From ???@??? Wed Apr 26 16:37:31 2000 Received: from f05n15.cac.psu.edu (f05s15.cac.psu.edu [128.118.141.58]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MFMN; Wed, 26 Apr 2000 14:29:38 -0400 Received: from [24.7.221.248] (c401566-a.scllg1.pa.home.com [24.7.221.248]) by f05n15.cac.psu.edu (8.9.3/8.9.3) with ESMTP id OAA74100 for ; Wed, 26 Apr 2000 14:27:24 -0400 Mime-Version: 1.0 X-Sender: kaf140@email.psu.edu Message-Id: Date: Wed, 26 Apr 2000 14:29:46 -0400 To: ritter@ist.psu.edu From: "Kirk A. Fuller" Subject: Group 7--Managing IT Systems Content-Type: text/plain; charset="us-ascii" ; format="flowed" Below is listed the main topics for managing IT systems. Best viewed in Courier font. Provided by Group 7: Kirk Fuller Sara Hassinger Natalie Pappas ---------------------------------------------- Management of IT Systems -What does it mean? Providing an environment of stability without stagnation and change without chaos for information, information technology, and knowledge workers. -Stable IT System? Provides consistence and predictability, which are vital for the effective functioning of an organization. -Components to managing IT Systems: 1. Managing Knowledge Workers 2. Managing Information Technology 3. Managing Information -Role of Information Information serves as both Raw Material (components from which a product is made) and Capital (a type of asset that you use to produce a product or service) -Access to Information 3 dimensions: content(what), time(when), and form (how) Managing IT Systems means you provide the most effective means to access the right information, at the right time, and in the correct form. -Information Security 3 main points: Backing up and archiving data, Protection from Theft and tampering and Viruses, Privacy of information -Managing the Technology in IT Systems requires 3 main areas: 1. Having control of your IT components (integrating IT components into workplace as invisible as possible and keeping track of the costs involved) 2. Arranging IT components to preserve the health of the knowledge workers (Ergonomics) 3. Provide steps to ensure your data flow in case of a disaster (natural disaster, etc) -Managing the Knowledge Workers in IT Systems 3 main areas: 1. Telecommuting (provide information access and IT support to telecommuters 2. Cultural Diversity (provide a helpful and understanding atmosphere for people already suffering more change than is needed ) 3. Ethics (provide a stable and predictable ethical environment by establishing policies and procedures and setting a good example) From ???@??? Wed Apr 26 14:07:11 2000 Received: from f05n15.cac.psu.edu (f05s15.cac.psu.edu [128.118.141.58]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MFJ7; Wed, 26 Apr 2000 14:07:02 -0400 Received: from [24.7.221.248] (c401566-a.scllg1.pa.home.com [24.7.221.248]) by f05n15.cac.psu.edu (8.9.3/8.9.3) with ESMTP id OAA41252 for ; Wed, 26 Apr 2000 14:04:47 -0400 Mime-Version: 1.0 X-Sender: kaf140@email.psu.edu Message-Id: Date: Wed, 26 Apr 2000 14:07:12 -0400 To: ritter@ist.psu.edu From: "Kirk A. Fuller" Subject: Media throughout the class Content-Type: text/plain; charset="us-ascii" ; format="flowed" We have used/been exposed to the following media during the course of IST110: internet (chat rooms, web pages, syllabus, etc) intranet (i.e. groupware on internal network) overhead projector (computer attached and standard) telephone email oral media (presentations, speakers) paper media (documents handed out and turned in) computer hardware media (cds, floppies, harddrives, etc.) computer software media (groupware, cphack, Office 2000, Emax, html, etc.) Hope this was what you were looking for. Sincerely, Kirk Fuller Section 2 From ???@??? Wed Apr 26 12:59:27 2000 Received: from f04n07.cac.psu.edu (f04s07.cac.psu.edu [128.118.141.35]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9M1PS; Tue, 25 Apr 2000 19:22:04 -0400 Received: from rsmail2 (husain.la.psu.edu [146.186.241.6]) by f04n07.cac.psu.edu (8.9.3/8.9.3) with SMTP id TAA302900 for ; Tue, 25 Apr 2000 19:19:51 -0400 Message-Id: <4.1.20000425191743.00ac4ca0@email.psu.edu> X-Sender: rvs2@email.psu.edu X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1 Date: Tue, 25 Apr 2000 19:19:50 -0400 To: "Frank E. Ritter" From: Robin Bradford Smail Subject: Group 6 In Class Work Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="=====================_107929274==_.ALT" Content-Type: text/html; charset="us-ascii" X-MIME-Autoconverted: from 8bit to quoted-printable by f04n07.cac.psu.edu id TAA302900 Group 6 Six  Jamila Moore, Cathy D’Amato, Robin Smail

