Wednesday, April 27, 2011

Chapter 15 4RQ

1) Describe several techniques used in game-playing software and explain how they can be applied to other AI applications?
  • Searching
  • Heuristics
  • Pattern recognition
  • Machine learning
2) Why did early machine translation programs fail to produce the desired results?
The early machine translation failed because the computer did not know the translation.

3) What rules might a computer use to sort the characters shown on page 597 into As and Bs?
  1. If the engine will not turn over and the lights do not woek then check the battery.
  2. If checking the battery shows it is not dead then check the battery connectors

4) What is the relationship between syntax and semantics?Can you construct a sentence that follows the rules of English syntax but has nonsense semantics?
Syntax means "word order" and Semantics means "meaning". Word order affects meaning.
         Example: Dogs bites man. Man bites dog.

Chapter 15 DQ

1- Is the Turing test a valid test of intelligence? Why or why not?
The Turing Test is carried out by engaging a human judge in a conversation between a human and a machine. I do not believe that it tests if you are intelligent or not because the computer is a machine. It is programmed for the purpose of getting answers. If you beat the computer then OH YA your intelligent :) but if you dont its an honor just to be able to compete with a computer. It doesn't mean you are dumb or dont understand something if you dont win the competiton against the computer.

2- List several mental task that people do better than computers. List several mental tasks that computers do better than people. Can you find any general characteristics that distinguish the items of the two lists?

Brain
  • uses chemicals to transmit information
  • Memories grow by stronger synaptic connections.
  • It is much easier and faster for the brain to learn new things.
Computer
  • uses electricity
  • uses switches that are either on or off (binary)
  • memory grows by adding computer chips
  • the computer can do many complex tasks at the same time (multitasking)

Tuesday, April 26, 2011

Ch 15 4RQs

1) In what sense is AI a "moving frontier"?
If a task is easy to do for a computer many scientists believe that it is not artificial intelligence. This definition is what make it a moving frontier.

2) What distinguishes a robot from a desktop computer?
The most important hardware diffferences between a robot and other comps are the input and output peripherals. Instead of sending output to a screen or a printer a robot sends commands to joints, arms, etc.

3) What are some of the problems that make machine vision so challenging?
  • masses of irrelevant data
  • objects that partially cover objects
  • indistinct edges
  • changes in light source and shadow
  • changes in the scene as objects move
  • etc...

4) What is the knowledge base? What is an expert system? How are the two related?
Knowledge base: contains a system of rules for determing and changing the relationship among facts
Expert system: a software program designed to replicate the decision making process of a human expert
Knowledge bases lie at the heart of every expert system used in business, science, and industry.

Friday, April 15, 2011

Ch 13 DQ second one

You are planning on starting your own business selling clothes. Discuss pros and cons for starting an e-business.

Pros
- you can manage it yourself
- you are your own boss
- it is more reliable(in some ways), controled, secure, private, and you can choose who you want to access it
- increase of income
- gives your business a worldwide presence (You can service customers and collaborating with business partners from all over the world and sell your services and products to a large number of people from all over the globe.)
- buy and sell online without actually going out and talking to customers
- increases your market

Cons
- hard to start
- if you need employees to help it is very difficult to find some
- you need help from other computer tools so it is not reliable sometimes because you dont know if those tools are not reliable
-  high costs of optimization
- a dissatisfied customer can ruin your image and leave negative comments
- restricts your business to only some parts of the world

Wednesday, April 13, 2011

Ch 13 4RQ

1) What is the purpose of an extranet? What are the main characteristics of an extranet?
            An extranet extends the cross-functional activites between trusted business partners and facilitates their working relationship. Characteristics are secure private network, public network, and virtual private network (VPN).

2) List the capabilities of e-commerce software should provide.
  • Increasing the speed of B2B tranactions
  • reducing errors on intercompany
  • reducing costs of telecommunication
  • increasing the volume of business with partners
  • exchanging B2B docs
  • checking on inventory and order status from supplies
  • collaborating with business partners on joint projects
3) What are purposes of an intranet? What are the main characteristics of an inranet?
           Most intranets use Ethernet topology to cnnect physically the comps, printers, and other hardware on the network. Characteristics of an intranet are
  • Contained: Typically a network (LAN) within an organization
  • Shielded: Offers the "common language" of internet without the loss of privacy of the Internet
  • Gated: Can be connected via gateways to selected Internet content or access
  • Functional: a fully operational network for organization-wide communication, information, and interaction
4) Describe some ethical issues involved in electronic commerce.
  • a statement of the oranization's privacy policy
  • a statement that a persons permission must be secured before his or her ID, photo, ideas, or communication are used or trransmitted
  • a statement on how the company will inform customers of the intended uses of personal info gathered during an online transaction and how to secure permission from customers for those uses
  • a statement that address issues of ownership with respect to network postings and communications
  • a statement of how the company monitors user behavior on the web

CH 13 DQ

If someone discovers a cure for the common cold, should he or she hide it to protect the jobs of all
the people who work in the huge cold-medicine industry? Identify reasons why so many people react negatively to advances in technology that eliminates some jobs.

