Wednesday, April 27, 2011

Chapter 15 4RQ

1) Describe several techniques used in game-playing software and explain how they can be applied to other AI applications?
  • Searching
  • Heuristics
  • Pattern recognition
  • Machine learning
2) Why did early machine translation programs fail to produce the desired results?
The early machine translation failed because the computer did not know the translation.

3) What rules might a computer use to sort the characters shown on page 597 into As and Bs?
  1. If the engine will not turn over and the lights do not woek then check the battery.
  2. If checking the battery shows it is not dead then check the battery connectors

4) What is the relationship between syntax and semantics?Can you construct a sentence that follows the rules of English syntax but has nonsense semantics?
Syntax means "word order" and Semantics means "meaning". Word order affects meaning.
         Example: Dogs bites man. Man bites dog.

Chapter 15 DQ

1- Is the Turing test a valid test of intelligence? Why or why not?
The Turing Test is carried out by engaging a human judge in a conversation between a human and a machine. I do not believe that it tests if you are intelligent or not because the computer is a machine. It is programmed for the purpose of getting answers. If you beat the computer then OH YA your intelligent :) but if you dont its an honor just to be able to compete with a computer. It doesn't mean you are dumb or dont understand something if you dont win the competiton against the computer.

2- List several mental task that people do better than computers. List several mental tasks that computers do better than people. Can you find any general characteristics that distinguish the items of the two lists?

Brain
  • uses chemicals to transmit information
  • Memories grow by stronger synaptic connections.
  • It is much easier and faster for the brain to learn new things.
Computer
  • uses electricity
  • uses switches that are either on or off (binary)
  • memory grows by adding computer chips
  • the computer can do many complex tasks at the same time (multitasking)

Tuesday, April 26, 2011

Ch 15 4RQs

1) In what sense is AI a "moving frontier"?
If a task is easy to do for a computer many scientists believe that it is not artificial intelligence. This definition is what make it a moving frontier.

2) What distinguishes a robot from a desktop computer?
The most important hardware diffferences between a robot and other comps are the input and output peripherals. Instead of sending output to a screen or a printer a robot sends commands to joints, arms, etc.

3) What are some of the problems that make machine vision so challenging?
  • masses of irrelevant data
  • objects that partially cover objects
  • indistinct edges
  • changes in light source and shadow
  • changes in the scene as objects move
  • etc...

4) What is the knowledge base? What is an expert system? How are the two related?
Knowledge base: contains a system of rules for determing and changing the relationship among facts
Expert system: a software program designed to replicate the decision making process of a human expert
Knowledge bases lie at the heart of every expert system used in business, science, and industry.

Friday, April 15, 2011

Ch 13 DQ second one

You are planning on starting your own business selling clothes. Discuss pros and cons for starting an e-business.

Pros
- you can manage it yourself
- you are your own boss
- it is more reliable(in some ways), controled, secure, private, and you can choose who you want to access it
- increase of income
- gives your business a worldwide presence (You can service customers and collaborating with business partners from all over the world and sell your services and products to a large number of people from all over the globe.)
- buy and sell online without actually going out and talking to customers
- increases your market

Cons
- hard to start
- if you need employees to help it is very difficult to find some
- you need help from other computer tools so it is not reliable sometimes because you dont know if those tools are not reliable
-  high costs of optimization
- a dissatisfied customer can ruin your image and leave negative comments
- restricts your business to only some parts of the world

Wednesday, April 13, 2011

Ch 13 4RQ

1) What is the purpose of an extranet? What are the main characteristics of an extranet?
            An extranet extends the cross-functional activites between trusted business partners and facilitates their working relationship. Characteristics are secure private network, public network, and virtual private network (VPN).

2) List the capabilities of e-commerce software should provide.
  • Increasing the speed of B2B tranactions
  • reducing errors on intercompany
  • reducing costs of telecommunication
  • increasing the volume of business with partners
  • exchanging B2B docs
  • checking on inventory and order status from supplies
  • collaborating with business partners on joint projects
3) What are purposes of an intranet? What are the main characteristics of an inranet?
           Most intranets use Ethernet topology to cnnect physically the comps, printers, and other hardware on the network. Characteristics of an intranet are
  • Contained: Typically a network (LAN) within an organization
  • Shielded: Offers the "common language" of internet without the loss of privacy of the Internet
  • Gated: Can be connected via gateways to selected Internet content or access
  • Functional: a fully operational network for organization-wide communication, information, and interaction
4) Describe some ethical issues involved in electronic commerce.
  • a statement of the oranization's privacy policy
  • a statement that a persons permission must be secured before his or her ID, photo, ideas, or communication are used or trransmitted
  • a statement on how the company will inform customers of the intended uses of personal info gathered during an online transaction and how to secure permission from customers for those uses
  • a statement that address issues of ownership with respect to network postings and communications
  • a statement of how the company monitors user behavior on the web

CH 13 DQ

If someone discovers a cure for the common cold, should he or she hide it to protect the jobs of all
the people who work in the huge cold-medicine industry? Identify reasons why so many people react negatively to advances in technology that eliminates some jobs.

