Monday, March 28, 2011

chapter 10 4RQs

1) Define or describe each of the key terms listed in the "Key Terms" section.
  • access-control software: Software that only allows user access according to the user’s needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.
  • active badge: A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.
  • antivirus: A program designed to search for viruses, notify users when they’re found, and remove them from infected files.
  • authentication mechanisms: Computer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves.
  • authorization mechanisms: Computer network security measures that guarantee that users have permission to perform particular actions.
  • autonomous systems: Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making.
  • backup: The process of saving data—especially for data recovery. Many systems automatically back up data and software onto disks or tapes.
  • biometrics:Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.
  • computer crime:Any crime accomplished through knowledge or use of computer technology.
  • computer security:Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.
  • denial-of-service attack (DoS):A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
  • encryption:Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it’s been reconstructed with a matching key.
  • firewall:
  • hacking:Electronic trespassing and vandalism.
  • identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim’s credit cards.
  • logic bomb:A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
  • malware:Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.
  • passwords:The most common security tools used to restrict access to computer systems.
  • sabotage:A malicious attack on work, tools, or business.
  • security patch:Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS.
  • smart weapons:A missile that uses computerized guidance systems to locate its target.
  • social engineering:Slang for the use of deception to get individuals to reveal sensitive information.
  • spoofing:A process used to steal passwords online.
  • spyware:Technology that collects information from computer users without their knowledge or consent.
  • Trojan horse:A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
  • uninterruptible power supply (UPS): A hardware device that protects computers from data loss during power failures.
  • virus:Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
  • worms:Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.
2) Why is it hard to estimate the extent of computer crime?
          It is hard to estimate the extent of computer crime because it usually goes undetected and when it is detected it is not reported because businesses fear that they will get bad publicity.

3) Describe the typical computer criminal. How does he or she differ from the media stereotype?
                 The typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity like a loophole in system security.
                  But some are former employees seeking revenge and some are high-tech pranksters looking for a challenge.
4) What is the most common computer crime? Who commits it? What is being done to stop it?
                Theft is the most common form of computer crime. Students are usually the criminals in this sitruation. The FBI is working hard to stop it by arresting anyone they can get.
           

Wednesday, March 23, 2011

3rd DQ

Describe 10 different top-level domains
  1.  . edu  - Education sites
  2. .com - Commercial sites
  3. .gov - Government sites
  4. .mil - Military sites
  5. .net - Network administration sites
  6. .org - Nonprofit organizations
  7. .aero - Air transport organization
  8. .biz - Businesses
  9. .coop - Cooperative businesses such as credit unions
  10. .info - Information services

Monday, March 21, 2011

Homework: PG 302- 306 4RQ

1) why is it hard to determine how big the Internet is today? Give several reasons.
Today the Internet connects millions of computers in almost every country in the world, and costs shared by thousands of connected organizations. That is why it is hard to determine the exact size of the Internet.
2)why are TCP/IP protocols so important to the functioning of the Internet? What do they do?
TCP/IP is the heart of the Internet and is the language of the Internet. The TCP/IP connects different types of networks and comp systems and allows cross-network communication.

3)How does the type of internet connection influence the things you can do on the Internet?
Different kinds of connections allows the Internet to be slow, fast, and do different things. So depending on what your Internet is capable to do determines what you can do on the internet.
4)Explain the relationship between the client/server model and the fact that different users might experience different interfaces while accessing the same data.
Maybe it just depends if your computer is a server or a client. What it's lookin for and what it's capable of doing.

Friday, March 18, 2011

Chapter 8: Networking and Digital Communication


(Video: Social Networking in plain english)

Clarke's Law
- elderly scientist is possible he is right but if he says something is wrong he could be wrong
- GCS: satelites around the earth that can communicate with eachother

Types of Networks
network: is any system of 2 or more comps that are linked together
LAN: comps are physically close usually in the same building
wireless network: each node has a tiny radio transmitter connected to its network port.
MAN: links 2 or more LANs in a city
WAN: extends over a long distance
Routers: hardware devices or software programs that route messsages as they travel b/t networks
Mesh networks: an alternative to todays's networks rely on centralized routers

GPS (Global Positioning System)
-24 satelites that travel around the world that help determine positions.

ATM(Automated Teller Machine)
-a specialized

NIC( Network Interface)
-permits direct network connection
-controls the flow of data
-adds additional series of port to comp

Modem: a hardware device that connects a coms serial port to a telephone line

Broadband connection: a connection with much greater bandwidth than modems have

  • DSL
  • cable
  • high-speed wireless
  • satelite
-DSL and cable modems have nowherenear the bandwidth of the fiber optic cables that are replaced copper wires in the worlwide telephone network.

