Monday, May 2, 2011

Application: Software fundementals

Social Ethical Issue: Software Piracy

Software piracy is defined as the unauthorized copying of a software. When a person buys a software, they become a licensed user. They are allowed to make copies of the CD for back up purposes but it is illegal to make copies of it to give to others.

Companies have tried many methods to stop software piracy, but it is nearly impossible to stop it completely. The methods discourage some would be software pirates, but do not stop the piracy.

Some common types of software piracy include counterfeit software, OEM unbundling, softlifting, hard disk loading, corporate software piracy, and Internet software piracy.

(source:http://www.webopedia.com/TERM/S/software_piracy.html)

Wednesday, April 27, 2011

1- Is the Turing test a valid test of intelligence? Why or why not?
2- List several mental task that people do better than computers. List several mental tasks that computers do better than people. Can you find any general characteristics that distinguish the items of the two lists?

I do not think that the Turing Test is a valid test because it does not prove that a computer is intelligent. In this case it seems that the computer just relates information that had been inputted at one time. Some one would have had have to inputted the answer because the computer would not know on its own.

Computers
-quick calculations
-remembering recent activities

People
-Translating (accuracy)
-Deciphering meaning based on linguistic context
-Imagination
-Thinking

General characteristics that distinguish the two: speed, memory, and understanding.

Monday, April 25, 2011

CH. 15 8 RQs

1. In what sense is AI a "moving frontier"?



Artificial intelligence is a moving frontier in the sense that it is defined by some people as consisting of "whatever hasn't been done yet".


2.What are the disadvantages of the approach to AI that attempts to simulate human intelligence? What is the alternative?

There are many disadvantages to the simulation approach:
1-Human intelligence includes instantaneous insights, and other mental processes that are difficult or impossible to understand or describe
2-There are vast difference between the structure and capabilities of the human brain and those of computers. Such as the brains ability to parallel processing
3-The best way to do something with a machine might be very different from the way people would do it.

The alternative approach would be to design intelligent machines independent of the way people think.

4. Why did early machine translation programs fail to produce the desired result?
The translation programs were able to translate words but their translation would not have the same meaning as that which was intended. The programs could not understand the meaning of the sentences, they could only recognize the words.

7. What is a knowledge base?What is an expert system?How are the two related?
A knowledge base is a database that contains facts, a system of rules for determining and changing the relationship among facts. An expert system is a software designed to replicate the decision making process of a human expert. The relationship between the two is that at the foundation of every expert system there is a knowledge base representing ideas from a specific field of expertise.
9. What are some problems that make machine vision so challenging?

Friday, April 15, 2011

Comic





Discussion Question


You are planning on starting your own business selling clothes. Discuss pros and cons for starting an e-business.



If I wanted to start my own clothing business business then I would consider starting an e-business. There are many pros for this. First of all, it's convenient because I could just sell whatever I wanted from home. There would be no need for me to open a real store. It is also great because a wider range of people will be able to see what I am offering therefore it will help make my business profitable. Since many people shop online or spend a lot of time on the internet, I would be able to get more buyer than I would if I opened up a physical store. E-business is easier and is less of a hassle.



But e-commerce has some cons as well. If I created an e-business, those who do not have computers or don't know how to will not be able to access it. There is also a chance that shipments can be lost. Another con is that there are many people who do not feel comfortable buying things online using their credit cards, therefore those customers will not want to buy from me.

E-Commerce S/E issues

Reliability: customers can feel more secure, seller does not get money until the shipment is received by the buyer Equality: anyone around the world can buy things on the internet at the same price -anyone has the opportunity to sell whatever they want -they can get things that are not in there area. - But those who do not have the technology (electronics) then the can not Control: advertise what they want and control prices Security: protects personal info

Thursday, April 14, 2011

2. Is e-commerce possible without the internet?

  • I think that e-commerce depends heavily on the internet but it is not impossible to do it without the internet. As long as their is some electronic network ( and the other necessary things) e-commerce is possible

4. What are the purposes of the intranet. What are the min characteristics of the intranet?



  • In B2B commerce, the intranet allows cross platform capabilities open standard,reduced hardware & software, easy installation, and minimal user training.They also use firewall for security. Its main purpose is to improve communication withing the organization. It provides information access for employees, allows them to collaborate and use teamwork, and manage internal business transactions.
8. List the capabilities e-commerce softwares should provide?

