to cite your sources and provide a list of references at the end of your posting.

      1. Position #1 — a Code of Ethics is the stronger method for ensuring ethical behavior.
      2. Position #2 — Implementation of Personnel Security Controls is the stronger method for ensuring employees act ethically.

      For this discussion, you are asked to consider whether ethical behavior can be assured using the Personnel Security (PS) family of controls (as specified in NIST SP 800-53). Or is a Code of Ethics a better tool for promoting ethical behavior with respect to the use of information and information systems within a specific organization?

      Write your response in the form of an opening statement for a debate. Pick one of the two positions below and construct a 3 to 5 paragraph argument for your position. Your argument will be strengthened by the use of authoritative sources and examples — this means you need to cite your sources and provide a list of references at the end of your posting.

      1. Position #1 — a Code of Ethics is the stronger method for ensuring ethical behavior.

      2. Position #2 — Implementation of Personnel Security Controls is the stronger method for ensuring employees act ethically.

      Platinum Essays