CSA 501

I’m here because I want to change fields. I’ve previously worked in optics for a good few years and decided I wanted a challenge. IT is a field i’m not too familiar with, yet I know there is so much opportunity within the IT industry and wish to peruse a career in Project Management and finish with my Degree specializing in Information Systems.

I am currently in the second half of my first year. It’s been a tough first half, as I’ve had a lot of personal things going on, but I got through and here I am finishing off the second half and I intend on making it out even stronger than I did the first half.

I find this a true challenge, as I honestly don’t know much about IT, although i’m truly eager to learn and have an attitude  that can carry me through!! I have learnt so much already with the first half and am eager to soak up as much knowledge as I can throughout!! I’m very excited too!! I have many goals I want to achieve and I believe that a career in IT can open up all those doors and create the best future for myself and my kids. hard work and dedication…I’m ready for it!!

I know absolutely NOTHING about hardware of a computer, but i’m willing to learn and there is no doubt in my mind that I can do it! I did NET 501 with Craig, so I’ve done a bit of the security side, as well as hacking etc. I loved NET and I think the theory side of it all will be more up my alley, but with saying that, having an understanding of the hardware will link in with understanding the theory and I can imagine, make things easier to understand as a whole.

I intend on leaving here feeling content, degree in hand and ready to slay the IT industry!!! (Proving GIRLS CAN DO IT TOO!!!!-Wooooohooooo!!!!)

Written by :

Heidi Rencken

Featured post

Blog 1/Group Assignment 2. Progress…

Sun 30 April 17

Our group assignment is almost fully complete. We didn’t manage to have much contact with our team members within the last two week ‘holiday break’ (so they call it! HA! 🙂 Although myself and Rosie managed to get together this last week to make sure everything is covered and delegate jobs to the group members in hope things would get done.

We managed to get hold of Luke and Aaron, who proved to be extremely helpful and were happy to do any of the work needed to be done in order to complete our group project. We still haven’t heard anything from Riley to be honest? I’m not sure as to why he has not responded to our several messages both in our group chat, as well as private messages? I plan to have a wee chat with him when we return to class tomorrow and see what’s going on with his part? (although I have already completed the part he was meant to do, as I don’t think he has done it, as unfortunate as that is to say.)

I received an email from our ‘unknown’ group member, Henry Shaw and he explained as to why he had missed out on the classes, and was happy to offer whatever else needed to be completed with regards to our group assignment. I replied in an email and explained that the work was almost complete and that we appreciate him making an effort and contacting us. I plan to hopefully meet up with him this Tuesday and show him the work we have done and see what he can contribute towards the final collaboration 🙂

woohoo  Group Assignment 2 almost fully complete!!! WOOHOOOOO 🙂

Database concepts!?…..

DES 501 Mon 10th April 17

In today’s class I was a bit confused as to whether our Design class had decided to take on the full elements of Database!?….Liz introduced this class with examples of one to one, one to many and many to many, using string and students as examples. She then drew an example of all this on the board in attempt to explain the point she was trying to get across to the class 🙂

We were then given a few pieces of pasta,sellotape, string and a marshmallow 🙂 (I will openly admit here that in this class, if i learnt anything, it was resistance!…towards eating that one marshmallow 🙂 Our task was to create a tower as tall as we could, using these tools we were given. We were to try make it as tall as we possibly could without letting it break or fall.

17837018_1020504504747528_291695851_o.jpg17858657_1020507114747267_1706185535_o

Our team made a pretty good effort, but unfortunately our tower wasn’t stable enough and broke 😦  I had to leave after this as I had to collect my girls from school.

 

Login, (The lock out)

DAT 602 Wed 12th April 17

In today’s class we went over UserKnown log in , and lock out in SQL.

Below is a picture of a wonderfully explanatory example Todd drew on the whiteboard 🙂

18034886_10210475312657416_682757505_n

We were given an example on Moodle where we inserted the information listed, into SQL Workbench and had to edit it.

What is Login?

 

  • Logins are associated to users by the security identifier (SID). A login is required for access to the SQL Server server. The process of verifying that a particular login is valid, this is called “authentication”. This login must be associated to a SQL Server database user.

I plan to go through a bit more on this, although I feel I’m understanding the process at this point 🙂

Add user,(Registration)

DAT 602 Mon 10th April 17

In today’s class we were given a few examples on how to write a game registration in SQL.