  • E-commerce software should provide access to business information( searchable directories), on demand customer service,. It must be able to support transaction processing ,typical calculations for transaction, and be able to collect payments from customers accurately and securely.
9. Describe some ethical issues involved in electronic commerce.

  • The main ethical issue that rises is that of privacy. E-commerce need to maintain trust between the people engaging in transactions. If the trust is lost such as due to a companies misuse of personal information.

Wednesday, April 13, 2011

Discussion Question

DQ - If someone discovers a cure for the common cold, should he or she hide it to protect the jobs of all the people who work in the huge cold-medicine industry? Identify reasons why so many people react negatively to advances in technology that eliminates some jobs.

  • I think that if a cure was found then the truth should not be hidden. It does not seem ethical to feed people medicine that can cause some unpredicted health issues when there is a simple solution to the illness. But I do say that if a cure is found then before shutting down huge cold-medicine industry they should take into consideration how the job loss will affect the people. Plans should be made in order to help those people find new jobs (possibly a guaranteed new job)or even a way to support those people if they cannot get a job . I think the same should be applied to jobs that are eliminated due to technological advances. Also people who lose their jobs to this reason can be trained and allowed to work for the company (the new company that is on the rise) that replaced their jobs.

Tuesday, April 12, 2011

Ch. 13 4 RQs #1

1.Define the key terms.



  • B2B: E-commerce transactions between businesses

  • B2C: E-commerce transactions which involve businesses providing goods for consumers

  • B2E: A B2B model that handles the activities that take place within an organization

  • C2C: the e-commerce model which represents individuals, organizations, or companies that are selling and buying directly from each other via the internet

  • Customer Relationship management (CRM): software system for organizing and tracking information on customers

  • dot-com: Internet based companies

  • e-commerce: business transactions over electronic networks

  • electronic payment system: an online credit card transaction in which a trusted third party transfers funds from one person or company to another, thereby concealing the credit card information of the buyer from the seller.

  • electronic commerce software:programs on a Web server that provide the commercial services to consumers and business partners on the Web site

  • extranet: an extended intranet. It is a private interorganizational information system connecting the intranets of two or more companies in an e-marketplace

  • intranet:"An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system withing that organization" (wikipedia)

  • m-commerce: mobile commerce, in which workers use their handheld devices to take their office with them wherever they travel

  • Virtual Private Network (VPN): A network that uses encryption to create secure "tunnels" through the internet or between intranets. it is a method organizations can use to set up extranets

  • Web hosting service: a service that provide e-commerce software and expertise to run an online business

3. Describe three forms of e-commerce.



  • B2B (business to business): E-commerce transactions between businesses

  • B2C (business to consumer): E-commerce transactions which involve businesses providing goods for consumers

  • C2C (consumer to consumer): the e-commerce model which represents individuals, organizations, or companies that are selling and buying directly from each other via the internet

5. What are three important ways companies use intranet?



  • Companies use intranet to allow information access for employees, internal business transactions and in order to promote collaboration and teamwork.

6. What is the main purpose of the extranet and what are some of its characteristics?



  • The purpose of an extranet is to connect the intranet of two or more companies that are partners in order to facilitate their working relationship. Some characteristics about the extranet is that it can be set up in one of three ways. It can be made a secure private network, which tends to be expensive but provides partners full extent of its access and security privileges. The seconds is a public network which is inexpensive but has a low security. The third way it can be set up is as a virtual private network which provides a secure tunnel across the network between the business partners' intranet. It is economical and very secure and therefore is the preferred method for extranets.

Thursday, April 7, 2011

Ch.11 RQs #2


  • 8. Why is education critical for our future as we automate more jobs?

The information revolution is taking speed and education needs to keep up with it. s more and more jobs become automated, workers need to be prepared to adjust to different jobs and skills when needed. Education will help in the transition. Also, people are going to be dealing a lot more with computers so they will need to have learned to be familiar with the technology. For the economic growth we need to have a suitably trained workforce and education is the key to a positive economic future.



  • 10.) What kind of education does a student to prepare for living and working in the information age?

Students will need to be familiar with technology, be literate, able to think mathematically, have an understanding of culture, have good communication skills, and able to learn how to learn and adjust to different conditions.



  • 15.) describe several ways people use home computers.

