Friday, April 29, 2011
Wednesday, April 27, 2011
Discussion Questions
Is the Turing test a valid test of intelligence? Why or why not?
Although some people may consider it to be a test of intelligence, I do not. Because, a turing test tests the response of the computer rather than the users response on the computer.
Although some people may consider it to be a test of intelligence, I do not. Because, a turing test tests the response of the computer rather than the users response on the computer.
List several mental tasks that people do better than computers.
- full dialogue
- understanding different languages
- planning
- Mental math
- processing
- synthesiszing
- searching
- natural, physical, mental, and technical
Tuesday, April 26, 2011
Chapter 15 Is Artificial Intelligence Real?
- In what sense is AI a "moving frontier"? Although there are several difficulties that AI researchers face trying to produce truly intelligent machine, many experts believe that people will eventually create artificial beings that are more intelligent than their creators.
- What is a knowledge base? What is an expert system? How are the two related? A Knowledge base contains facts and a system for determining and changing the relationships among those facts. Expert systems are programs designed to replicate the decision-making process of human experts. It also includes a knowledge base.
- What distinguishes a robot from a desktop computer?A robot is a computer-controlled machine that performs specific manual tasks and does human jobs.
- What kind of hardware is necessary for a robot to be self-correcting so it can modify its actions based on outside feedback? Robots need output peripherals for manipulating their environment as and input sensors that let them perform self-correcting actions.
- Why did early machine translation programs fail to produce the desired results? They failed because they did not know the translation
- Describe some techniques used in game-playing software, and explain how they can be applied to other AI applications.
- Heuristics
- Machine learning
- Pattern recognition
- Searching
- In what ways are the techniques of optical character recognition similar to those of speech recognition programs? Optical character recognition's techniques are similar to those of speech recognition programs because they both convert text into images.
- What are some of the problems that make machine vision so challenging? Some problems come up with masses of irrelevant data, objects that partially cover objects, and more.
Friday, April 15, 2011
Discussion Question 4/15
You are planning on starting your own business selling clothes. Discuss pros and cons for starting an e-business.
Pros:
-having an e-business is what will help keep you updated with your customers
-it is easier for your customers to purchase items
-also, you will save a lot of money because you won't need to rent out place and pay for anything in that facillity
-it is great for networking
-it is convenient for your staff
Cons:
-sometimes, if you do not market your business enough or at all, you may not get that much business
-you may face difficulty with how items are being sold
-you won't be able to develope a good relationship with your customers
-it may be tough to have all the inventory online
-packaging and shipping may become an issue: any errors will affect you and your customers
Pros:
-having an e-business is what will help keep you updated with your customers
-it is easier for your customers to purchase items
-also, you will save a lot of money because you won't need to rent out place and pay for anything in that facillity
-it is great for networking
-it is convenient for your staff
Cons:
-sometimes, if you do not market your business enough or at all, you may not get that much business
-you may face difficulty with how items are being sold
-you won't be able to develope a good relationship with your customers
-it may be tough to have all the inventory online
-packaging and shipping may become an issue: any errors will affect you and your customers
Wednesday, April 13, 2011
Chapter 13 Electronic Commerce and E-Business Part One and Two Review Questions
- Is e-commerce possible without the Internet? Explain your answer.
- E-commerce is definitely possible without the Internet. E-commerce is commerce that happens electronically. For example,buying something through phone.
- What are the purposes of intranet? What are the main characteristics of an intranet?
- The purpose of intranet is to to keep businesses more paperless and their employees more productive. It's characteristics consist of a Transmission Control Protocol/Internet Protocol and the Hypertext Transfer Protocol.
- What are three important ways companies use intranets?
- delivering tools and applications (like in telconferencing)
- to increase sales and customer relationship management tools
- develop project management
- What is the purpose of extranet? What are the main characteristics of an extranet?
- To provide a private network between two organizations/companies, that only they can get into. Only two groups can know the IP address.
- List the capabilities e-commerce software should provide
- E-commerce should allow users to access their banking accounts, recent purchases, and more.