Tuesday, April 25, 2000

Media list used throughout class
1.      Text (Haag)
2.      Copied Handouts
3.      Lectures & In-Class talks
4.      Groups
5.      Email
6.      List serves
7.      Groupware
8.      Chatrooms (Volano)
9.      Instant Messenger
10.     Newspaper
11.     Websites
12.     Magazines & journals
13.     Chalkboard and Chalk
14.     Video (menus)
15.     Word documents
16.     Excel documents
17.     Access documents
18.     Power Point presentations
19.     Web browsers (Netscape, Explorer)
20.     FTP
21.     NotePad

Developing IT Systems  Main Points

The 6 steps of the traditional Systems Development Life Cycle (SDLC):
1.      Planning
2.      Scoping - determining the scope of the system.
3.      Analysis - defining the logical requirements of the system.
4.      Design - determining the hardware/software requirements of the system.
5.      Implementation - developing, testing training.
6.      Support - maintaining the system and users.

Ask questions first:
          What systems should we develop?
          When should we develop those systems?
          Who should develop systems?
          How should we go about developing systems?
          Why is participation important during the systems development process?

IT systems are expanding and becoming increasingly important in today’s business decisions
IT systems use both insourcing (sources within your organization) and outsourcing (other organizations outside your systems)








Robin Bradford Smail
Child Study Center
150 University Support Bldg I
University Park, PA  16802-1003
tel/814-863-5656  fax/814-863-5658