Home computers are used for household businesses , education & information, entertainment, shopping, communicating with others, and for creativity & leisure. Household business: ex. keeping track of financial transaction Education & information: ex. Online encyclopedias, dictionaries, medical references, etc Entertainment: ex. narrow casting services, computer games and simulations, Shopping: ex. EBay, Amazon and many others Communication: ex. emailing friends, chatting, Creativity & leisure: Playing music, games, reading e-books, etc.



  • 16.) what are smart cards, and how are they used?

A smart card is a card that look similar to a credit card but actually has a microprocessor embedded into it and memory instead of a barcode. It can be slipped into a slot on the computer to receive most of its input. It is an effortless way to record transactions. It can also be used as a key to access sensitive data on computers, school IDs driver licenses, to pay highway tolls and more.

Wednesday, April 6, 2011

Discussion Question

Do computers increase or decrease efficiency? Explain. I think computers have increased efficiency because it has allowed us to do things we would never be able to. They allow us to work from home and communicate very easily.They have made it easier for us to do things that would normally take a lot of time. Opens access to lots of information by the internet and search engines .They increase accuracy and precision such as in computer making factories to make silicon chips. *we increase our efficiency when we work with computers but without them we are less efficient then those in the past


What are some fears generated by the use of tech/computers in the work place? Many people fear that computers will destroy jobs and require more skills. For example like in automated factories, computers and robots replace human workers. Computers are becoming a problem for people who are inexperienced with computers because of the growing used of technology. Older workers do not have much experience using computers since they did not need them or use them as much when they were younger. Now that they are living in changed time the y have difficulty adjusting and even learning how to use new technology. They sometimes don't even feel comfortable working with more advanced technology. Another fear is that we are becoming to dependent on computers and so if anything does happen to them or there is a massive power outage there will be much loss.


List 3 jobs/skills that have become obsolete in the 21st century and 3 jobs/skills that have taken their place Newspaper/newspaper distribution: more and more newspapers and magazines are going electronic so newspapers are in less circulation as the used to be. Hard copies are no longer needed -Automobile assembly lines: These have almost been completely taken over by robots. People no longer make them -Elevator operators: elevators can "drive themselves"

Chapter 11 Computers at work, School , & home

Alan Kay:his research team developed the first PC Computers have a bid impact on entertainment, publishing , medicine (virtual rooms used by students to as simulations) , Airline, science (gathering info, organizing,super computers, communicate with them) Robots: computer controlled machines computers help monitor may things -Engineers use CAD to design new things Automated factory: is more efficient, use less labor, reduce waste, -but affects blue collar workers During PC era : moved from using mainframes to PC Workgroup comp: Groupware, intranet, extranet The paperless office: documents stored electronically. Electronic commerce: buying and selling on internet B@B- buiz to biz B2C: buiz to consum. rules of thumb: learn touch typing -use regularly -plan for change For many people computers have caused more problems then solution Monitoring: checking up on employees electronic swear shop: mostly women, low pay, oppressive automation has destroyed jobs

Tuesday, April 5, 2011

Monday's 4 RQs Ch.11 Part #1

2.) What are the major components of the modern automated factory? Two major components for automated factories are computers and robots(computer-controlled machines designed to perform specific manual tasks.

6) What is de-skilling? what is up-skilling? Give examples of each. De-skilling a job means that it may be transformed so that it requires less skill. For example, the computerized cash registers in restaurants. Up-skilling means to be transformed in a way so that it requires more skill. For example, many clerical jobs become more technical as offices adopt databases,email systems, Internet, etc.


7.) Describe several controversies surrounding the electronic sweat shop. -Workers are often from minority groups and are almost always female -They are paid minimum wage -Many experience headaches,backaches,serious wrist injuries,stress, and other health problems. -Keystrokes and breaks are monitored electronically -Similar to oppressive factory sweatshops of the 19th century -pay is different for on shore and off shore workers


13.) Give several examples of ways how distance learning can enhance education. -Middle schools can use electron microscopes, telescopes, and other powerful tools around the world using real-time internet connection.High school correspondence courses can be completed by modem rather than by mail -handicapped students can do work in their place of comfort -teachers can receive additional education without leaving the district

Thursday, March 31, 2011

Wednesday's 4RQs #2 from ch.10

1.)Key terms:

  • Access control Software: a software that only allows users to access according to the user's needs

  • active badge: a microprocessor-controlled ID badges that broadcasts infrared identification codes to a network receiver

  • antivirus:a program designed to search for virus, alert the users, and destroy the virus

  • authentication mechanism: a security measure that make sures only legitimate users have access to the system by asking potential users to identify themselves

  • authorization mechanism: a security measure that guarantees that users have permission to perform a particular task

  • autonomous system: a complex system that can assume almost complete responsibility for a task without human input

  • back up:the process of saving data- especially for data recovery

  • biometric: measurements of individual body characteristics

  • computer crime: an crime accomplished though knowledge or use of computer technology

  • computer security:protecting a computer system and information from...