Wireless Newtwork Technology
WiFi
lightening-fast network

Bluetooth: type of wireless tech
--->

PAN (personal area network): a network that links varieeties of personal electronic devices so they can communicate with each other

Protocol: communication software

NOS: system handles comm among many workstations

Networks are...
  • more efficient
  • more productive
  • powerful
  • exchange data
  • cheap
- e-mail is unix space and uses ascii text
 Newsgroup:
  • notes
  • listserv mail
  • mailing list messages
asynchrones communicatiion: ppl talking dnt have to be on at the same time!

Voice mail: uses CTI (comp telephony integaration)



(Video: Is Social Networking a Fad? (Refresh))

Thursday, March 17, 2011

Homework pgs 272-285 4RQs

1) Give three general reasons for the importance of computer networking.
  1. Hardware: enable people to share comp hardware resources, reduce costs, and make it possible for more people to take better advantage of powerful comp equipment
  2. Software: enable people toshare data and software programs increasing efficiency and productivity
  3. People:enable people to work together or colloborate in ways that are otherwise difficult or impossible
2) How do the three general reasons listed in Question 1 relate specifically to LANs
     A software in an LAN can be seen when a hub broadcasts messages to all devices connected on the network ; a switch transmits data to only the destination node. People can be seen when using MAN it hhelps employees keep linked even if they're far away. A hardware can be seen in wireless network connections for small business, especially when constantly on the move.
3) How do the three general reasons listed in Question 1 relate specifically to WANs
      Software: "Data is transmitted long-distance between networks on a collection of common pathways."
      Hardware: "Mesh networks are an alternative to today's networks that rely on centralized routers."
      People: "Most WANS are private operations designed to link geographically dispersed corporate or government offices."

4) What is the difference between e-mail and instant messaging systems?
                 The difference between e-mail and IM is that email does not need both the sender and reciever to be on at the same time like IM. With an email the message just goes to an inbox that waits for you to check it but with IM it is sent directly to the person since two people have to be on for them to IM.

Wednesday, March 16, 2011

2 DQ Question

1) Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

  • Telephone: If she answers right away it is the fastest way to get your message accross.
  •  E-mail: It is the quickest way to send your message accurately since your friend does not have to try and hear you she just reads it and knows the full message
  • Real-Time conference: If the connection is good then not only can she hear you but she can also see how you feel about the message. Do you like it, hate it, is it urgent, etc.
  • Fax: The message can go right to her. But it is not the easiest option.
  • Overnight mail service: You can make the message more official for the person but your friend might get the message a bit later than she would with any of the other options.