- Define or describe each of the key terms in the "Key Terms" section. Check your answers using the glossary.
- business-to-consumer: E-commerce transactions that involve businesses providing goods or services to consumers.
- business-to-business: E-commerce transactions that involve businesses providing goods or services to other businesses
- business-to-employee: Another name for the B2B model when the focus is primarily on handling the activities that take place within the organization.
- consumer-to-consumer: The e-commerce model which represents individuals, organizations, or companies that are selling and buying directly with each other via the Internet.
- customer relationship management (CRM): Software systems for organizing and tracking information on customers.
- dot-com: Internet-based companies.
- electronic commerce (e-commerce): Business transactions through electronic networks.
- electronic payment system: An online credit card transaction in which a trusted third party transfers funds from one person or business to another, thereby concealing the credit card information of the buyer from the seller.
- e-commerce software: Programs on a Web server that provide the commercial services to consumers and business partners on the Web site.
- extranet: extended intranet
- inranet: A self-contained intraorganizational network that is designed using the same technology as the Internet.
- mobile commerce (m-commerce): Mobile commerce, in which workers use laptops and wireless handheld devices to take their offices with them wherever they travel.
- virtual private network (VPN): A network that uses encryption software to create secure “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.
- Web hosting service: A service that provides the e-commerce software and expertise to run an online business
- Describe some ethical issues involved in electronic commerce.
- With electronic commerce, users could be worried about how reliable the software is. Also, they could be worried abut whether or not their intellectual property is at risk.
- Describe the three forms of e-commerce.
- mobile commerce
- Business to Busines commerce
- Business to Employee commerce
Discussion Question 4/13
If someone discovers a cure for the common cold, I believe that they should keep it a secret, because the common cold is not neccessarily life-threatening. In fact, everybody gets it- it is a regular thing. If it was a cure for Cancer, then definetly yes, they should tell everyone about it. But, with the cold, it is just something that comes and goes, it is not that big of a deal. And, workers will benefit more than people who get the cold. Because, common cold is temporary, jobs are not supposed to be. That's why people usually react negatively to advances in technology, and because their not always sure whether or not the technology will work and how it will it will effect people.
Monday, April 11, 2011
Chapter 12 Information Systems in Business Review Questions Part One
- What are the types of information workers in our information economy?
- There are many types of information workers in our information economy are:
- Blogging
- Content Managers
- Social Media Consultants
- What are the components of the value chain model?
- Control
- Processing
- Input
- Output
- What is the purpose of a transaction processing system?
- The purpose of a transaction processing system is that it can help an organization process and manage transactions in a short amount of time, especially in a transaction heavy environment which creates efficiency in the environment.
- What are the functions and roles of a manager in an organization?
- The functions and roles of a manager in an organization is to manage people and resources and to help achieve the company's goals and objectives.
Thursday, April 7, 2011
- What is de-skilling? What is up-skilling? Give examples of each. De-skilling is basically when a job is automated and is transformed so that it requires less skill. Up-skilling is where jobs that are upscaled by automation.
- Describe several ways people use home computers.There are many ways people use home computers. For example, imagine a student who is working on a research paper and they need to get some information about a historical event. They can do so by using their home computer and going on history websites. Also, they can use their home computer to type and publish the paper. Another example can be that a da is travelling for work purposes and misses his family, his family can use their home computer and web chat with him.
- Describe how multimedia can be used by teachers and students in the classroom. Give examples. Multimedia is a great complementary tool for teaching in the classroom. Because students, especially children, learn best through exploration and invention. With multimedia, such as games, help students to explore artificial environments , whether imaginary or real.
- How is home entertainment being changed by computer technology and telecommunication.Through computer technology and telecommunication, home entertainment has changed a lot. Especially in regards to how usable it is. Anybody can easily make an account on a vidro conferencing website, such as Skype and if they have a webcam connected to their computer, which nowadays all computers have.
Wednesday, April 6, 2011
Chapter 11 Class Work Discussion Questions
- Do computers increase or decrease efficiency? Explain.