  • DoS attack:(denial of service) a type of computer vandalism that bombard servers and Web sites , denying service to legitimate clients and customers

  • encryption: a secret numerical code that can be used to scramble network transmission

  • firewall: a tool used to keep internal networks secure while enabling communication with the rest of the Internet

  • hacking: electronic trespassing and vandalism

  • identity theft: the crime of obtaining enough information about a person to assume his or her identity

  • logic bomb: a program designed to attack in response to a particular logical event or sequence of events

  • malware: malicious software (worms, viruses, etc.)

  • passwords: the most common security tool used to restrict access to a computer system

  • sabotage: a malicious attack on work, tools, or business

3.)Describe the typical computer criminal. How does he or she differ from the media stereotype. the typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity.Greed, financial worries ,or personal problems motivate this person to give in to temptations. This is different from the stereotypical criminal who is described as a young, bright, technically savvy,white, middle class, male who in addition to programming his computer, may break into others. The stereotype classify the criminals young, white and middle class, but that is just a generalization.



9.)Every afternoon at closing time the First Taxpayer's Bank copies all the day's accumulated transaction information from disk to tape. Why? They do this to backup their work and take precautions, data and software are backed up on to disks or tapes at the end of the day to allow them, if necessary, to go back several days weeks, or years to reconstruct files. It is also done to secure the files in case something happens.


10. In what ways can computer security protect privacy of individuals? In what ways can computer security threaten the privacy of individuals? Protect privacy: Computer security protects us from destructive viruses, illegal interlopers,crooked coworkers, software pirates, and cybervandals who can erode trust, threaten jobs and make life difficult for everyone. It also prevents our personal information from getting into the wrong hands. Threatens privacy: The complex procedures, virus protection programs, intellectual property laws and other security matter, which are used to protect our privacy , if carried to far can interfere with our work and individual human rights. Government and corporate databases gather information about us without our knowledge. In order to protect us, they invade our privacy.

Tuesday, March 29, 2011

Ch.10 4RQs Monday

2. Why is it hard to estimate the extent of computer crimes? It is hard to estimate the extent because some crimes go undetected and are sometimes not reported (such as to prevent negative publicity) 4. What is the most common computer crime? Who commits it? What is being done to stop it? Theft by computer is the most common computer crime.It is when computers are used to steal money, goods, information etc.. A variety of people are usually involved with it such as , employees, programmers,clerks,and managers. To prevent this from happening, companies are creating more secure Web sites, the FBI gets involved (with large cases), people are encouraged to use firewall,encryption software and passwords. 6. Describe several types of programs that can be used for software sabotage. viruses: Software that spreads form program to program or from disk to disk, and used infected program or disks to make copies of itself worms: similar to viruses but they travel independently over networks looking for uninfected workstations to occupy. Trojan horses: A program that performs a useful task while at the same time carrying out some secret destructive act. spyware: technology that collects information from computer users without their knowledge or consent 7. What are two inherent characteristics of computers that make security so difficult? 1) Computers do exactly what they are programmed to do. And they can be reprogrammed 2)It can only do what it is programmed to do, meaning that it cannot protect itself from malfunctions and attacks.

Thursday, March 24, 2011

Ch.9 4 RQs #2

5.Explain the relationship between the client server models and the fact that different users might experience different interfaces while accessing the same information.

The client and server were relationship is a hierarchical one. one computer is the server and other are the clients. Since the server is going to serve all the requests of its clients, its interface is more complex. The clients interface is more simple, to shield the user from the complexities. The client get what it needs in an understandable way.

6. What do email addresses and URLs have in common?
They both use the same domain-naming scheme. the both include information about the host and domain.They both are used to pinpoint or specify a a specific "address".