I think that if someone discovers a cure than they should spread it around. If they really care about money so much that they dont want others to get the idea then they could copyright it in some way and then sell it. People will by it and everyone gets the common cold so a lot of people will want it so they will become rich.

Some reasons why people react negatively to advanced technology are because if there is a reason for people to lose their job they wont be able to provide for their family, they wont be "rich", they will have a hard life, might lose their job, etc.

Take Home Mock Test

a) Two other physical characteristics are palm print and iris.

b) We can authenticate an identity in three ways first by something a user knows (password) second something a user has (smart card) and third something a user is (face, fingerprints). When a person puts any of these things in a system and wants to be authenticated the biometric features are re-scanned then they are matched with information in database and then it is either authenticated or rejected.

c) It is better to have biometric options for payments at retail stores than to have a signature for a credit card becuase people put their signature on almost anything now. A lot of people lose their credit cards and anyone can just find a persons signature and practice forging it. But if a retail store had people give their fingerprints or something than  that would NOT be easy to seal. Fingerprint authentication has a 99% accuaracy rate because the only way for someone to be able to steal your identity is by getting close to you and you will surely notice then or copy it from the machine but then they might get caught or more than one persons identity mixed in so that would probably not work.

d) Some concerns that people might have if biometric authentication became widespread are one identity theft if images of fingerprints are stolen than criminals can easliy use then to steal identities.Second  physical concerns for example if someones iris is exposed to a lot of technology because stores want authentication that could easily lead to eye disease. Third is privacy personal information could be sold to other organizations without the persons knowlege or consent. Fourth is integrity because since their is human input into the system mistakes could happen and the system might have some problems in it There are many more concerns but these are just a few.

Thursday, April 7, 2011

ch 11 4RQs

1) What kind of education does a student need to prepare for living and working in the info age?
  • technological famaliarity
  • literacy
  • mathematics
  • culture
  • communication
  • learning how to learn
2) Give several examples of ways that distance learning can enhance education.
  • grade school students can network with kids in all parts of the world
  • middle school students can use electron microscopes, telescopes, and other tools from around the world
  • high school students courses can be completed by modem instead of mail
  • two way ideo link allows experts to talk to students
  • teachers can recieve education without leaving their district
3) How is home entertainment being changed by comp tech and telecommunication?
     Entertainment at home now a days have changed a lot due to technology. Now instead of board games or household games people/kids used to play poeple are glued to a small device or tvs playing video games. Instead of listening to the radio people are watching tv.

4) What are smart cards, and how are they used?
   A smart card looks like a standard card but has microprocessors and memory. It records transactions by telling the software about each purchase and paid bill, when inserted into a computer.

Wednesday, April 6, 2011

ch 11 DQs

1)Do computers increase or decrease efficiency? Explain.
       Computers increase efficiency becuase they have all the facts on the internet and most of the time the information is reliable. If your boss wants you to look something up or do something you can research about it on the internet and know all about what your boss wants. It is also faster than researching through a book and because you probably have a computer at work it will help you get your word done faster.

2)What are some fears generated by the use of tech/computers in the work place?
          First that someone will be distracted. There are a lot of things on the internet and you could be tempted to go do something you like to do like for example updating your facebook page. But if you go to facebook and your boss catches you, you could, and probably will, get fired.

3)List 3 jobs/skills that have become obsolete in the 21st century and 3 jobs/skills that have taken their place.
  obselete jobs:
  1. Copy Boy
  2. Lamplighter
  3. Switchboard Operator
   modern jobs:
  1. Kinkos
  2. highway patrol (fix street lights)
  3. telephone company