From ???@??? Tue Apr 25 17:41:04 2000 Received: from hotmail.com (f207.law3.hotmail.com [209.185.241.207]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9M1BW; Tue, 25 Apr 2000 13:14:47 -0400 Received: (qmail 80494 invoked by uid 0); 25 Apr 2000 17:12:24 -0000 Received: from 128.118.246.206 by www.hotmail.com with HTTP; Tue, 25 Apr 2000 10:12:23 PDT Message-ID: <20000425171224.80493.qmail@hotmail.com> X-Originating-IP: [128.118.246.206] From: "Katie Walder" To: ritter@ist.psu.edu, kew156@psu.edu Subject: Group 7 Date: Tue, 25 Apr 2000 10:12:23 PDT Mime-Version: 1.0 Content-Type: text/plain; format=flowed Media Used ·Videotape ·Handouts ·Chatroom ·Internet / Web pages ·PowerPoint ·Access ·E-mail / Listserve ·Excel ·Group Systems ·FTP / Web Servers Main Points – “Managing Systems” I.Definition Management of IT systems means providing an environment of stability without stagnation and change without chaos for information, information technology, and knowledge workers Three points: ·Sustain current IT system ·Adjust the system to change ·Protect the system from harm Role, Access to, and Protection of Information ·Provide the best means to capture, store, and access the right info at the right time in the right form in the most efficient of effective way possible ·Secure the information so that it is safe from loss or corruption ·Ethics: ccessing, storing, using, and distribution information responsibly, keeping in mind that information is partnership property II.Control and protection of IT components Interoperability ·Defined: interoperability refers to the extent to which IT equipment and software components are compatible with each other ·The more interoperability you have, the fewer problems you are likely to have Cost control Ergonomics – study of how to design and arrange your workplace so that you can achieve maximum productivity and reduce discomfort and adverse health effects Disaster recovery plan Hot sites and cold sites III. Work Environments that encourage diversity and ethical behavior Telecommuting – Hoteling / Moteling – deals with office spaces Cross-cultural diversity – minimize conflicts and “culture shock” Ethics and ethical development – 3 stages ·Pre-adolescent stage ·Adolescent stage ·Adult stage ________________________________________________________________________ Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com From ???@??? Tue Apr 25 17:41:04 2000 Received: from f04n07.cac.psu.edu (f04s07.cac.psu.edu [128.118.141.35]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9M1B3; Tue, 25 Apr 2000 13:03:28 -0400 Received: from Boucke112-226 (Boucke112-226.cac-labs.psu.edu [128.118.246.226]) by f04n07.cac.psu.edu (8.9.3/8.9.3) with ESMTP id NAA75272; Tue, 25 Apr 2000 13:01:16 -0400 Message-Id: <4.2.0.58.20000425124444.00a1dcf0@email.psu.edu> X-Sender: ejd142@email.psu.edu (Unverified) X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Tue, 25 Apr 2000 13:01:11 -0400 To: ritter@ist.psu.edu From: Edward John Dame Subject: Group 3/5 -- Databases Cc: nxp169@psu.edu;, ejd142@psu.edu Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Media: 1) ms powerpoint 2) website (net) 3) handouts 4) lectures 5) group discussions 6) ms access 7) labs 8) midterm exam. Main Points: 1) Main types of databases (Hierarchical, Network, Relational*, Object-Oriented) 2) Designing simple databases 3) Sorted Information (primary keys, secondary keys, linking) 4) Data manipulation 5) Languages (SQL, sybase) 6) Data structures (Designed specific for each database) 7) Databases work in conjunction with networks. *Relational is the most widely used database model Questions: 1) Define the four types of database models. 2) What are primary and secondary keys? What are they used for? 3) Why is it important for databases to work with networks? 4) What is a database? From ???@??? Tue Apr 25 17:41:04 2000 Received: from web1603.mail.yahoo.com ([128.11.23.203]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9M1BN; Tue, 25 Apr 2000 13:03:21 -0400 Received: (qmail 27609 invoked by uid 60001); 25 Apr 2000 17:01:08 -0000 Received: from [128.118.246.224] by web1603.mail.yahoo.com; Tue, 25 Apr 2000 10:01:08 PDT Message-ID: <20000425170108.27608.qmail@web1603.mail.yahoo.com> Date: Tue, 25 Apr 2000 10:01:08 -0700 (PDT) From: jack lac Subject: object oriented group 4 To: ritter@ist.psu.edu Cc: pxk161@psu.edu, jklacort@home.com MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Group 4 Praj and John April 25,2000 Object Oriented Technologies Media 1. Slides 2. Lectures 3. Web 4. Book Main Points 1. A new way of programming 2. Combines data with operations performed on them 3. Can be defined generically, allows reuse of the data structure 4. Provides portability 5. Allows inforamtion hiding (protection) Questions 1. Is OO strictly something for use with databases or does it have wider application? (NO) 2. What software model does it utilize. (OBJECT) 3. OO allows you to combine what with information to allow you to act on the information? (PROCEDURES) __________________________________________________ Do You Yahoo!? Send online invitations with Yahoo! Invites. http://invites.yahoo.com From ???@??? Wed Apr 26 22:26:14 2000 Reply-To: From: "Brian M Farrior" To: Subject: Group # 2 - Networks Date: Tue, 25 Apr 2000 12:56:34 -0400 MIME-Version: 1.0 X-Priority: 3 (Normal) Importance: Normal Group #2 - Brian Farrior, Ricardo Rodriguez, Jason Crosby For Networks the media used that we came up with were: [contents of attached document] Group 2 IST110-1 4-25-00 Ricardo Rodríguez Brian Farrior Jason Crosby Networking Media Used The old card game Chatting (In class discussions) Handouts and/or Web documents Lectures Points An exercise about packet transfer Network theory Advantages of a network Questions Give some examples of denial of service and explain them. Give some examples of Networks and explain them. From ???@??? Wed Apr 26 23:05:26 2000 From: "Madge Ludwig" To: "Ritter" Subject: IST 110 assignment Date: Thu, 27 Apr 2000 08:30:50 -0400 MIME-Version: 1.0 X-Priority: 3 #1-List of media used in class 1. Blackboard 2. Talking - teacher and students 3. Internet a. the syllabus b. Valano Chat room c. class list serve d. web sites 4. Groupsystems software 5. Penn State free software (Word, Excel, etc.) 6. Screen and projector 7. Paper handouts - copies 8. Games - playing cards 9. Paper periodicals - handouts and those we read on our own #2- which one's used computers 3,4,5,6, and one could argue for 7 and 9 (how they were produced) GENETIC ALGORITHMS The idea behind Genetic Algorithms is to use a computer to assist in solving a problem that has a large number of possible good solutions, even an infinite number of possible solutions. First, the program is given a set of possible answers to the problem, with an evaluation function to test each answer. Each answer is tested and given a goodness score (more is better). The next generation is created by taking good answers and combining them with other good answers. for example, taking the first half of a set of answers to an exam with a good score and combining it with the last half of another set of good answers. With succesive generations, the solutions get better. Less optimal solutions are deleted (or "killed off") from the list of possibilities, and a new, smaller generation of more optimal solutions is evolved. This continues on to subsequent generations of solutions to the original problem, until a handful of very good solutions are generated. The number of generations and initial population size are left as paramters to be set by the analyst. Brendan DeBow Madge Ludwig [updated by Ritter] IST 110 Section 1 Group 1 From ???@??? Wed Apr 26 23:52:12 2000 From: "matt hauben" To: Subject: group 3-databases Date: Wed, 26 Apr 2000 23:27:07 -0400 MIME-Version: 1.0 X-Priority: 3 group 3-databases
Dear Dr. Ritter,
    This is group 3's work that was assigned to us.  We had to write down some points about databases.  We were not sure if we were to send the information to you, so we thought we would be safe and do it.  So her it is.  Thank you.
 