9.Why is file compression important on the Internet?
Data compression is the process of encoding information with lesser bits than it would usually use. It is important because it allows files to be transmitted easily and faster over slow intenet connection.

11. How does push technology differ from standard Web page delivery techniques? How is it used?
Push technology is different from the standard Web page delivery because it allows to subscribe to a service or specify the kind of information you want to receive and the server delivers that information periodically and unobtrusively to you.. It works by allowing the client to use a browser to pull information from server machines. The browser initiates a request and then the information is delivered to the client.

Wednesday, March 23, 2011

10 Top Level Domains

.com: Commercial site
.net: network administering site
.edu: education
.mil: military
.org: organization (non-profit
.museum: Museum site
.info: information
.gov: government
.coop: Cooperative business
.pro: Licensed Professional
.biz: Business

Monday, March 21, 2011

Ch.9 4 RQs

1. Key terms:
Internet2:An alternative Internet-style network that provides faster communications for universities and research institutions

TCP/IP: Transmission Control Protocol/Internet Protocol)"language" for the internet that allows cross-network communication for almost every type of computer or network.

Packet-switching: A standard technique used to send information over the internet.A message is broken into packets that travel independently from network to network towards their common destination, where they are united.

internetworking: connecting different types of networks and computer systems

open standards: not owned by any company

IP address: a string of 4 numbers separated by periods or dots that serves as an address for computers on the internet.

Static IP address: an address that is permanent

Dynamic IP address: address used for computers that are temporarily connected to the net, such as with dial up connection.

Next Generation Internet: refers to Internet Protocol Version 6. It solves the problem of address shortages and other improvements

multicasting: is a more efficient way for the same information to be transmitted to multiple Internet connected devices

DNS - Domain name system: A system that translates a computers numerical address into an easier to remember string of names separated by dots

domains:class of internet addresses indicated by suffixes such as .com, .org. gov.

(more will be added )

2.Why is it hard to determine how big the Internet is?
-It is growing to fast
-Its is decentralized, there is not a central system to track user activity
-It doesn't have hard boundaries. It is hard to say what belongs to the internet.

3. Why are TCP/IP protocols so important to the functioning of the internet? What does it do?
It functions as a "Language" the allows cross network communication for almost any type of computer or network. Without it you would not be able to have cross network communication between different computers and networks.

4. How does the type of Internet connection influence the things you can do on the Internet?
If you have high speed internet you can access a lot of things really quickly, without much waiting. But if you have bad internet connections, some websites might no open or might take a really long time open making then not worth the wait. This also makes it hard to view videos and other multimedia.With bad connection you try to do only what is really necessary.

Wednesday, March 16, 2011

Chapter 8 Review Questions (total of 8 questions)

2.Give three general reasons for the importance of computer networking?

  • Networks enable people to share computer hardware resources,reducing costs and making it possible for people to benefit from powerful computer equipment.
  • Networks allow people to share data ans programs, increasing efficiency and productivity
  • Networks allow people to work together , in way that would otherwise be difficult.

5. Under what circumstances is a modem necessary for connecting computers in networks? What does a modem do?

A modem is a hardware device that connects a computer to a telephone line.Modems are necessary when you want to use a telephone network to connect remote computers. It job is to convert digital signals into analog signals and vice versa.

6.Describe at least two communication softwares.

One communication software is known as NOS or a network operating system.. It is for users who work exclusively on a local area network.It must respond to requests from many computers and must coordinate communication through out the network.
Another communication software is the terminal emulation software. It is the most basic communication software outside of LAN.It enables a computer to function as a simple input and output device for sending messages to or receiving messages from the host computer.

7. How can a file server be used in a student computer lab? What software issue
would be raised by using a file server in a student lab?

In a student lab a file server can be used to store file created by students and softwares and sharing them with ease.A software licensing issue that can be raised since some but not all licenses allow the software to be installed on a file server as long as the number of simultaneous users never exceeds the number of licenses copies.

8. What are the difference between email and instant messaging systems?

One of the main differences is that instant messaging is Real -Time communication and is based on typed text while e-mails are not and can include text, images and more.

9. Describe something you can do with email that you can not do with regular mail.

Using email you can send messages within minutes and get a quick response. You don't have to go and drop the letter at a post office.