I think that if someone discovers a cure than they should spread it around. If they really care about money so much that they dont want others to get the idea then they could copyright it in some way and then sell it. People will by it and everyone gets the common cold so a lot of people will want it so they will become rich.

Some reasons why people react negatively to advanced technology are because if there is a reason for people to lose their job they wont be able to provide for their family, they wont be "rich", they will have a hard life, might lose their job, etc.

Take Home Mock Test

a) Two other physical characteristics are palm print and iris.

b) We can authenticate an identity in three ways first by something a user knows (password) second something a user has (smart card) and third something a user is (face, fingerprints). When a person puts any of these things in a system and wants to be authenticated the biometric features are re-scanned then they are matched with information in database and then it is either authenticated or rejected.

c) It is better to have biometric options for payments at retail stores than to have a signature for a credit card becuase people put their signature on almost anything now. A lot of people lose their credit cards and anyone can just find a persons signature and practice forging it. But if a retail store had people give their fingerprints or something than  that would NOT be easy to seal. Fingerprint authentication has a 99% accuaracy rate because the only way for someone to be able to steal your identity is by getting close to you and you will surely notice then or copy it from the machine but then they might get caught or more than one persons identity mixed in so that would probably not work.

d) Some concerns that people might have if biometric authentication became widespread are one identity theft if images of fingerprints are stolen than criminals can easliy use then to steal identities.Second  physical concerns for example if someones iris is exposed to a lot of technology because stores want authentication that could easily lead to eye disease. Third is privacy personal information could be sold to other organizations without the persons knowlege or consent. Fourth is integrity because since their is human input into the system mistakes could happen and the system might have some problems in it There are many more concerns but these are just a few.

Thursday, April 7, 2011

ch 11 4RQs

1) What kind of education does a student need to prepare for living and working in the info age?
  • technological famaliarity
  • literacy
  • mathematics
  • culture
  • communication
  • learning how to learn
2) Give several examples of ways that distance learning can enhance education.
  • grade school students can network with kids in all parts of the world
  • middle school students can use electron microscopes, telescopes, and other tools from around the world
  • high school students courses can be completed by modem instead of mail
  • two way ideo link allows experts to talk to students
  • teachers can recieve education without leaving their district
3) How is home entertainment being changed by comp tech and telecommunication?
     Entertainment at home now a days have changed a lot due to technology. Now instead of board games or household games people/kids used to play poeple are glued to a small device or tvs playing video games. Instead of listening to the radio people are watching tv.

4) What are smart cards, and how are they used?
   A smart card looks like a standard card but has microprocessors and memory. It records transactions by telling the software about each purchase and paid bill, when inserted into a computer.

Wednesday, April 6, 2011

ch 11 DQs

1)Do computers increase or decrease efficiency? Explain.
       Computers increase efficiency becuase they have all the facts on the internet and most of the time the information is reliable. If your boss wants you to look something up or do something you can research about it on the internet and know all about what your boss wants. It is also faster than researching through a book and because you probably have a computer at work it will help you get your word done faster.

2)What are some fears generated by the use of tech/computers in the work place?
          First that someone will be distracted. There are a lot of things on the internet and you could be tempted to go do something you like to do like for example updating your facebook page. But if you go to facebook and your boss catches you, you could, and probably will, get fired.

3)List 3 jobs/skills that have become obsolete in the 21st century and 3 jobs/skills that have taken their place.
  obselete jobs:
  1. Copy Boy
  2. Lamplighter
  3. Switchboard Operator
   modern jobs:
  1. Kinkos
  2. highway patrol (fix street lights)
  3. telephone company

