Wednesday, March 30, 2011

Requirements: What do we need for a laptop? (IT System) by Sara M., Neda Awwad, and Mona Seddeek

There are some basic requirements that one needs with a laptop. For example, a charger, headphones, Wi-Fi and password, permission (from school), a wireless mouse (for easier/better use), pre-loaded software, such as Microsoft Word or Adobe Photoshop/ Dreamweaver. In addition, a flash player, USB, speakers, specified place, and possibly projector. Lastly, with using a laptop, a local area network is required.

Tuesday, March 29, 2011

Chapter 10- Computer Security and Risks Parts One and Two Review Questions

  1. Why is it hard to determine the extent of computer crime? It is hard to the extent of computer crime because there are several issues that users come across. Such as, false identities, lack of available systems that can help trace the identity of the perpatrator. Also, the crime us also usually found out after a long time, due to loss of evidence. Also, laws are not clear either.
  2. What is the most common computer crime? Who commits it? What is being done to stop it? One of the most common computer crime is software piracy, which is a violation of intellectual property laws. Software piracy is usually committed by millions of people, often unknowingly.Because of the rise of computer crimes, especcialy piracy, computer organizations have developed a number of computer security techniques to protext their system and data.
  3. What are intellectual property laws, and how do they apply to software? Intellectual property laws include the results of intellectual activities in the arts, science, and industry.
  4. Describe several different computer security techniques, and explain the purpose of each. Some security techniques, such as keys and bades, are desifned to restrict physical access to computers. Other examples are passwords, encryption, shielding, and audit-control software.
  5. Describe the typical computer criminal. How does he or she differ from the media stereotype?The most typical computer criminal is a trusted employee with personal or financial problems an knowledge of a conputer system. This is different from the media's belief that computer crimes are comitted by young, bright computer wizzards, called hackers.
  6. In what ways can computer security protect the Privacy of individuals? In what ways can computer security threaten the privacy of individuals? Computer security can protect the Privacy of individuals through anti-virus software. It can also threaten the privacy of individuals through the trade-offs between computer secuirity and freedom. Also, bugs and hardware glitches are issues.
  7. Every afternoon at closing time, the First Taxpayer's Bank copies all the day's accumalated transaction information from disk to take. Why? The bank does so to prevent any possible stealing or hacking of the money. Also, by removing the information from disk to take, there are less chances for loss of information incase of computer system or machine breakdowns.
  8. What are the two inherent characteristics of computers that make security so difficult? One characteristic is the fact that some computers nowadays hide potential for errors and deception under an impressive user interface. Another characteristic is that although several computers nowadays have security, absolute security is not possible. 

Wednesday, March 23, 2011

Top-Level Domains

  1. (.edu) Educational sites
  2. .com)  Commercial sites
  3. (.gov) Government services
  4. (.mil) Military sites
  5. (.net) Network administration sites
  6. (.org) Nonprofit organizations
  7. (.aero) Air transport organizations
  8. (.biz) Business
  9. (.coop) Cooperative business such as credit unions
  10. (.info) Information services
  11. (.museum) Museums
  12. (.name) Personal registration by name
  13. (.pro) Licensed professionals

Monday, March 21, 2011

Chapter 9 Review Questions- Parts One and Two

  1. Why is is hard to determine how big the Internet is today? Give reasons. I think it is really hard to determine how big the internet is because the internet is so big and it is expanding. Even more, the Internet's users are also increasing.
2.      3-Why are TCP/IP protocols so important to the functioning of the internet? What do they do? TCP and IP are networking protocols that are important to the functionality of the internet because they are basically what the internet is built on. 
3.      How does the type of Internet connection influence the things you can do on the Internet? The type of Internet connection that one has influences and affects many things one can do on the Internet. For example, an Internet user who uses DSL connection will have a very hard time downloading and viewing photos, attachments, documents, etc. Anything on the Internet that involves the use of images, pictures, ads and more take a while to load and use.
4.      4- How does push technology differ from standard web page delivery techniques? How is it used? Push technology is a style of Internet-based communication where the request for a given transaction is initiated by the publisher or central server. Whereas, standard Web page delivery techniques are where request for the transmission of information is started by the receiver or client.
5.   5-   What do email addresses and URLs have in common? Although email addresses and URLs have several differences, there are a few things that they have in common. Such as the fact that they both must be typed correctly and precisely. If there is just one incorrect character, neither will work properly. Also, both email addresses and URLs require the use of internet, otherwise, neither of them has value. 
6.    6-  Briefly describe several software tools that can be used to develop Web pages. There are several software tools for developing Web pages available nowadays. For example, Firebug is a web development tool that is browser-based and is used for debugging, analyzing, and testing web pages. Another example is the IBM Page Detailer, which is a simple tool that lets one visualize web components as they’re being downloaded. Another example is DBMonster, which is an open-source application that helps users with tune database structures and table indexes, also helps them conduct tests under high database load to determine performance.