Tuesday, April 5, 2011

Ch11 4RQs

1) What are the major components of the modern automated factory?
  • robots: computer controlled machines designed to perform specific tasks.
  • track inventory
  • time delivery of parts
  • control quaiity of production
  • monitor wear
  • tear on machines
  • schedule maintenance
2) Define or describe each of the key terms listed in the "Key Terms" section. Click your answers using the glssary.
  • authoring tools: Software used to create multimedia presentations.
  • automated factory: A factory that uses extensive computer systems, robots, and networks to streamline and automate many jobs.
  • automated offices: Offices that use extensive computer systems and networks to streamline information flow and automate many processes.
  • chief info officers: Along with chief technology officers (CTOs), the chief decision makers concerning enterprise computer systems and technology in a business enterprise.
  • chief tech offiicers:
  • computer aided instructions: Software programs for teaching that combine drill-and-practice software and tutorial software.
  • computer monitoring:
  • courseware: Educational software
  • de-skilled: Transformed in such a way that a job requires less skill.
  • distance education: Using computers, networks, and other technology to extend the educational process beyond the walls of a school, connecting students and faculty at remote locations.
  • distributed computing: Integrating all kinds of computers, from mainframes to PCs, into a single, seamless system.
  • drill and practice software: Teaching software based on the principles of individualized rate, small steps, and positive feedback.
  • educational simulations: Software that enables students to explore artificial environments that are imaginary or based on reality. Most have the look and feel of a game, but they challenge students to learn through exploration, experimentation, and interaction with other students.
  • edutainment: Programs geared toward home markets that combine education and entertainment.
  • electronic commerce: Business transactions through electronic networks.
  • electronic cottage: A home in which modern technology enables a person to work at home
  • electronic sweatshops: Worker warehouses where most of the work is mindless keyboarding, computer monitoring is a common practice, wages are low and working conditions poor, and repetitive stress injuries are common.
  • globalization: The creation of global businesses and markets.
  • groupware: Software designed to be used by work groups rather than individuals.
  • interactive TV: Broadcast television with built-in options for game playing or other forms of interactivity
  • intranets: A self-contained intraorganizational network that is designed using the same technology as the Internet
  • Luddits: A nineteenth-century English labor group that smashed new textile machinery to protect their jobs; today the term is often used to describe someone who opposes new technology in general
  • massively multiplayer online role-playing game: Internet games that support thousands of simultaneous players, allowing them to assume roles of particular characters in shared virtual worlds
  • narrowcasting: Providing custom newscasts and entertainment features aimed at narrow groups or individuals
  • paperless office: An office of the future in which magnetic and optical archives will replace reference books and file cabinets, electronic communication will replace letters and memos, and digital publications provided through the Internet and online services will replace newspapers and other periodicals
  • regional work centers: Shared offices established by corporations and government organizations in various locales to reduce commuting times
  • satellite office:  Workplaces that enable workers to commute to smaller offices closer to their homes
  • smart card: A card that looks like a standard credit card but features an embedded microprocessor and memory instead of a magnetic strip.
  • technophobia: The fear of technology
  • up-skilled: Transformed in such a way that a job requires more skill
3) What is de-skilling? What is up-skilling? Give examples of each
        de-skilling is to be transformed in such a way that a job requires less skill. Ex: computerized cash registers relace numbered buttons with button labels like "fries".
      up-skilling is to be transformed in such a way that a job requires more skill. Ex: many clerical jobs become more technical as offices adobt databases, spreadsheets, email systems, Internet connections, fax modems, and other computer technology.
4) Why is education critical to our future as we automate more jobs?
     Education is critical now a days becuase as more jobs are made more people are needed to work in that job. But if someone is not educated enough then they might, and probably will, not do the job correctly therefore they will actually hurt America and its economy instead of help it. We need people who are hard woking and educated to get our country back on its feet again.

Friday, April 1, 2011

Chapter 10 4RQs

1) What are intellectual property laws and how do they apply to software?
        Intellectual property law is the results of intellectual activites in the arts, science, and industry. It applies to software by helping the software be more active.
2) Describe several different types of programs that can be used for software sabotage.
  • viruses:
  • worms
  • Trojan horse
  • Spyware
  • Virus wars
3) What are two inherent characteristics of computers that make security difficult?
  1. A comp does exactly what it is programmed to do, including reveal sensitive info. Any system that can be programmed can be reprogrammed by anyone with sufficient knowledge.
  2. Any comp can do only what it is programmed to do. It cannot protect itself from either malfunctions or deliberate attacks unless such events have bee specifically anticipated thought through and countered with appropriate programming.
4) Describe several different computer security techniques, and explain the purpose of each.
  • passwords: restrict access to comp systems
  • firewalls: keep their internal networks secure while enabling communication with the rest of the Internet.
  • encryption: software to scramble transmission
  • encryption key: the message can be transmitted or stored as an indecipherable garble of characters.
  • audit-control software: monitor and record comp transactions as they happen so auditors can trace and identify suspicious comp activity

Monday, March 28, 2011

chapter 10 4RQs

1) Define or describe each of the key terms listed in the "Key Terms" section.
  • access-control software: Software that only allows user access according to the user’s needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.
  • active badge: A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.
  • antivirus: A program designed to search for viruses, notify users when they’re found, and remove them from infected files.
  • authentication mechanisms: Computer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves.
  • authorization mechanisms: Computer network security measures that guarantee that users have permission to perform particular actions.
  • autonomous systems: Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making.
  • backup: The process of saving data—especially for data recovery. Many systems automatically back up data and software onto disks or tapes.
  • biometrics:Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.
  • computer crime:Any crime accomplished through knowledge or use of computer technology.
  • computer security:Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.
  • denial-of-service attack (DoS):A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
  • encryption:Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it’s been reconstructed with a matching key.
  • firewall:
  • hacking:Electronic trespassing and vandalism.
  • identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim’s credit cards.
  • logic bomb:A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
  • malware:Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.
  • passwords:The most common security tools used to restrict access to computer systems.
  • sabotage:A malicious attack on work, tools, or business.
  • security patch:Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS.
  • smart weapons:A missile that uses computerized guidance systems to locate its target.
  • social engineering:Slang for the use of deception to get individuals to reveal sensitive information.
  • spoofing:A process used to steal passwords online.
  • spyware:Technology that collects information from computer users without their knowledge or consent.
  • Trojan horse:A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
  • uninterruptible power supply (UPS): A hardware device that protects computers from data loss during power failures.
  • virus:Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
  • worms:Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.
2) Why is it hard to estimate the extent of computer crime?
          It is hard to estimate the extent of computer crime because it usually goes undetected and when it is detected it is not reported because businesses fear that they will get bad publicity.