- I believe that computers increase efficiency, especially in the work place. Computers do several jobs, whether small or big, that save other workers time. Such as collecting and organizing files for certain clients. Or, computers are a great source of communication. That is, in the work place, using computers are great for communicating with customers and clients. Thus, saving workers time and money, and in the end creating a better company
- What are some fears generated by the use of tech/computers in the work place?
- Some isssues arise with using certain computers and technology in the workplace, especially in regards to reliability. With computers, there are chances that they loose all information after a power shortage. Or, loose all neccessary software for the company. Another fear could be that some workers are not familiar with certain technology and computers that they cannot continue and progress in their job.
- List 3 jobs/skills that have become obsolete in the 21st century and 3 jobs/skills that have taken their place.
- One job is an elevator operator. Elevator operators are no longer needed because they in of the "collective operation" systems we have now, an elevator can answer peoples commands and requests.
- Another job is an Iceman, who in the olden times would provide people with iceboxes that were stocked with iced to keep food cold. Now, we have electric refridgerators, and no longer need icemen.
- Another job is a file clerk, who use to organize files for a company. But now, there are computers that have files stored on them.
Tuesday, April 5, 2011
Chapter 11 "Computers at work, school, and home" Review Questions Part One
- What are major components of the modern automated factory?
- Today's modern automated factory uses computers at every level of operation. Computer-aided design and manufacturing, robots, automated assembly lines, and automated warehouses all work together to produce factories that don't need that many workers.
- How has the evolution of the automated office paralleled to the evolution of the computer?
- In the past, office automation centered on mainframes that were run by highly trained technicians. Today's office is more likely to use networked PCs and workstations for decentralized enterprise computing.
- What kind of an education does a student need to prepare for living and working in the information age?
- In the information age students expect to change jobs several times, but they should be prepared for an ever-changing world by getting familiar with technological familiarity, literacy, mathematics, culture, communication, problem solving, and ability to to learn and adjust to new things.
- What are smart cards, and how are they used?
- A smart card is a plastic medium sized card , with an embedded microchip that can be loaded with data. Smart cards contain a lot of information and can be programmed for different applications. Some of them have certain programming and data to support several applications. They can be made to be inserted into a slot and read by a specific reader.
Wednesday, March 30, 2011
Requirements: What do we need for a laptop? (IT System) by Sara M., Neda Awwad, and Mona Seddeek
There are some basic requirements that one needs with a laptop. For example, a charger, headphones, Wi-Fi and password, permission (from school), a wireless mouse (for easier/better use), pre-loaded software, such as Microsoft Word or Adobe Photoshop/ Dreamweaver. In addition, a flash player, USB, speakers, specified place, and possibly projector. Lastly, with using a laptop, a local area network is required.
Tuesday, March 29, 2011
Chapter 10- Computer Security and Risks Parts One and Two Review Questions
- Why is it hard to determine the extent of computer crime? It is hard to the extent of computer crime because there are several issues that users come across. Such as, false identities, lack of available systems that can help trace the identity of the perpatrator. Also, the crime us also usually found out after a long time, due to loss of evidence. Also, laws are not clear either.
- What is the most common computer crime? Who commits it? What is being done to stop it? One of the most common computer crime is software piracy, which is a violation of intellectual property laws. Software piracy is usually committed by millions of people, often unknowingly.Because of the rise of computer crimes, especcialy piracy, computer organizations have developed a number of computer security techniques to protext their system and data.
- What are intellectual property laws, and how do they apply to software? Intellectual property laws include the results of intellectual activities in the arts, science, and industry.
- Describe several different computer security techniques, and explain the purpose of each. Some security techniques, such as keys and bades, are desifned to restrict physical access to computers. Other examples are passwords, encryption, shielding, and audit-control software.
- Describe the typical computer criminal. How does he or she differ from the media stereotype?The most typical computer criminal is a trusted employee with personal or financial problems an knowledge of a conputer system. This is different from the media's belief that computer crimes are comitted by young, bright computer wizzards, called hackers.