We had a task on Moodle where we were to Download the MySQL example database script, then open it as a query script in MySQL Workbench, or make a new query then paste the contents of the script into the new query. Once that is done, to Save and run it. There were minor adjustments needed to be done so that we can correct the minor errors.

We were told to look up ‘Replace‘ in SQL. This is what a searched-

The Replace function in SQL is used to update the content of a string. The function call is REPLACE( ) for MySQL, Oracle, and SQL Server.

Syntax

The syntax of the Replace function is:

REPLACE (str1, str2, str3)

In str1, find where str2 occurs, and replace it with str3.

Example

The following table was used as an example:

Table Geography

Region_Name Store_Name
East Boston
East New York
West Los Angeles
West San Diego

If we apply the following Replace function:

SELECT REPLACE (Region_Name, ‘ast’, ‘astern’) REGION1
FROM Geography;

we get the following result:

REGION1
Eastern
Eastern
West
West

When looking at the example above, it made sense to me 🙂

 

5NF…

DAT 601 Fri 7th April 17

In today’s class we went over a few slides on 5th Normal Form.

These are a few notes I made, as well as a bit if research I did- 🙂

What is 5NF??

5NF is a level of database normalization designed to reduce redundancy in relational databases recording multi-valued facts by isolating semantically related multiple relationships. A table is said to be in the 5NF if and only if every non-trivial join dependency in it is implied by the candidate keys.

  • Domain-key normal form (DK/NF) is a normal form used in database normalization which requires that the database contains no constraints other than domain constraints and key constraints.
  • A domain constraint specifies the permissible values for a given attribute, while a key constraint specifies the attributes that uniquely identify a row in a given table.
  • The domain/key normal form is achieved when every constraint on the relation is a logical consequence of the definition of keys and domains, and enforcing key and domain restraints and conditions causes all constraints to be met. Thus, it avoids all non-temporal anomalies.

We went through our Assignment One brief in this lecture and read through the requirements. So for now…it’s getting a start on this assignment (WOOOHOOOOO)….

….I’m relatively NERVOUS!!!!! Yet i find comfort in the words of a wise man-

‘Everything seems impossible until it’s done!” Nelson Mandela 🙂 …How very true indeed…so here goes….

dfghj   🙂

Team presentations…

Thurs 6th April 17

In today’s class we had to do our team presentations. Our team had to present The Spiral Model. Unfortunately three of our team members weren’t able to contribute towards our work, so myself and Rosie took it for the team 🙂 (GIRLS DO IT BETTER!!!!!!)

Here’s a brief of what we went over…

The Spiral model defined- The spiral model is similar to the incremental model, with more emphasis placed on risk analysis. The spiral model has four phases: Planning, Risk Analysis, Engineering and Evaluation. A software project repeatedly passes through these phases in iterations (called Spirals in this model). The baseline spiral, starting in the planning phase, requirements are gathered and risk is assessed. Each subsequent spirals builds on the baseline spiral. Its one of the software development models like Waterfall, Agile, V-Model.

  • Planning Phase: Requirements are gathered during the planning phase. Requirements like ‘BRS’ that is ‘Business Requirement Specifications’ and ‘SRS’ that is ‘System Requirement specifications’.
  • Risk Analysis: In the risk analysis phase, a process is undertaken to identify risk and alternate solutions.  A prototype is produced at the end of the risk analysis phase. If any risk is found during the risk analysis then alternate solutions are suggested and implemented.
  • Engineering Phase: In this phase software is developed, along with testing at the end of the phase. Hence in this phase the development and testing is done.
  • Evaluation phase: This phase allows the customer to evaluate the output of the project to date before the project continues to the next spiral.

pppppppppppp

 🙂 We also spoke about the Advantages and disadvantages…

Advantages of Spiral model:

  • High amount of risk analysis hence, avoidance of Risk is enhanced.
  • Good for large and mission-critical projects.
  • Strong approval and documentation control.
  • Additional Functionality can be added at a later date.
  • Software is produced early in the software life cycle.

Disadvantages of Spiral model:

  • Can be a costly model to use.
  • Risk analysis requires highly specific expertise.
  • Project’s success is highly dependent on the risk analysis phase.
  • Doesn’t work well for smaller projects.

 🙂 We also spoke about when The Spiral model should be used…

 When to use Spiral model:

  • When costs and risk evaluation is important
  • For medium to high-risk projects
  • Long-term project commitment unwise because of potential changes to economic priorities
  • Users are unsure of their needs
  • Requirements are complex
  • New product line
  • Significant changes are expected (research and exploration)

This was all the research myself and Rosie did in order to make sure we understood the concepts of what makes the Spiral model, as well as be able to try explain it to the class.