Monday, March 14, 2011

Ch 8 Homework: pg262-272 4RQs

1) Define or describe each of the key terms listen in the "Key Terms" section. Check your answers using the glossary.
  • analog signal:a continuous wave
  • asynchronous communication: delayed communication
  • attachment: a way to send formatted word-processor docs, pics, and other multimedia files via email
  • bandwidth: the quantity of info that can be transmitted through communication medium in a given anount of time
  • bits per second: the standard unit of measure for modern speed
  • blog: (Web log) web page that carries diary-like entries or political commentaries
  • bluetooth: wireless technology that enables phones, comps, and PCs to communicate with each other regardless of operating system
  • bounce: the automatic return of an undeliverable email message to its sender
  • chat room: public real-time teleconference
  • client: ?
  • client/server model: for a local-area network a hierarchial model in which one or more comps act as dedicated servers and all the remaining comps act as clients
  • communication software: software that enables comps to interact with eachother over a phone line or other network
  • digital signal: a stream of bits
  • direct connection: a dedicated, direct connection to the internet through a LAN with the comp having its own IP address.
  • download: to copy software from an online source to a local comp
  • email:
  • Ethernet a popular networking architectrure developed in 1976 at Xerox.
  • FAQs: Posted lists of common queries and their answers
  • fiber-optic cable: high-capacity cable that uses light waves to carry info at blinding speed
  • file server: in a LAN a comp used as a storehouse for software and data that are shared by several users
  • GPS: a device that can use Global Positioning System signals to determine its location and communication that info to a person or comp
  • host system: a comp that provides services to multiiple users
  • instant message: a technology that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and file with those who are
  • Internet telephony: a comination of software and hardware technology that enables the internet to serve as a telephone network
  • Internet: a global interconnection networkd of thousands of networkd linking academic, research, govnt, and commercial instiutions, and other organizations and individuals.
  • LAN: multple personal comps connected on a network
  • mailing lists: email discussion groups on special-interest topics.
  • MMORPG: internet games that support thousands of simulatneous players, allowing them to assume roles of particular characters in shared virtual worlds
  • modem: modulator/demodulator. hardware that device that connects a comp to a telephone line
  • NIC: card that adds an additional serial port to a comp
  • network license: license for multiple copies or removing restrictions on software copying and use at a network site
  • NOS: server operating system software for a local-networking
  • newsgroup: ongoing public discussions on a particular subject consisting of notes written to a central Internet site and redistributed through a worldwide newsgroup network called Usenet
  • peer-to-peer model: a LAN model that allows every comp on the network to be both client and server
  • phishing: the use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive info.
  • port: socket that allows info to pass in and out
  • protocol: a set of rules for the exchange of data between a terminal and a comp or between 2 comps
  • real-time communication: internet communication  that enables you to communicate with other users who are logged on at the same time
  • remote access: network access via phone line TV, capable system or wireless link
  • router: programs or devices that decides how to route Internet transmissons
  • server: a comp especialy designed to provide software and other resources to other comps over a network
  • site license: license for  multiple copies or removing restrictions on software copying and use at a networking site.
  • spam: internet junk mail
  • TCP/IP: protocols developed as an experiment in internetworking now the language of the internet allowing cross-networking communication for almost every type of comp and network
  • telecommunication: long-distance electronic communication in a variety of forms
  • telephony: tech that enables comps to server as speakerphones answering machines and complete voice mail system
  • terminal emulation software: software that allows a PC to act as a dumb terminal- an input/output device that enables the user to send commands to and view info on the host comp
  • upload: to post software or docs to an online source so they're available for others
  • video teleconference: face-to-face communication over long distances using vid and comp tech
  • voice mail: a telephone-based messaging system with many of the features of an email system
  • VPN: a network that uses encryption software to create secure "tunnels" through the public Internet or b/t intranets  
  • WAN:  ?
  • Wi-Fi: a popluar wireless LAN tech that allows multiple comps to connect to LAN through a base station up to 150 feet away
  • Wiki: a Web site that lets anyone with access to a Web browser to modify its pages
  • WiMax: a wireless alternative to cable or DSL service
  • wireless access point: a communication device typically connected to a wired network that is used to create a wireles network
  • wireless network: a network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and recieve data through the air rather than through cables
2) Describe at least two different kinds of communication software.
  1. video teleconference
  2. real-time communication
3) Under what circumsances is a modem necessary for connecting computers in networks? What does the modem do?
                    A modem connects a computer to a telephone line. Two circumstances is a modem necassary are when a telephone or fax is needed


4)  How could a file server be used in a student comp lab? What software licensing issues would be raised by using a file server in a student lab?
                        Many students use the computers in the computer lab so their needs to be many files that are able to keep all the information stored. Some issues there would be are expensive, certain  amount of numbers needed.

Friday, March 11, 2011

Chapter 7 : Database Application and Privacy Implication

- Sergy Brin and Larry Page created Google
- Database: a collection of info stored on a comp disk
(Video- why use a database?)

Advantages:
  • easier to store
  • easier to retrieve
-Database program: a software tool for organizing the storage and retrieval info
-info in a field is determined by its field type and data type.
-Import: recieve data
-Browse: navigate through info
-Sort: rearrange records
-A report is an ordered list of selected records and fields and easy to access.
-SQL (structured Query Language)
- Specialiazed database: software preprogrammed for data storage and retrieval
-PIM (personal info manager): elecctronic organizer
-File manager: enables users to work with one file
-Database managemenr system: data stored in many files at a time
-Relation database: program that allows tables to be related to eachother
- a database is relational when the files are related to eachother.
 Batch processing: user accumalate transactions and input them into the comp in large batches
Real-Time: allows instant access to information
Interactive processing: has replaced batch processing for most apps

Downsizing and Decentralizing
using a client server approved

Data Mining: the discovery and exttraction of hiddesn predictive info from large databases

HTML: the language used to construct most web ages
XML a newer data description language designed w/ industrial-strength database access in mind
database strategies revolve around directories
CRM software system

make database construction usage and more flexible

Object-oriented
-easy manipulation of various type of data
-saves time by reusing objects
-associates actions with the data

Mulitmedia Databases: serve as indexes for art, photos, maps, vid clips, etc

common theme of privacy: access




Video: (Facebook- CIA profile database)
Networks make it possible for personal data to be transmittted almost anywhere instantly

Workplace monitoring tech: enables managers to learn more than ever before about the work

www.file-makers .com (more about databases)




 