- In what ways can computer security protect the Privacy of individuals? In what ways can computer security threaten the privacy of individuals? Computer security can protect the Privacy of individuals through anti-virus software. It can also threaten the privacy of individuals through the trade-offs between computer secuirity and freedom. Also, bugs and hardware glitches are issues.
- Every afternoon at closing time, the First Taxpayer's Bank copies all the day's accumalated transaction information from disk to take. Why? The bank does so to prevent any possible stealing or hacking of the money. Also, by removing the information from disk to take, there are less chances for loss of information incase of computer system or machine breakdowns.
- What are the two inherent characteristics of computers that make security so difficult? One characteristic is the fact that some computers nowadays hide potential for errors and deception under an impressive user interface. Another characteristic is that although several computers nowadays have security, absolute security is not possible.
Wednesday, March 23, 2011
Top-Level Domains
- (.edu) Educational sites
- .com) Commercial sites
- (.gov) Government services
- (.mil) Military sites
- (.net) Network administration sites
- (.org) Nonprofit organizations
- (.aero) Air transport organizations
- (.biz) Business
- (.coop) Cooperative business such as credit unions
- (.info) Information services
- (.museum) Museums
- (.name) Personal registration by name
- (.pro) Licensed professionals
Monday, March 21, 2011
Chapter 9 Review Questions- Parts One and Two
- Why is is hard to determine how big the Internet is today? Give reasons. I think it is really hard to determine how big the internet is because the internet is so big and it is expanding. Even more, the Internet's users are also increasing.
2. 3-Why are TCP/IP protocols so important to the functioning of the internet? What do they do? TCP and IP are networking protocols that are important to the functionality of the internet because they are basically what the internet is built on.
3. How does the type of Internet connection influence the things you can do on the Internet? The type of Internet connection that one has influences and affects many things one can do on the Internet. For example, an Internet user who uses DSL connection will have a very hard time downloading and viewing photos, attachments, documents, etc. Anything on the Internet that involves the use of images, pictures, ads and more take a while to load and use.
4. 4- How does push technology differ from standard web page delivery techniques? How is it used? Push technology is a style of Internet-based communication where the request for a given transaction is initiated by the publisher or central server. Whereas, standard Web page delivery techniques are where request for the transmission of information is started by the receiver or client.
5. 5- What do email addresses and URLs have in common? Although email addresses and URLs have several differences, there are a few things that they have in common. Such as the fact that they both must be typed correctly and precisely. If there is just one incorrect character, neither will work properly. Also, both email addresses and URLs require the use of internet, otherwise, neither of them has value.
6. 6- Briefly describe several software tools that can be used to develop Web pages. There are several software tools for developing Web pages available nowadays. For example, Firebug is a web development tool that is browser-based and is used for debugging, analyzing, and testing web pages. Another example is the IBM Page Detailer, which is a simple tool that lets one visualize web components as they’re being downloaded. Another example is DBMonster, which is an open-source application that helps users with tune database structures and table indexes, also helps them conduct tests under high database load to determine performance.
7. 7-Why is file compression important on the Internet? File compression is a great capability where files are made to take up less room on a hard disk. On the internet file compression is really helpful. For instance, let's say you have a large amount of files that are on your computer, which you are making available to people on the internet to access and download. With file compression, you can reduce the amount of space each file takes, and in the end, double the size of your hard drive.
8. 8- Define key terms listed in glossary
· application service provider (ASP)- A company that manages and delivers application services on a contract basis.
· application server- A common type of Internet server that stores PC office applications, databases, or other applications and makes them available to client programs that request them.
· broadband connection- An Internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections.
· cable modems- A type of broadband Internet connection that uses the same network of coaxial cables that delivers TV signals.
· Cookie- Small files deposited on a user’s hard disk by Web sites, enabling sites to remember what they know about their visitors between sessions.
· Cyberspace- A term used to describe the Internet and other online networks, especially the artificial realities and virtual communities that form on them. First coined by William Gibson in his novel, Neuromancer.
· data-driven- Web site A Web site that can display dynamic, changeable content without having constantly redesigned pages, due to an evolving database that separates the site’s content from its design.