3) Describe the typical computer criminal. How does he or she differ from the media stereotype?
                 The typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity like a loophole in system security.
                  But some are former employees seeking revenge and some are high-tech pranksters looking for a challenge.
4) What is the most common computer crime? Who commits it? What is being done to stop it?
                Theft is the most common form of computer crime. Students are usually the criminals in this sitruation. The FBI is working hard to stop it by arresting anyone they can get.
           

Wednesday, March 23, 2011

3rd DQ

Describe 10 different top-level domains
  1.  . edu  - Education sites
  2. .com - Commercial sites
  3. .gov - Government sites
  4. .mil - Military sites
  5. .net - Network administration sites
  6. .org - Nonprofit organizations
  7. .aero - Air transport organization
  8. .biz - Businesses
  9. .coop - Cooperative businesses such as credit unions
  10. .info - Information services

Monday, March 21, 2011

Homework: PG 302- 306 4RQ

1) why is it hard to determine how big the Internet is today? Give several reasons.
Today the Internet connects millions of computers in almost every country in the world, and costs shared by thousands of connected organizations. That is why it is hard to determine the exact size of the Internet.
2)why are TCP/IP protocols so important to the functioning of the Internet? What do they do?
TCP/IP is the heart of the Internet and is the language of the Internet. The TCP/IP connects different types of networks and comp systems and allows cross-network communication.

3)How does the type of internet connection influence the things you can do on the Internet?
Different kinds of connections allows the Internet to be slow, fast, and do different things. So depending on what your Internet is capable to do determines what you can do on the internet.
4)Explain the relationship between the client/server model and the fact that different users might experience different interfaces while accessing the same data.
Maybe it just depends if your computer is a server or a client. What it's lookin for and what it's capable of doing.

Friday, March 18, 2011

Chapter 8: Networking and Digital Communication


(Video: Social Networking in plain english)

Clarke's Law
- elderly scientist is possible he is right but if he says something is wrong he could be wrong
- GCS: satelites around the earth that can communicate with eachother

Types of Networks
network: is any system of 2 or more comps that are linked together
LAN: comps are physically close usually in the same building
wireless network: each node has a tiny radio transmitter connected to its network port.
MAN: links 2 or more LANs in a city
WAN: extends over a long distance
Routers: hardware devices or software programs that route messsages as they travel b/t networks
Mesh networks: an alternative to todays's networks rely on centralized routers

GPS (Global Positioning System)
-24 satelites that travel around the world that help determine positions.

ATM(Automated Teller Machine)
-a specialized

NIC( Network Interface)
-permits direct network connection
-controls the flow of data
-adds additional series of port to comp

Modem: a hardware device that connects a coms serial port to a telephone line

Broadband connection: a connection with much greater bandwidth than modems have

  • DSL
  • cable
  • high-speed wireless
  • satelite
-DSL and cable modems have nowherenear the bandwidth of the fiber optic cables that are replaced copper wires in the worlwide telephone network.

Wireless Newtwork Technology
WiFi
lightening-fast network

Bluetooth: type of wireless tech
--->

PAN (personal area network): a network that links varieeties of personal electronic devices so they can communicate with each other

Protocol: communication software

NOS: system handles comm among many workstations

Networks are...
  • more efficient
  • more productive
  • powerful
  • exchange data
  • cheap
- e-mail is unix space and uses ascii text
 Newsgroup:
  • notes
  • listserv mail
  • mailing list messages
asynchrones communicatiion: ppl talking dnt have to be on at the same time!

Voice mail: uses CTI (comp telephony integaration)



(Video: Is Social Networking a Fad? (Refresh))

Thursday, March 17, 2011

Homework pgs 272-285 4RQs

1) Give three general reasons for the importance of computer networking.
  1. Hardware: enable people to share comp hardware resources, reduce costs, and make it possible for more people to take better advantage of powerful comp equipment
  2. Software: enable people toshare data and software programs increasing efficiency and productivity
  3. People:enable people to work together or colloborate in ways that are otherwise difficult or impossible
2) How do the three general reasons listed in Question 1 relate specifically to LANs
     A software in an LAN can be seen when a hub broadcasts messages to all devices connected on the network ; a switch transmits data to only the destination node. People can be seen when using MAN it hhelps employees keep linked even if they're far away. A hardware can be seen in wireless network connections for small business, especially when constantly on the move.
3) How do the three general reasons listed in Question 1 relate specifically to WANs
      Software: "Data is transmitted long-distance between networks on a collection of common pathways."
      Hardware: "Mesh networks are an alternative to today's networks that rely on centralized routers."
      People: "Most WANS are private operations designed to link geographically dispersed corporate or government offices."