Group 3
[reformated from attachment by Ritter]

Database
a collection of information that you organize and access according to the logical structure of that information
broken down into 2 parts

actual information- files are logically associated
logical structure of information- data dictionary
contains 2 or more files with related information

Primary Key- field in a database file that uniquely describes each record
Foreign Key- primary key of one file that also appears in another file

Integrity Constraint- rule that helps assure the quality of the information in a database

Data Base Management System- The software you use to specify the logical organization for a database and access it

Contains 5 software components:
DBMS engine
Data definition subsystem
Data Manipulation subsystem
Application generation subsystem
Data administration subsystem

Database Models:
Hierarchical database model
Network database model
Relational database model
Object-oriented database model
From ???@??? Thu Apr 27 01:15:22 2000 Received: from f04n07.cac.psu.edu (f04s07.cac.psu.edu [128.118.141.35]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MF9L; Thu, 27 Apr 2000 00:35:07 -0400 Received: from jxm633 (JXM633.rh.psu.edu [128.118.209.159]) by f04n07.cac.psu.edu (8.9.3/8.9.3) with SMTP id AAA116460 for ; Thu, 27 Apr 2000 00:32:53 -0400 Message-Id: <4.1.20000427000720.0095b220@email.psu.edu> X-Sender: jxm633@email.psu.edu X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1 Date: Thu, 27 Apr 2000 00:18:16 -0400 To: ritter@ist.psu.edu From: Jenn Marciante Subject: Media Influences Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" April 27, 2000 Throughout my IST 110 class experience, we used various forms of media applications. Chat rooms were used to hold class in and to communicate with others elsewhere in the world. We directly used the computers in the lab setting to further our knowledge in Microsoft Word processes. We worked with databases and presented and produced PowerPoint demonstrations. Our groups can also be considered a form of media. Groups put their heads together for all different kinds of projects such as Web Usuability and making Power Point demonstrations. We worked together on in class exercises that cooresponded with the lecture. Our whole entire class can be considered media also. We all worked together for a common goal as in the card game we played and the game with the candy. Media was a big influence and part of the IST 110 class as it is a part of our everyday lives. From ???@??? Fri Apr 28 10:54:20 2000 Received: from f05n16.cac.psu.edu (f05s16.cac.psu.edu [128.118.141.59]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MHB8; Fri, 28 Apr 2000 03:18:18 -0400 Received: from f05n16 (f05s16.cac.psu.edu [128.118.141.59]) by f05n16.cac.psu.edu (8.9.3/8.9.3) with ESMTP id DAA132256; Fri, 28 Apr 2000 03:16:00 -0400 Received: from LISTS.PSU.EDU by LISTS.PSU.EDU (LISTSERV-TCP/IP release 1.8d) with spool id 232763 for L-IST110-2@LISTS.PSU.EDU; Fri, 28 Apr 2000 03:15:55 -0400 Received: from f04n07.cac.psu.edu (f04s07.cac.psu.edu [128.118.141.35]) by f05n16.cac.psu.edu (8.9.3/8.9.3) with ESMTP id DAA73214 for ; Fri, 28 Apr 2000 03:15:50 -0400 Received: from eds136 (EDS136.rh.psu.edu [128.118.214.42]) by f04n07.cac.psu.edu (8.9.3/8.9.3) with SMTP id TAA86122; Thu, 27 Apr 2000 19:26:24 -0400 MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="----=_NextPart_000_000E_01BFB07F.190D4B20" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Message-ID: <001201bfb0a0$a0620ea0$2ad67680@rh.psu.edu> Date: Thu, 27 Apr 2000 19:30:51 -0400 Reply-To: "IST 110, section 2, spring 2000" Sender: "IST 110, section 2, spring 2000" From: Elissa Shapiro Subject: Final Review- Acronyms Comments: To: "Frank E. Ritter" To: L-IST110-2@LISTS.PSU.EDU Hey everyone,
 
Attached is the list of acronyms to study for the final.  I hope i got them all.  If not please let me know.
 