· digital cash- A system for purchasing goods and services on the Internet without using credit cards.
· digital divide- A term that describes the divide between the people who do and do not have access to the Internet.
· dynamic HTML- A relatively new version of HTML that supports formatting and layout features that aren’t supported in standard HTML.
· email server- A specialized server that acts like a local post office for a particular Internet host.
· XM- a simplified version of SGML that can be used, especially on the world Wide web, to create a tagging scheme that allows elements of a document to be marked according to their content rather than their format.
· file server- In a LAN, a computer used as a storehouse for software and data that are shared by several users.
· file transfer protocol (FTP)- A communications protocol that enables users to download files from remote servers to their computers and to upload files they want to share from their computers to these archives.
· filtering software- Software that, for the most part, keeps offensive and otherwise inappropriate Web content from being viewed by children, on-duty workers, and others.
· grid computing- A form of distributed computing in which not files, but processing power is shared between networked computers.
· Hypertext- An interactive cross-referenced system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.
· Internet2- An alternative Internet-style network that provides faster network communications for universities and research institutions.
· Internet service provider (ISP)- A business that provides its customers with connections to the Internet along with other services.
· Internetworking- Connecting different types of networks and computer systems.
· Java A- platform-neutral, object-oriented programming language developed by Sun Microsystems for use on multiplatform networks.
· JavaScript- An interpreted scripting language, similar to but otherwise unrelated to Java, that enables Web page designers to add scripts to HTML code.
· narrowband connections -Dial-up Internet connections; named because they don’t offer much bandwidth when compared to other types of connections.
· National Information Infrastructure -A state-of-the-art command center created to fight the growing threat of system sabotage. The center includes representatives of various intelligence agencies (the departments of defense, transportation, energy, and treasury), and representatives of several major corporations.
· open standards Standards not owned by any company.
· packet-switching- -The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination, where they are reunited.
· plug-in -A software extension that adds new features.
· portal -A Web site designed as a Web entry station, offering quick and easy access to a variety of services.
· pull technology- Technology in which browsers on client computers pull information from server machines. The browser needs to initiate a request before any information is delivered.
· push technology- Technology in which information is delivered automatically to a client computer. The user subscribes to a service and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
· RSS (Really Simple Syndication)- An XML-based format for sharing data with aggregators, commonly used by bloggers.
Wednesday, March 16, 2011
Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.
With using a telephone: Whoever it is that you call, will be able to hear your voice, and have a complete conversation with you: making sure that no information is left out. Unfortunetly, sometimes people do not answer their phone, which can stop you from telling them the important information.
With email, any one with internet access can contact anyone (who has an email). With using emails, proximity can be an issue.
Real-time teleconference is a great solution for when you need to be face-to-face with somebody, but really can't be because of issues with location, and more. A set back of real-time conferencing is that it is very possible for users to have issues with connection.
With fax: Anyone can send hard copies of any information to whoever. The only thing is that sometimes, faxes do not go through and if they do the information they sent may not be clear.
Wi
With using a telephone: Whoever it is that you call, will be able to hear your voice, and have a complete conversation with you: making sure that no information is left out. Unfortunetly, sometimes people do not answer their phone, which can stop you from telling them the important information.
With email, any one with internet access can contact anyone (who has an email). With using emails, proximity can be an issue.
Real-time teleconference is a great solution for when you need to be face-to-face with somebody, but really can't be because of issues with location, and more. A set back of real-time conferencing is that it is very possible for users to have issues with connection.
With fax: Anyone can send hard copies of any information to whoever. The only thing is that sometimes, faxes do not go through and if they do the information they sent may not be clear.
Wi
Monday, March 14, 2011
RQS for Mon the 14th
1- true or false- Today virtually all computer networks are general-purpose networkz connected to the internet? false
2- describe atleast two differrent kinds of communication software:
One: skype: users can use video communicating to speak to anyone around the world in a virtual "face-to-face" way.