4) What is the difference between e-mail and instant messaging systems?
                 The difference between e-mail and IM is that email does not need both the sender and reciever to be on at the same time like IM. With an email the message just goes to an inbox that waits for you to check it but with IM it is sent directly to the person since two people have to be on for them to IM.

Wednesday, March 16, 2011

2 DQ Question

1) Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

  • Telephone: If she answers right away it is the fastest way to get your message accross.
  •  E-mail: It is the quickest way to send your message accurately since your friend does not have to try and hear you she just reads it and knows the full message
  • Real-Time conference: If the connection is good then not only can she hear you but she can also see how you feel about the message. Do you like it, hate it, is it urgent, etc.
  • Fax: The message can go right to her. But it is not the easiest option.
  • Overnight mail service: You can make the message more official for the person but your friend might get the message a bit later than she would with any of the other options.

Monday, March 14, 2011

Ch 8 Homework: pg262-272 4RQs

1) Define or describe each of the key terms listen in the "Key Terms" section. Check your answers using the glossary.
  • analog signal:a continuous wave
  • asynchronous communication: delayed communication
  • attachment: a way to send formatted word-processor docs, pics, and other multimedia files via email
  • bandwidth: the quantity of info that can be transmitted through communication medium in a given anount of time
  • bits per second: the standard unit of measure for modern speed
  • blog: (Web log) web page that carries diary-like entries or political commentaries
  • bluetooth: wireless technology that enables phones, comps, and PCs to communicate with each other regardless of operating system
  • bounce: the automatic return of an undeliverable email message to its sender
  • chat room: public real-time teleconference
  • client: ?
  • client/server model: for a local-area network a hierarchial model in which one or more comps act as dedicated servers and all the remaining comps act as clients
  • communication software: software that enables comps to interact with eachother over a phone line or other network
  • digital signal: a stream of bits
  • direct connection: a dedicated, direct connection to the internet through a LAN with the comp having its own IP address.
  • download: to copy software from an online source to a local comp
  • email:
  • Ethernet a popular networking architectrure developed in 1976 at Xerox.
  • FAQs: Posted lists of common queries and their answers
  • fiber-optic cable: high-capacity cable that uses light waves to carry info at blinding speed
  • file server: in a LAN a comp used as a storehouse for software and data that are shared by several users
  • GPS: a device that can use Global Positioning System signals to determine its location and communication that info to a person or comp
  • host system: a comp that provides services to multiiple users
  • instant message: a technology that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and file with those who are
  • Internet telephony: a comination of software and hardware technology that enables the internet to serve as a telephone network
  • Internet: a global interconnection networkd of thousands of networkd linking academic, research, govnt, and commercial instiutions, and other organizations and individuals.
  • LAN: multple personal comps connected on a network
  • mailing lists: email discussion groups on special-interest topics.
  • MMORPG: internet games that support thousands of simulatneous players, allowing them to assume roles of particular characters in shared virtual worlds
  • modem: modulator/demodulator. hardware that device that connects a comp to a telephone line
  • NIC: card that adds an additional serial port to a comp
  • network license: license for multiple copies or removing restrictions on software copying and use at a network site
  • NOS: server operating system software for a local-networking
  • newsgroup: ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup network called Usenet
  • peer-to-peer model: a LAN model that allows every comp on the network to be both client and server
  • phishing: the use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive info.
  • port: socket that allows info to pass in and out
  • protocol: a set of rules for the exchange of data between a terminal and a comp or between 2 comps
  • real-time communication: internet communication  that enables you to communicate with other users who are logged on at the same time
  • remote access: network access via phone line TV, capable system or wireless link
  • router: programs or devices that decides how to route Internet transmissons
  • server: a comp especialy designed to provide software and other resources to other comps over a network
  • site license: license for  multiple copies or removing restrictions on software copying and use at a networking site.
  • spam: internet junk mail
  • TCP/IP: protocols developed as an experiment in internetworking now the language of the internet allowing cross-networking communication for almost every type of comp and network
  • telecommunication: long-distance electronic communication in a variety of forms
  • telephony: tech that enables comps to server as speakerphones answering machines and complete voice mail system
  • terminal emulation software: software that allows a PC to act as a dumb terminal- an input/output device that enables the user to send commands to and view info on the host comp
  • upload: to post software or docs to an online source so they're available for others
  • video teleconference: face-to-face communication over long distances using vid and comp tech
  • voice mail: a telephone-based messaging system with many of the features of an email system
  • VPN: a network that uses encryption software to create secure "tunnels" through the public Internet or b/t intranets  
  • WAN:  ?
  • Wi-Fi: a popluar wireless LAN tech that allows multiple comps to connect to LAN through a base station up to 150 feet away
  • Wiki: a Web site that lets anyone with access to a Web browser to modify its pages
  • WiMax: a wireless alternative to cable or DSL service
  • wireless access point: a communication device typically connected to a wired network that is used to create a wireles network
  • wireless network: a network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and recieve data through the air rather than through cables
2) Describe at least two different kinds of communication software.
  1. video teleconference
  2. real-time communication
3) Under what circumsances is a modem necessary for connecting computers in networks? What does the modem do?
                    A modem connects a computer to a telephone line. Two circumstances is a modem necassary are when a telephone or fax is needed