10. Describe several potential problems associated with email and teleconferencing.

-If the recipient views an HTML-encoded message with a mail program that does not recognize HTML, the formatting doesn't appear.
-Some messages can carry web bugs and viruses
-Junk mailers can get information about you when you read their messages
-they are vulnerable to machine failure, network glitches, and security breaches
-messages can be misunderstood

13. Why is netiquette important? Give some examples of netiquette.

Netiquette is important in ensuring that others have a pleasant Internet experiences. Some examples of good network or Internet etiquettes are respecting the privacy of others, not abusing your power, and avoiding 'flamewars'.

chapter 8

social networking in plain english video

Networking and digital communication
-Artur C. clarkes prophesy: it a scientist says that some thing is possible he is right but if he says that it is not then he is wrong
-he predicted the use of geostationary communication satellites

comp network: system of 2 or more comp. linked together. helps in communication etc

LAN : comp close to each other, local,
-each comp is a node on a network

wireless network: each node has a tiny radio to connect it to the network/

MAN: link s many lans

WAN: extended over large distances
routers: hardware tat route messages as they travel between networks

GPS: global positioning system
024 satellites that go around the earth and give us info
-a network not connected to the internet

ATM: Automated teller machine: special terminal linked to banks computer
network interface card:
-adds additional serial port
-direct network connection
-controls data transfer from ram to network cable

Modem: connects computer port to phone line
transition speed is in bps )bits per second)
computer send s digital signal
modem converts the signal from digital to analog and vice versa

Broadband connection: connection with much greater bandwidth
-DSL, cable modems,high-speed wireless, satellite dishes

fiberoptic connection: better than DSL and cable modems. substitute copper wires. uses speed of light.

wire less: lightning fast connection is useless if you are away from your desk most of the time
fastest growing wireless tech is wi-fi (for lan)

blue tooth allows many device up to 30 ft can communicate with each other
-possible to create a personal area network

possibilities:
-pacemaker and calling 911
- pen scans business cards and sends info to PDA in brief case
-wrist band that gives info of accident victims to the doctor
-phone tells you sales in store for clothes your size as you walk by it

Communication softwares: establishes protocols by hardware

NOS: systems handles communication between workstations
peer to peer
Networks: share hardware ex. printer
Softwares: file servers
people : groupware

Email: send and receive messages through networking uses ASCII code
some don't always show HTML. but risk of web bugs. Mailing list help you subscribe to sites and get info in your inbox
newsgroup; get daily info. there are moderators

asyncronous communication: sender and receiver dont have to be on at the same time

IM : real-time , need to be on a t same time

computer telephony integration: link comps and phones for better

VoIP: use Internet to make voice calls. easy, less expensive
disadvantage: no 911 services, dont work in black out
-no quality guarantee


Social networking: twitter, facebook

Emails problems: spam, junk mail, security, threat to privacy, vulnerable to machine failures
cookies: can be used by snoopers to get info about you
wireless: issues of access, security, privacy

many services will be taken over by digital delivery systems
telecommunication is changing

summary:
LAN: comps are close together, have radio transmitters
WAN are more distant
Computers are connected together by the internet
most comp use Ethernet

wireless revolution is far from over.

Discussion Question #2

DQ:
Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

If you want to send to a friend you have many options to chose from. You can call the friend using the telephone. The advantage of using a telephone is that you can tell teh person exactly what you want and make sure they understand what you are telling them. It doesn' t take much time, you just pick up the phone and call. The disadvantage is that you might forget something you want to say or you might not feel comfortable calling someone.Email is another choice. It is fast but there is no guarentee that your friend saw your message. If she did recieve it there is a chance that she might nt understand what you are trying to explain especially if it is complicated. Teleconferences are helpful but they might take time. They rely of access to a computer and internet just like emails. sometime it freezes or has other glitches. Faxing is not a very good choice because it requires the other person to have a fax machine. It also take longer than just making a phone call. But if you have something like a flyier or a picture to scan to the friend it can be really useful. Overnight mail can take to much time especially if you have an important message.

Thursday, March 10, 2011

Chapter 7 4RQs #2

6) What are the advantages of personal information management softwares over paper notebook organizers? What are the disadvantages?

Personal information management software (PIM) are faster and more flexible than paper notebook organizers.It has automatic functions for notes, to-do lists, appointment calendars, and address books. It is also very organized, portable and easy to update. Its basic function is to facilitate the recording, tracking, and management of certain types of "personal information".

Some disadvantages can be related to security and usability.

7) What does it mean to sort a data file?