Two:Apple iPhone 4 Facetimeallows for any iPhone4 users, under wireless network, to ralk on the phone and see eachother through a web-camera
3- true or false- the standard Pc serial Port is being phased out and replaced by a standard parallel port. True
4- true or false- the most common types of networks today use a standard networking architecture known as Ethernet. True
2- describe atleast two differrent kinds of communication software:
One: skype: users can use video communicating to speak to anyone around the world in a virtual "face-to-face" way.
Two:Apple iPhone 4 Facetimeallows for any iPhone4 users, under wireless network, to ralk on the phone and see eachother through a web-camera
3- true or false- the standard Pc serial Port is being phased out and replaced by a standard parallel port. True
4- true or false- the most common types of networks today use a standard networking architecture known as Ethernet. True
Wednesday, March 9, 2011
Discussion Question
DQ: What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?
I do several things every week that involve using a database, whether directly or indirectly. As for this week, there were two databases that I used to help me do my homework and other things. One of them was definetly Google: I use the Google database at least once or twice a day, if not more. The second was is Wikepedia, which I do not use all the time, but very often.
If, for the past week, I used or had absolutely no databases, the situation would be MUCH different. Doing my homework would take a lot longer than usual, seeing as I'd have to go through several dictionaries, information sources, and books to get the information I needed. Let's just say, I would have a really hard time doing things in less than a minute.
I do several things every week that involve using a database, whether directly or indirectly. As for this week, there were two databases that I used to help me do my homework and other things. One of them was definetly Google: I use the Google database at least once or twice a day, if not more. The second was is Wikepedia, which I do not use all the time, but very often.
If, for the past week, I used or had absolutely no databases, the situation would be MUCH different. Doing my homework would take a lot longer than usual, seeing as I'd have to go through several dictionaries, information sources, and books to get the information I needed. Let's just say, I would have a really hard time doing things in less than a minute.
Monday, March 7, 2011
224-232 Reading Questions/Answers
FYI: I didn't have to do this week's RQ's because I was presenting, but I did four questions any way.
1- Who are the creators of Google?
1- Who are the creators of Google?
- Sergey Brin and Larry Page
- File Manager: computer program that provides a user interface to work with file systems.
- A file manager lets do many things with files: create, open, edit, view, print, play, rename, move, copy, delete, and more.
- Database-management: creation, maintenance, and use of a database
- Both a file manager and database-management help you create and edit (and more).
- A query is a form of questioning
- The structure of a simple database:
- A database is a collection of information that is stored in well-defined tables, or matrices.
- The rows are used to describe are used to describe similar items. These rows are also called "database records"
- The columns provide properties of the records.
Friday, February 11, 2011
Chapter 7- Database Applications and Privacy Implications
Database- collection of info organized in a fashion, making it easy to retrieve and reference or a collection of information stored on a computer disk.
Unique Identifier- combination between two fields.
Database Software: application software, designed to maintain databases.
Computer Databases come with many advantages that include an easier way to store large quantities of information, to retrieve information quickly, and organize information.
Database Program: a software tool for organizing the storage and retrieval of information.
Geogrpahical Info sustems:
Personal information manager
Automates
Handheld Computers
File manager:
Database management system:
DBMS can be used interactively, or can be controlled directly by other programs.
What makes a database relational?
To miost users a relational database program is one that allows tables to be related to each other.
To computer scientists, the term relational database has a technical definition related to the underlying structure of the date and the rule specifying how that data can be manipilated.
- We use several databases in our everyday life, eventhough we don't know it.
Unique Identifier- combination between two fields.
- Databases help with analyze small pieces of information in little of time, helps share knowlege.
- Google is a search engine for web pages, shopping, research, and pretty much anything!!
Database Software: application software, designed to maintain databases.
Computer Databases come with many advantages that include an easier way to store large quantities of information, to retrieve information quickly, and organize information.
Database Program: a software tool for organizing the storage and retrieval of information.
- Databases are usually composed of one or more tables, a collection of related information, and a collection of records.
- A record is the information relating to one person, product or event
- What a field can hold is determined by its field type or data type.