4)  How could a file server be used in a student comp lab? What software licensing issues would be raised by using a file server in a student lab?
                        Many students use the computers in the computer lab so their needs to be many files that are able to keep all the information stored. Some issues there would be are expensive, certain  amount of numbers needed.

Friday, March 11, 2011

Chapter 7 : Database Application and Privacy Implication

- Sergy Brin and Larry Page created Google
- Database: a collection of info stored on a comp disk
(Video- why use a database?)

Advantages:
  • easier to store
  • easier to retrieve
-Database program: a software tool for organizing the storage and retrieval info
-info in a field is determined by its field type and data type.
-Import: recieve data
-Browse: navigate through info
-Sort: rearrange records
-A report is an ordered list of selected records and fields and easy to access.
-SQL (structured Query Language)
- Specialiazed database: software preprogrammed for data storage and retrieval
-PIM (personal info manager): elecctronic organizer
-File manager: enables users to work with one file
-Database managemenr system: data stored in many files at a time
-Relation database: program that allows tables to be related to eachother
- a database is relational when the files are related to eachother.
 Batch processing: user accumalate transactions and input them into the comp in large batches
Real-Time: allows instant access to information
Interactive processing: has replaced batch processing for most apps

Downsizing and Decentralizing
using a client server approved

Data Mining: the discovery and exttraction of hiddesn predictive info from large databases

HTML: the language used to construct most web ages
XML a newer data description language designed w/ industrial-strength database access in mind
database strategies revolve around directories
CRM software system

make database construction usage and more flexible

Object-oriented
-easy manipulation of various type of data
-saves time by reusing objects
-associates actions with the data

Mulitmedia Databases: serve as indexes for art, photos, maps, vid clips, etc

common theme of privacy: access




Video: (Facebook- CIA profile database)
Networks make it possible for personal data to be transmittted almost anywhere instantly

Workplace monitoring tech: enables managers to learn more than ever before about the work

www.file-makers .com (more about databases)




 







Wednesday, March 9, 2011

pg 237-245 Homework 4RQs

1) Define or describe each of the key terms listen in the "Key Terms" section.
  • - batch processing: accumulating transactions and feeding them into a comp in a large batch
  • -browse:  process of finding info in a database or other data source
  • -centralized database: a database housed in a mainframe comp, accessible only to info-processing personnel
  • - client/server: client programs in desktop comps send info requests through a network to server database on mainframes, minicomps, or desktop comps. The servers process queries and send the requested data back to the client
  • -computed fields: in a database, a field containing formulas similar to spreadsheets formulas they display values calculated from values in other numeric fields
  • -data mining:  the discovery and extraction of hidden predictive info from large databases
  • -data scrubbing: the process of going through a database and eliminating records that contain errors
  • -data warehouse: an integrated collection of corporate data stored in one location
  • -database: a collection of info stored in an organized form in a comp
  • -DBMS: program or system of programs that can maipulate data in a large collection of files, cross-referencing between files as needed
  • - database program: a software tool for organizin the storage and retrieval of the info in a database
  • - dirty data: data records with spelling mistakes, incorrect values, or other errors
  • - distributited database: data strewn out across networks on several diff comps
  • exported data: transmitting records and fields from a database program to another program
  • field: each discrete chunk of info in a database record
  • file manager: program that enables users to manipulate files on their comps
  • geographical information system:  a specialized database that combines tables of data with demographic info and displays geographic data on maps
  • identfy theft: crime committed by hackers  of obtaining enough info about a person to assume his  ot her identity often as a prelude to illegally using the victim's credit cards
  • import data: to move data into a program from another program or source
  • interactive processing: interacting with data through terminalsviewing and changing values online in real time
  • object-oriented database: instead of storing records in tables and hierarchies  stores software objects that contain procedures with data
  • PIM: a specialized database prgram that automates an address/phone book an appointment calendar, a to-do list, and misc notes. electronic organizer
  • privacy: freedom from unauthorized access to ones person or to knowledge about ones person
  • query: an info request
  • query language: a pecial language for performing queries more precse that the english language
  • real time: when a comps performs tasks immediatly
  • record: in a database, the ingo relating to one erson, product or event
  • record matching: compiling profiles by combining info from diff database files by lookiing for a shared unique field
  • relational database:  a program that allows files to be related to each other so changes in one file are reflected in other files automatically.
  • report: a database printoout that is an ordered list of selected records and firlds in an easy-to-read form
  • right to privacy: freedom from interference into the private sphere of a persons affairs
  • search: looking for a specific file
  • select: looking for all records that match a set of criteria
  • sort: arrane records in alphabetic or numeric order based on values in one or more fields
  • SQL: a query languge availabe for many diff DBMSs more than a query language SQL also accesses database from a wide variety of vendors
  • table: a grid of rows and columns on many Web pgs tables with hidden frids are used to align graphical images
  • XML: extensible markup language a language that enables Web developers to control and display data the way they control text and graphiscs. Forms, database queries and otherdata-intensive operations that cant be completely constructed with standard HTML are much easier with XML
2) What steps are involved in producing a standard multicolumn business report from a database?
          1) Web application
A. Define the ODBC connection that would associate to your database.
B. You need a server side technology (i.e. ASP .Net, ColdFusion, PHP, JSP, ...etc.)
C. Create a SQL query using the syntax of the server side technology to search your database.
D. Assuming that the search resultset is not blank, you would loop through the resultset to display the report. The most convenient way would be using a table. You will have something like the followings,
<table>
<tr>
<th>Column 1</th>
<th>Column 2</th>
</tr>
<cfoutput query="myquery">
<tr>
<td>#Column_1#</td>
<td>#Column_2#</td>
</tr>
</cfoutput>
</table>