Wednesday, March 9, 2011

pg 237-245 Homework 4RQs

1) Define or describe each of the key terms listen in the "Key Terms" section.
  • - batch processing: accumulating transactions and feeding them into a comp in a large batch
  • -browse:  process of finding info in a database or other data source
  • -centralized database: a database housed in a mainframe comp, accessible only to info-processing personnel
  • - client/server: client programs in desktop comps send info requests through a network to server database on mainframes, minicomps, or desktop comps. The servers process queries and send the requested data back to the client
  • -computed fields: in a database, a field containing formulas similar to spreadsheets formulas they display values calculated from values in other numeric fields
  • -data mining:  the discovery and extraction of hidden predictive info from large databases
  • -data scrubbing: the process of going through a database and eliminating records that contain errors
  • -data warehouse: an integrated collection of corporate data stored in one location
  • -database: a collection of info stored in an organized form in a comp
  • -DBMS: program or system of programs that can maipulate data in a large collection of files, cross-referencing between files as needed
  • - database program: a software tool for organizin the storage and retrieval of the info in a database
  • - dirty data: data records with spelling mistakes, incorrect values, or other errors
  • - distributited database: data strewn out across networks on several diff comps
  • exported data: transmitting records and fields from a database program to another program
  • field: each discrete chunk of info in a database record
  • file manager: program that enables users to manipulate files on their comps
  • geographical information system:  a specialized database that combines tables of data with demographic info and displays geographic data on maps
  • identfy theft: crime committed by hackers  of obtaining enough info about a person to assume his  ot her identity often as a prelude to illegally using the victim's credit cards
  • import data: to move data into a program from another program or source
  • interactive processing: interacting with data through terminalsviewing and changing values online in real time
  • object-oriented database: instead of storing records in tables and hierarchies  stores software objects that contain procedures with data
  • PIM: a specialized database prgram that automates an address/phone book an appointment calendar, a to-do list, and misc notes. electronic organizer
  • privacy: freedom from unauthorized access to ones person or to knowledge about ones person
  • query: an info request
  • query language: a pecial language for performing queries more precse that the english language
  • real time: when a comps performs tasks immediatly
  • record: in a database, the ingo relating to one erson, product or event
  • record matching: compiling profiles by combining info from diff database files by lookiing for a shared unique field
  • relational database:  a program that allows files to be related to each other so changes in one file are reflected in other files automatically.
  • report: a database printoout that is an ordered list of selected records and firlds in an easy-to-read form
  • right to privacy: freedom from interference into the private sphere of a persons affairs
  • search: looking for a specific file
  • select: looking for all records that match a set of criteria
  • sort: arrane records in alphabetic or numeric order based on values in one or more fields
  • SQL: a query languge availabe for many diff DBMSs more than a query language SQL also accesses database from a wide variety of vendors
  • table: a grid of rows and columns on many Web pgs tables with hidden frids are used to align graphical images
  • XML: extensible markup language a language that enables Web developers to control and display data the way they control text and graphiscs. Forms, database queries and otherdata-intensive operations that cant be completely constructed with standard HTML are much easier with XML
2) What steps are involved in producing a standard multicolumn business report from a database?
          1) Web application
A. Define the ODBC connection that would associate to your database.
B. You need a server side technology (i.e. ASP .Net, ColdFusion, PHP, JSP, ...etc.)
C. Create a SQL query using the syntax of the server side technology to search your database.
D. Assuming that the search resultset is not blank, you would loop through the resultset to display the report. The most convenient way would be using a table. You will have something like the followings,
<table>
<tr>
<th>Column 1</th>
<th>Column 2</th>
</tr>
<cfoutput query="myquery">
<tr>
<td>#Column_1#</td>
<td>#Column_2#</td>
</tr>
</cfoutput>
</table>

2) Desktop application
A. Create a connection to your database.
B. Query the database.
C. Build a report in advance that would layout where you want to display the data.
D. At the time when you build your report, it would be great if you can tie a display field to a column in the database.
E. In your desktop application, you would pass the resultset to this pre-defined report.
                                              Source(s):
Certified ColdFusion developer. 10+ years of web development experience
                                                                                                       (found this online)
3) In a database, a numeric field can contain only computed formulas similar to formulas in spreadsheets.
             True
 4) The most common type of database printout is called export
           False - report

1st Class Question

1) What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?
              This week I directly used a database when I used Google. My week would be very different if I did not have Google.  I needed to research an art piece for my TOK essay so I used Google to search up different art pieces throughout history and articles or critiques about them.
             Another database I used this week was Collegeboard. Collegeboard offers students a survey that will help them find the right college for them. It is called College Matchmaker. What you do is answer a list of questions and by the end it tells you which college fits your specific needs. I used this database this week to look up some college options that I have.               

Monday, March 7, 2011

Homework pgs 224-232 4RQs

1) What is the difference between a file manager and a database-managment system? How are they similar?
               Difference: The file manager only works with one file at a time while the database-management system works with more than one file.
               Similar: both store information in files

2) What is a query? Give examples of the types of questions that might be answered by a query?
         Query: an information request
                Example: information on Abraham Lincoln

3) Describe the structure of a simple database. Use the terms file, record and field.
              Database: a is a collection of records made up of fields  stored in an organized file. 

4) In a typical database, a record contains the information related to one person, product, or event.
             True

I hope I did it right!