- Database programs provide you with more than one way to view data. These include:
- Form Views:
- Line Views:
- Import: recieve data in the form of text files
- Browse: navigate through info
- Query: find records that match specific criteria
- Print reports, labels and form letters: a report is an ordered list of selected records and fields in an easy- to-read format.
Most modern database management programs support a standard language for programming complex quieries called SQL. Which is available for many database management systems, programmers and users dont need to learn new languages when they work with new systems.
- The graphical user interfaces allow point-and-check queries that insulate users from the complexities of the query language.
Geogrpahical Info sustems:
Personal information manager
Automates
Handheld Computers
File manager:
Database management system:
DBMS can be used interactively, or can be controlled directly by other programs.
What makes a database relational?
To miost users a relational database program is one that allows tables to be related to each other.
To computer scientists, the term relational database has a technical definition related to the underlying structure of the date and the rule specifying how that data can be manipilated.
Wednesday, January 12, 2011
Chapter 6- Graphics, Digital Media, and Multimedia
- Tim Berners-Lee:- invented World Wide Web and is the head of W3C.
- Bit mapped Graphics is the representation of graphic images as bit maps by hardware and software.
- Painting Software: in which pixels are painted on a screen with a pointing device.
- stores image at 300 at dots per inch of higher
- translates pointer movements into lines and patterns on the screen.
- Resolution: the density of the pixels.
- Pixels: little dots of white, black, or color that make images on screen.
- Palette: the given set of options of colors to choose from.
- Color depth: the number of bits to each pixel.
- Image Processing is a process where photos are edit through the computer.
- makes it possible to manipulate and combine photos, it's realistic.
- Digital photo management software make it easy to and automate normal tasks that have to do with capturing, recognizing,editing, and sharing digital images.
- also simplifies and automates regular tasks that have to do with capturing, recognizing, editing, and sharing digital images.
-Audio digitizer- captures Object-oriented drawing gives you many advantages. Such as creating printed graphs, charts and illustrations and clearer line and shapes.
- Engineers, designers, and architects to create designs on screens for productis randing from computer chips to public buildings
- The testing of product prototypes
- The use of cheaper, faster, and more accurate techniques.
What is the difference between CAD-CAM-CIM?
Presentation graphics help automate the creation of visual aids for lectures, training, sales demonstrations, and more. And, creates slide shows directly on computer monitors or LCD projectors, including still images, animation, and video clips.- remember your goal
- keep it simple
- be smart with art
- outline your ideas
- use a consistent design
- keep each side focused
- be stingy with words
- remember your audience
- Signals are displayed on the computer's screen in real time- at the same time they are created or imported.
- can be copied, edited, stored, and played back without any loss of quality
- will soon replace analog video for most applications.
- "Alternatively referred to as a video digitiser, a video digitizer is software that takes an analog video still frame and coverts it to a digital still image. This is generally accomplished with the aid of computer hardware."
**explain diagram**
- Don't: steal or over-compress
- Do: Understand streaming and downloading, know your file formats.
WAV.AIFF
MP3
WMA
AAC
OGG
Sequencing software turns a computer into a musical composing, recording, and editing machine.
Hypermedia combines text, numbers, graphics, animation, sound effects, music, and other media in hyperlinked documents.
Hypermedia is useful for on-line help files and for letting users jump between documents all over the internet.Hypermedia documents can be confusing and leave readers wondering what they've missed.
A combination of text, graphics, animation, video, music, voice, and sound effects that allows the user to take an active part in the experience
Requirements: high-quality color monitors, fast processors, large memory, CD-ROM drives, speakers, and sound cards.
In addition, multimedia authoring involves programming objects on the screen to react or behave in particular ways under particular circumstances.
Be consistent in visual appearance
Use graphical metaphors to guide viewers
Keep the screen clean and uncluttered
Include multimedia elements to enliven the presentation
Focus on the message
Give the user control
Test your presentation with those unfamiliar with the subject
- combines virtual worlds with networking
- places mulitple participants in a virtual space
- people see representations of each other (Avatars)
- most avatars today are cartoonish, but they convey a sense of presence and emotion.
Subscribe to:
Posts (Atom)