To sort data means to arrange records in an alphabetic or numeric order based on value in one or more fields.

8) How can a database be designed to reduce the likelihood of data entry errors?

Using relational databases and key fields can help reduce the likelihood of data entry errors. The data scrubbing/data cleansing can be done to do through a database and eliminate dirty data. But for errors not corrected by automated cleansing tools the only other option is to get it looked over by another person.

11) Why are computers important in discussions of invasion of privacy?

Computers can be used to easily invade privacy and manipulate information. Data mining techniques can be used to extract information about individuals and groups without their knowledge or consent. and database information can be easilt sold or used for purposes other than those of which it was collected for.

Wednesday, March 9, 2011

Discussion Question 3/911

DQ: What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?


A database that I have been recently using is Google. Google is something I use very often, especially when it comes to doing research. This week for TOK we had to find a famous controversial art piece and write about it. Google made it easy for me to find one and look up plenty of information related to it. Without databases like Google researching would be difficult and very time consuming, especially since there is a great availability of information on the web. I wouldn't mind looking through a few books but time is very precious especially as IB students. I am so glad that we have databases like Google to make our lives a bit easier.

Monday, March 7, 2011

Chapter 7- 4RQs

1. Define Key terms:
(pg. 224-231)
database
: a collection of info stored in an organized form in a computer
database program: the software used to organize, store, and retrieve data
table: a collection of related information
record: information related to one person, product, or event
field: A discrete chunk of info in a record
field type: the type of information a field can hold
numeric field: field that only contains numbers
date field: field that only contains date values
computed fields: displays values calculated from values in other numeric fields, might contain formulas.
browse: to search through the records of the database in search for information
query: information request
search: to look for a specific record
select: Looking for all records that match a set of criteria
import data: to receive data in the form of text files created with word processors, spreadsheets, or other database.
report: an ordered list of selected records and fields in an easy to read format
export data: to transmit necessary records and fields to word processors with mail merge capabilities
query language: language used for query which is more precise than English
SQL: Structured Query Language: A standard language supported by modern database management systems for programming complex queries.


2. What is the difference between a file manager and a database-management system? How are they similar?

A file manager is a program that allows its user to work with one file at a time. A database management system is more than that. It is system of programs that can manipulate data in a large collection of file cross referencing between files as needed. File manager is sufficient for mailing list s and other easy task but when it comes to complex jobs there really is no substitute for database management system.

They are similar because they are both used in storing data.

3. Describe a simple database.

A typical database is composed of tables. A database table is a collection of records. Each discrete chunk of information in a record is called a field. The information a field can hold is based on its field type. It can have a text field for entering text, a numeric field for entering numbers, date field for dates and computed field such as for formulas needed to calculate a specific thing.

4. What is a query? Give examples of the kinds of questions that might be answered with a query.

A query is basically an information request. It can be a simple search for a specific record. An example of a query an be anything that you might want to search using a search engine such as information about specific presidents, recipes, tech terms etc.

Thursday, January 27, 2011

Video Digitizer

Video digitizer:
"Alternatively referred to as a video digitiser, a video digitizer is software that takes an analog video still frame and coverts it to a digital still image. This is generally accomplished with the aid of computer hardware. "

def from: http://www.computerhope.com/jargon/v/videdigi.htm

CAM, CAD, & CIM

CAD:(Computer-Aided Design) :
-software is used for majority of three-dimensional designing.
-quicker and more accurate than by hand
-objects created by it can be moved, resized, and rotated instantly.

CAM: (computer-aided manufacturing)
- Program that controls the manufacturing of parts

CIM : (computer integrated manufactureing): combination of both CAD &CAM

What does the digital photo management software do?

Is simplifies and automates common tasks associated with capturing, organizing, editing and sharing digital images

Definitions 2

 Pixels: tiny dots of white, black, or color that make up images on the screen

 Palette: the given set of colors. The colors you can chose from

 Color depth: number of bits devoted to each pixel

 Resolution: the density of the pixels

Definitions

Graphics: images, what is displayed on the screen
Digital media: Basically any type of electronic media
Multimedia: integration of multiple forms of media

Thursday, January 20, 2011

2nd Phase

Project 2nd Phase Due on Jan 28th!!!!!!!!!!!

ITGS Project

PowerPoint presentation due on Jan. 7th, 2011. Presentations will be on fridays