Good luck in your finals,
Elissa
Group 10
CIS-Customer Integrated System ACM- Association for Computer Machinery IEEE- Intstitute of Electrical and Electronics Engineers SDLC- Systems Development Life Cycle RFP- Request for Proposal CASE- Computer-aided Software Engineering JAD- Joint Application Development HTML- Hypertext Markup Language BSP- Business Systems Planning CSF- Critical Success Factor O-O- Object-Oriented Technologies EDI- Electronic Data Interchange AI- Artificial Intelligence DSS- Decision Support System DBMS- Database Management System OODB- Object Oriented Database OLAP- Online Analytical Processing OLTP- Online Transaction Processing QBE- Query by Example SQL- Structured Query Language WSS- Workgroup Support System From ???@??? Fri Apr 28 10:06:43 2000 Received: from f04n01.cac.psu.edu (f04s01.cac.psu.edu [128.118.141.31]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MG5T; Thu, 27 Apr 2000 16:36:51 -0400 Received: from APS148 (APS148.rh.psu.edu [128.118.223.51]) by f04n01.cac.psu.edu (8.9.3/8.9.3) with SMTP id QAA31666 for ; Thu, 27 Apr 2000 16:34:36 -0400 Reply-To: From: "Andrew Shaffer" To: Subject: Final Review Group Project Date: Thu, 27 Apr 2000 16:30:50 -0400 Message-ID: MIME-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6600 Dear Prof. Ritter -- As per your request, here is the URL for group 6's final exam review project: http://www.personal.psu.edu/users/a/p/aps148/itdev.html Sincerely, Group 6 Andrew Shaffer Michael Ekworamadu Jennifer Marciante From ???@??? Fri Apr 28 11:45:01 2000 X-Sender: pkr105@email.psu.edu Date: Thu, 27 Apr 2000 10:11:21 -0400 To: ritter@ist.psu.edu From: Patricia Kathleen Reynolds Subject: summary on GA Mime-Version: 1.0 Group 1 (Jeffrey Greb - Jennifer Le - Douglas McCall - Darryl Reitz - Patricia Reynolds) Section 2 summary on genetic algorithms: Genetic algorithms mimic the "survival of the fittest" processes that take place in evolution. What a genetic algorithm does is find the best solution for a problem. In finding [a very good answer, not necessarily the best possible solution], a genetic algorithm acts like evolutionary processes that naturally takes place such as mutation (randomly combining possible solutions) and natural selection (the best steps are kept and the weakest are thrown out). An example of a situation in which a genetic algorithm is useful is in finding the most cost effective way to set up an assembly line. Media used in class: Internet, email, chat rooms, handouts, verbal, overhead projection Dr Ritter; On Tuesday in lab, I asked about the location of Fitz's law on your web site. I just wanted you to know I still was not able to find it. Regards, Trish From ???@??? Thu Apr 27 12:01:17 2000 Received: from f04n07.cac.psu.edu (f04s07.cac.psu.edu [128.118.141.35]) by istbdc.ist.psu.edu with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2650.21) id 25P9MGH0; Thu, 27 Apr 2000 09:54:49 -0400 Received: from fcd107 (FCD107.rh.psu.edu [128.118.204.252]) by f04n07.cac.psu.edu (8.9.3/8.9.3) with SMTP id JAA213522 for ; Thu, 27 Apr 2000 09:52:34 -0400 Message-ID: <000c01bfb04f$f13bdb40$fccc7680@rh.psu.edu> Reply-To: "Chris DeFilippo" From: "Chris DeFilippo" To: "Ritter, Prof. Frank" References: Subject: Final Exam Review Date: Thu, 27 Apr 2000 09:53:17 -0400 MIME-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 IST 110 : Section 2 Final Exam Review Object Oriented Technology April 27, 2000 Group 4: Chris DeFilippo Dan Kao Keith Mitchell Tim Slomer Huy Nam Information on Object Oriented Technologies Definitions: 1. OBJECT - a software module that contains information, which describes something (for example, a person, place, or thing), along with a list of procedures that can act on the information. 2. OBJECT-ORIENTED APPROACH - is any approach - perhaps a programming language or a DBMS - that combines information and procedures into a single 'object'. Notes: - Object-oriented technologies and methods combine information and procedures in a single location as opposed to separating information into different procedures - Object-oriented technologies (especially in sections of software) can be reused in other programs once they have been proven to function properly. - Many different data types (text, graphics, video, sound) can be supported by one object. Thanks, Chris