Tuesday, April 5, 2011

Ch11 4RQs

1) What are the major components of the modern automated factory?
  • robots: computer controlled machines designed to perform specific tasks.
  • track inventory
  • time delivery of parts
  • control quaiity of production
  • monitor wear
  • tear on machines
  • schedule maintenance
2) Define or describe each of the key terms listed in the "Key Terms" section. Click your answers using the glssary.
  • authoring tools: Software used to create multimedia presentations.
  • automated factory: A factory that uses extensive computer systems, robots, and networks to streamline and automate many jobs.
  • automated offices: Offices that use extensive computer systems and networks to streamline information flow and automate many processes.
  • chief info officers: Along with chief technology officers (CTOs), the chief decision makers concerning enterprise computer systems and technology in a business enterprise.
  • chief tech offiicers:
  • computer aided instructions: Software programs for teaching that combine drill-and-practice software and tutorial software.
  • computer monitoring:
  • courseware: Educational software
  • de-skilled: Transformed in such a way that a job requires less skill.
  • distance education: Using computers, networks, and other technology to extend the educational process beyond the walls of a school, connecting students and faculty at remote locations.
  • distributed computing: Integrating all kinds of computers, from mainframes to PCs, into a single, seamless system.
  • drill and practice software: Teaching software based on the principles of individualized rate, small steps, and positive feedback.
  • educational simulations: Software that enables students to explore artificial environments that are imaginary or based on reality. Most have the look and feel of a game, but they challenge students to learn through exploration, experimentation, and interaction with other students.
  • edutainment: Programs geared toward home markets that combine education and entertainment.
  • electronic commerce: Business transactions through electronic networks.
  • electronic cottage: A home in which modern technology enables a person to work at home
  • electronic sweatshops: Worker warehouses where most of the work is mindless keyboarding, computer monitoring is a common practice, wages are low and working conditions poor, and repetitive stress injuries are common.
  • globalization: The creation of global businesses and markets.
  • groupware: Software designed to be used by work groups rather than individuals.
  • interactive TV: Broadcast television with built-in options for game playing or other forms of interactivity
  • intranets: A self-contained intraorganizational network that is designed using the same technology as the Internet
  • Luddits: A nineteenth-century English labor group that smashed new textile machinery to protect their jobs; today the term is often used to describe someone who opposes new technology in general
  • massively multiplayer online role-playing game: Internet games that support thousands of simultaneous players, allowing them to assume roles of particular characters in shared virtual worlds
  • narrowcasting: Providing custom newscasts and entertainment features aimed at narrow groups or individuals
  • paperless office: An office of the future in which magnetic and optical archives will replace reference books and file cabinets, electronic communication will replace letters and memos, and digital publications provided through the Internet and online services will replace newspapers and other periodicals
  • regional work centers: Shared offices established by corporations and government organizations in various locales to reduce commuting times
  • satellite office:  Workplaces that enable workers to commute to smaller offices closer to their homes
  • smart card: A card that looks like a standard credit card but features an embedded microprocessor and memory instead of a magnetic strip.
  • technophobia: The fear of technology
  • up-skilled: Transformed in such a way that a job requires more skill
3) What is de-skilling? What is up-skilling? Give examples of each
        de-skilling is to be transformed in such a way that a job requires less skill. Ex: computerized cash registers relace numbered buttons with button labels like "fries".
      up-skilling is to be transformed in such a way that a job requires more skill. Ex: many clerical jobs become more technical as offices adobt databases, spreadsheets, email systems, Internet connections, fax modems, and other computer technology.
4) Why is education critical to our future as we automate more jobs?
     Education is critical now a days becuase as more jobs are made more people are needed to work in that job. But if someone is not educated enough then they might, and probably will, not do the job correctly therefore they will actually hurt America and its economy instead of help it. We need people who are hard woking and educated to get our country back on its feet again.

Friday, April 1, 2011

Chapter 10 4RQs

1) What are intellectual property laws and how do they apply to software?
        Intellectual property law is the results of intellectual activites in the arts, science, and industry. It applies to software by helping the software be more active.
2) Describe several different types of programs that can be used for software sabotage.
  • viruses:
  • worms
  • Trojan horse
  • Spyware
  • Virus wars
3) What are two inherent characteristics of computers that make security difficult?
  1. A comp does exactly what it is programmed to do, including reveal sensitive info. Any system that can be programmed can be reprogrammed by anyone with sufficient knowledge.
  2. Any comp can do only what it is programmed to do. It cannot protect itself from either malfunctions or deliberate attacks unless such events have bee specifically anticipated thought through and countered with appropriate programming.
4) Describe several different computer security techniques, and explain the purpose of each.
  • passwords: restrict access to comp systems
  • firewalls: keep their internal networks secure while enabling communication with the rest of the Internet.
  • encryption: software to scramble transmission
  • encryption key: the message can be transmitted or stored as an indecipherable garble of characters.
  • audit-control software: monitor and record comp transactions as they happen so auditors can trace and identify suspicious comp activity