We made the decision that The Spiral model wouldn’t be practical for us in the end, as this is generally used in larger projects, whereas ours is based on a much smaller scale. It’s a good model, just not the right one for us. 🙂

Among listening to the other group presentations, we are having thoughts into which model we want to choose….the decision is yet to be made!!

We had to take a few notes on each group presentation….Here’s a few pics I took on our group comments-

Diagnostics/Bios…..

Wed 5th April 17

In today’s class we got stuck into deconstructing the PC Tower again in preparation for our Practical test on Wednesday.

I teamed up with a friend in this deconstruction as we decided that by doing it that way, I could start mine first, then he does his and that way we are both doing it twice, therefore…twice the knowledge 🙂

I took some photo’s-

17842509_10210390337013078_847274394_nWe started with this…

17857657_10210390337293085_1983937234_nThen laid out all the parts…

17841911_10210390337613093_1665278725_n17841830_10210390337453089_1344294700_n

17821097_10210390337733096_358892986_nThen went through all the cables and made sure we knew where they all were connected within the Tower.

17842215_10210390337213083_339347468_nThen put it all back together again 🙂

I feel that I’m ready for the practical test on Wednesday, having done this twice now. I plan to head into the lab on Monday with Luke, so we can do this all another two times and then we are ready and set to go for sure 🙂

Functions and Stored Procedures.

Wed 5th April 17

Today we had a few students present their slide shows on Stored Procedures and Functions.

Here is the slide we produced- (Apologies for the images Todd, this was not my work, I’m sorry. I contributed towards the written work…oh dear….)

slide 1slide2

slide3slide4

slide5

slide6

My understandings…

A stored procedure is a set of Structured Query Language (SQL) statements with an assigned name, which are stored in a relational database management system as a group, so it can be reused and shared by multiple programs.


A function returns a value and a procedure just executes commands.

The name function comes from math. It is used to calculate a value based on input.

A procedure is a set of command which can be executed in order.


 

Normalization among other topics…

DAT 601 Tues 4th April 17

Today we went through Normalization and Dependencies.I jotted down a few notes from this lecture which I found particularly informative…

Functional Dependency

Normalization relies on the concept of organizing data into functionally dependent units.  By ensuring all attributes that are inter-related are grouped together, we can localize the effect of any changes to an attribute value.  The functionally dependent groups become the relations of the database.

Interdependence between relations is managed by allowing controlled repetition of attributes.  The appearance of an attribute or attributes in more than one relation allows us to connect those relations together when necessary.  The repetition is constrained by only allowing duplication of attributes that appear as primary keys.


Transitive dependency- (What does this mean??)

a transitive dependency is a functional dependency which holds by virtue of transitivity. A transitive dependency can occur only in a relation that has three or more attributes. Let A, B, and C designate three distinct attributes (or distinct collections of attributes) in the relation.

1st Normal Form-

A relation is in first normal form if all tuples consist of single-valued attributes.  That is, a tuple cannot have a variable number of values for an attribute; each attribute must represent a single fact.

Example of First Normal Form

Order(OrdID, CustID, Date, CustName, {ProdID, Prod, Price, Qty})

2nd Normal Form-

A relation is in second normal form if it is in first normal form, and all attributes are fully functionally dependent on the key.

Second normal form ensures that all attributes within a relation are fully functionally dependent on the primary key.  If the primary key is atomic, any relation in first normal form will also be in second normal form.  If the primary key is composite, each attribute should be tested for partial dependence on the key.  If a partial dependency exists, there will be uncontrolled redundancy in the relation, and it will be subject to update anomalies.

Example of Second Normal Form-

OrdLine(OrdID, ProdID, ProdName, Price, Qty)

3rd Normal Form-

Third normal form, like second normal form, deals with dependencies.  Third normal form tests for interdependence between non-key entities

A relation is in third normal form if it is in second normal form, and there are no functional dependencies between non-key attributes.

 

Non-key interdependence is formally called transitive dependency.  A simple test for transitive dependency is to ask whether we can indirectly change the value of an attribute without altering the primary key.  If altering a non-key attribute affects another non-key attribute, a transitive dependency exists.

Example of Third Normal Form-

Order(OrdID, CustID, Date, CustName)


 

 

 

 

 

 

Blog at WordPress.com.

Up ↑