2) Desktop application
A. Create a connection to your database.
B. Query the database.
C. Build a report in advance that would layout where you want to display the data.
D. At the time when you build your report, it would be great if you can tie a display field to a column in the database.
E. In your desktop application, you would pass the resultset to this pre-defined report.
                                              Source(s):
Certified ColdFusion developer. 10+ years of web development experience
                                                                                                       (found this online)
3) In a database, a numeric field can contain only computed formulas similar to formulas in spreadsheets.
             True
 4) The most common type of database printout is called export
           False - report

1st Class Question

1) What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?
              This week I directly used a database when I used Google. My week would be very different if I did not have Google.  I needed to research an art piece for my TOK essay so I used Google to search up different art pieces throughout history and articles or critiques about them.
             Another database I used this week was Collegeboard. Collegeboard offers students a survey that will help them find the right college for them. It is called College Matchmaker. What you do is answer a list of questions and by the end it tells you which college fits your specific needs. I used this database this week to look up some college options that I have.               

Monday, March 7, 2011

Homework pgs 224-232 4RQs

1) What is the difference between a file manager and a database-managment system? How are they similar?
               Difference: The file manager only works with one file at a time while the database-management system works with more than one file.
               Similar: both store information in files

2) What is a query? Give examples of the types of questions that might be answered by a query?
         Query: an information request
                Example: information on Abraham Lincoln

3) Describe the structure of a simple database. Use the terms file, record and field.
              Database: a is a collection of records made up of fields  stored in an organized file. 

4) In a typical database, a record contains the information related to one person, product, or event.
             True

I hope I did it right!

Wednesday, February 2, 2011

Chapter 6 Graphics, Digital Media, and Multimedia

What is the difference between and def of graphics, digiital media, and multimedia?
- graphics: computer generated image on screen froming a game or film
- digital media: electronic media that work on digital codes
- multimedia: software that combines graphics, audio, and images to make a presentation

Define: bitmapped graphics
- a data structure representing pixels via a monitor

Define: pixels, color depth, resolution
- pixel: small discrete component in an image
- color depth: number of bits used to represent the color  of a single pixel in a bitmapped image
- resolution: electron density

What does the digital photo management software do?
- source for all the latest digital-photo software

Define object oriented or vector graphics?
- used for images that require smooth edges

define and find the diff b/t cam,cim,cad?
- CAM (Content-addressable memory): a special type of computer memory used in certain very high speed searching applications.
- CIM:Computer Integrated Manufacturing.
- CAD(Computer-aided design): the use of computer technology for the design of objects, real or virtual.

What is an interactive multimedia?
- Interactive Multimedia:  related items of information are connected and can be presented together
Tim Berners-Lee Weaves the web for Everybody
  • born in london (1955)
  • wanted to create an openended distributed hypertext system
  • invented WWW
  • now works at MIT
  • leads the WWW Consortium (W3C)
Painting: Bitmapped Graphics
  • paints pixels on the screen with a pointing device
  • poiner movements are translated into lines and patterns on the screen
  • stores an image at 300 dots per inch (or higher)
Pixels:tiny dots of white, black, or color that make up images on the screen
Palette: group of tools that mimic real-world painting tools
    -also contains other tools that are unique to comps
Bitmapped Graphic ( Raster Graphics): pics that show how the pixels are mapped on the screen'
Color Depth: the # of bits devoted to each pixel
Resolution: the density of the pixels

Image Processing
  • Allows the user to manipulate photos and images with tools
Ex: Abode Photoshop
  • Far more powerful than traditional photo-reducing techniques
-can distort and compbine photos as shown in the tabloids
-can create fabricated images that dont show that it has been tampered with

-Digital photo management software programs (apple, iphoto, and Microsoft Pictureit) simplify common tasks associated with capturing, orgainizing, editing, and sharing digital images.