7.      7-Why is file compression important on the Internet? File compression is a great capability where files are made to take up less room on a hard disk. On the internet file compression is really helpful. For instance, let's say you have a large amount of files that are on your computer, which you are making available to people on the internet to access and download. With file compression, you can  reduce the amount of space each file takes, and in the end, double the size of your hard drive.
8.     8- Define key terms listed in glossary
·         application service provider (ASP)- A company that manages and delivers application services on a contract basis.  
·         application server- A common type of Internet server that stores PC office applications, databases, or other applications and makes them available to client programs that request them. 
·         broadband connection- An Internet connection such as DSL or cable modem that offers higher bandwidth, and therefore faster transmission speed, than standard modem connections. 
·         cable modems- A type of broadband Internet connection that uses the same network of coaxial cables that delivers TV signals. 
·         Cookie- Small files deposited on a user’s hard disk by Web sites, enabling sites to remember what they know about their visitors between sessions. 
·         Cyberspace- A term used to describe the Internet and other online networks, especially the artificial realities and virtual communities that form on them. First coined by William Gibson in his novel, Neuromancer
·         data-driven- Web site A Web site that can display dynamic, changeable content without having constantly redesigned pages, due to an evolving database that separates the site’s content from its design. 
·         digital cash- A system for purchasing goods and services on the Internet without using credit cards. 
·         digital divide- A term that describes the divide between the people who do and do not have access to the Internet. 
·         dynamic HTML- A relatively new version of HTML that supports formatting and layout features that aren’t supported in standard HTML.
·         email server- A specialized server that acts like a local post office for a particular Internet host. 
·         XM- a simplified version of SGML that can be used, especially on the world Wide web, to create a tagging scheme that allows elements of a document to be marked according to their content rather than their format. 
·         file server- In a LAN, a computer used as a storehouse for software and data that are shared by several users.
·         file transfer protocol (FTP)- A communications protocol that enables users to download files from remote servers to their computers and to upload files they want to share from their computers to these archives. 
·         filtering software- Software that, for the most part, keeps offensive and otherwise inappropriate Web content from being viewed by children, on-duty workers, and others.
·         grid computing- A form of distributed computing in which not files, but processing power is shared between networked computers. 
·         Hypertext- An interactive cross-referenced system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.  
·         Internet2- An alternative Internet-style network that provides faster network communications for universities and research institutions.  
·         Internet service provider (ISP)- A business that provides its customers with connections to the Internet along with other services. 
·         Internetworking- Connecting different types of networks and computer systems. 
·         Java A- platform-neutral, object-oriented programming language developed by Sun Microsystems for use on multiplatform networks. 
·         JavaScript- An interpreted scripting language, similar to but otherwise unrelated to Java, that enables Web page designers to add scripts to HTML code. 
·         narrowband connections -Dial-up Internet connections; named because they don’t offer much bandwidth when compared to other types of connections.  
·         National Information Infrastructure -A state-of-the-art command center created to fight the growing threat of system sabotage. The center includes representatives of various intelligence agencies (the departments of defense, transportation, energy, and treasury), and representatives of several major corporations.  
·         open standards Standards not owned by any company. 
·         packet-switching- -The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination, where they are reunited.
·         plug-in -A software extension that adds new features. 
·         portal -A Web site designed as a Web entry station, offering quick and easy access to a variety of services. 
·         pull technology- Technology in which browsers on client computers pull information from server machines. The browser needs to initiate a request before any information is delivered. 
·         push technology- Technology in which information is delivered automatically to a client computer. The user subscribes to a service and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
·         RSS (Really Simple Syndication)- An XML-based format for sharing data with aggregators, commonly used by bloggers. 


     


    
 
 
        

Wednesday, March 16, 2011

Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

 With using a telephone: Whoever it is that you call, will be able to hear your voice, and have a complete conversation with you: making sure that no information is left out. Unfortunetly, sometimes people do not answer their phone, which can stop you from telling them the important information.

With email, any one with internet access can contact anyone (who has an email). With using emails, proximity can be an issue.

Real-time teleconference is a great solution for when you need to  be  face-to-face with somebody, but really can't be because of issues with location, and more. A set back of real-time conferencing is that it is very possible for users to have issues with connection.

With fax: Anyone can send hard copies of any information to whoever. The only thing is that sometimes, faxes do not go through and if they do the information they sent may not be clear.

Wi

Monday, March 14, 2011

RQS for Mon the 14th

1- true or false- Today virtually all computer networks are general-purpose networkz connected to the internet? false
2- describe atleast two differrent kinds of communication software:
One: skype: users can use video communicating to speak to anyone around the world in a virtual "face-to-face" way.
Two:Apple iPhone 4 Facetimeallows for any iPhone4 users, under wireless network, to ralk on the phone and see eachother through a web-camera
3- true or false- the standard Pc serial Port is being phased out and replaced by a standard parallel port. True
4- true or false- the most common types of networks today use a standard networking architecture known as Ethernet. True

Wednesday, March 9, 2011

Discussion Question

DQ: What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?

I do several things every week that involve using a database, whether directly or indirectly. As for this week, there were two databases that I used to help me do my homework and other things. One of them was definetly Google: I use the Google database at least once or twice a day, if not more. The second was is Wikepedia, which I do not use all the time, but very often.

If, for the past week, I used or had absolutely no databases, the situation would be MUCH different. Doing my homework would take a lot longer than usual, seeing as I'd have to go through several dictionaries, information sources, and books to get the information I needed. Let's just say, I would have a really hard time doing things in less than a minute.

Monday, March 7, 2011

224-232 Reading Questions/Answers

FYI: I didn't have to do this week's RQ's because I was presenting, but I did four questions any way.

1- Who are the creators of Google?
  • Sergey Brin and Larry Page
2-What is the difference between a file manager and a database-management system? How are they similar?
  • File Manager: computer program that provides a user interface to work with file systems.
  • A file manager lets do many things with files: create, open, edit, view, print, play, rename, move, copy, delete, and more.
  • Database-management: creation, maintenance, and use of a database

  • Both a file manager and database-management help you create and edit (and more).
3-What is a query?
  • A query is a form of questioning
 4-  Describe the structure of a simple database.
  • The structure of a simple database:
    • A database is a collection of information that is stored in well-defined tables, or matrices. 
    • The rows are used to describe are used to describe similar items. These rows are also called "database records"
    • The columns provide properties of the records.