-Drawing software stores a pic as a collection of lines and shapes (called object-oriented/vector graphics)
-Memory demands on storage are not as high as for bitmapped images.
-many drawing toold-line, shape, and text tolls- are similar to painting tools in bitmapped programs.

PostScript: a standard pg-description languge for describing text elements on the printied pg
-used by professional drawing programs
-built into high-end output devices so those devices can follow PostScript instructions
-

Bitmapped painiting
  • more control over textures shading and fine detail
  • apprpriate for screen display simulating natural paint media and embellishing photos
Object- oriented drawings


-some integrated programs contain both drawing and painitng modules
     allows you to choose the right tool for each job
-some programs merge features of both in a single app
   -blurs the distinction b/t types
   - offers new possibillites for amateur and professional illustrations

Computerr Aided Design (CAD) software:
-This allows engineers designers and architetures to create designs on screen for products ranging from comp chips to public buildings
-test products prototypes
-cheaper faster and more accurate than traditional design-by-had techniques

Comp Aided Manufacturing
the process when data related to the product design are fed into a program that controls the manufacturing of parts

Comp Integrated Manufacturing
refers to the combination of CAD and CAM and is a major step toward a fully automated factory.

Presentation Graphics: Bringing Lectures to Life

  • automates the creation of visual aids for lectures and presentations
  • creates slideshows directly on comp monitors or LCD projs including still images animation and video clips.
Making Powerful Presentations
  • remember your goal
  • remember audience
  • outline your ideas
  • be stingy with words
  • keep it simple
  • use consistent design
  • be smart with art
  • keep each slide focused
  • tell them what your going to tell them then tell them then tell them what you told them :)
Dynamic Media Beyond the Printing Page
  • media contais dynamic info which is info that changes over time or in response to user input
  • each frame of comp-based animation is a comp-drawn pic the comp displays these frames in rapid succession
  • Tweening: instead of drawing each frame by hand the animator can create key frames and objects and use software to help fill in the gaps
Desktop Video: Computers, Film, and TV
analog and digital video
-a video digitizer can convret analog video signals from a tv broadcast

Many video digitizers can import signals from tv, videotapes, cameras, and others
-signals are displayed on the comps screens= in real time at the same time they're created or imported
Digital video cameras capture footage in digital form
digital cideo can be copied, edited, stored, and played back w/o any loss of quality
Digital video will soon replace analog video for most apps

Today most video editing is done using nonlinear editing tech
Video editing software: makes it easy to eliminate extraneous footage, combine clips from takes, and other activites
Morphs: video clips in which one image morphs into another
Data Compression: software and hardware are used to squeeze data out of movies so that they can be stored in smaller spaces

The Synthetic Musician: Computers and Audio
Audio digitizer: captures sound and stores it as a data file
Synthesizer: electronic instrument that synthesizes sound using math formulas
MIDI: (musical instrument digital interface): standard interface that allows electronic instruments and comps to communicate w/ each other.


Dynamic Media: Beyond the Printed Page
Music is digitized on CDs at a high sampling rate and bit depth-high enough that it is hard to tell the diff b/t the original analog sound and the


Digital Audio Do's and Don'ts
  • dont steal
  • understand streaming and downloading
  • know your ile formats
  • don't over- compress
chart thing here

Samplers, Sytnthesizers, and Sequencers: Digital Audio and MIDI
Multimedia comps can control a variety of electronic musical instruments and sound sources using MIDI
MIDI commands can be integrated by a variety of
-Music synthesizers
-Samplers

Dynamic Media: Beyond the Printed Page
A piano style keyboard that sends MIDI signals to the comp
-comp interprets the MIDI commands using sequencing software
Sequenceing software turns a comp into a musical composin, recording, and editing machine
Electronica: musical designed from the ground up w/ digital tech
-some of the most interesting sequenced music
EX:

Hypertext and Hypermedia
Hypertext: refers to info linked in non-sequential ways
Hypermedia: combines text, #s, graphics, animation, sound effects, music, and other media in hyperlinked docs
-useful for on-line help files
-lets the user jump b/t docs all over the internet

Interactive Multimedia: what is it?
- a combination of

Multimedia Authoring: Making Mixed Media
-uses authoring programs such as HyperSudio and MetaCard
-binds source docs together to communicate w/ users in a pleasing way

Making Interactive Multimedia work
  • be consistent visually
  • use graphical metaphors to guide viewrs
  • keep screen clean
  • include multimedia elements to enliven the presentation
  • fous on message
  • give the user control
  • test your presnentation w/ those unfamiliar w/ the subject
Inventing the Future: Shared Virtual Spaces
Virtual reality: combines virtual worlds w/ networking
  • it places multiple participants in a virtual space
  • people see representation of each other, sometimes called avatars
  • Most avatars
Tele-immersion:
  • uses cameras and networks to create a videoconferencing environment in which multiple remote users can






+