Pages

Tuesday, March 29, 2011

Reading Questions: Chapter 10(contd.)

3. The typical computer criminal is a trusted employee with no criminal record who is tempted by an opportunity.


4. The most common computer crime today is theft. It is usually committed by intruders.


7. a. A computer does exactly what it is programmed to do, including reveal sensitive information. Any system that can be programmed can be reprogrammed by anyone with sufficient knowledge/
b. Any computer can do only what it is programmed to do.


8. Some different computer security techniques are:
- Install an anti-virus and run scans frequently
- Make sure your firewall is properly running

Monday, March 28, 2011

Reading Questions: Chapter 10

2. It is hard to estimate the extent of computer crime because most of them are undetected and those who are detected are usually not reported.


5. Intellectual property laws grant owners certain exclusive rights to a variety of intangible assets. They can apply to software because the owners of the software have right to their product and it is theirs to do whatever they want with it.


6. Different types of programs that can be used for software sabotage are viruses, worms, trojan horses, and spyware.


9. Because if they do not save it on an external device, there is always a risk that the hard drive in the system might become corrupt so it is always good to have that back up device to save it on.

Wednesday, March 23, 2011

Reading Questions: Chapter 9(contd.)

2. It is hard to determine how big the internet is today because it is constantly growing and networks are constantly being created.

5. It interracts in the sense that information is sent through the server to the client. Different users might experience different interfaces while accessing the same data because they might be in different areas and they might experience delays.

7. - ActiveX: A collection of programming technologies and told for creating controls or components. It is similar to a Java applet.
- eXtensible Markup Language (XML): Enables web developers to control and display data the way they now control text and graphics.
- Synchronized Multimedia Integration Language (SMIL): An HTML-like language designed to make it possible to link time-based streaming media such as sounds, video and animation.

11. With push technology, you subscribe to a service or specify the kinds of information you want to receive and you will receive it automatically from the provider, versus normally where you have to subscribe to i and go find it yourself. It is used to send notifications and alerts to the client.

Wednesday, March 23

List of top-level domains

1. .com (commercial)
2. .org (organization)
3. .net (network)
4. .edu (education)
5. .gov (governmental)
6. .info (infoirmation)
7. .mobi (mobile devices)
8. .mil (U.S. military)
9. .jobs (companies)
10. .int(international organizations)

Monday, March 21, 2011

Reading Questions: Chapter 9

3. They allow cross-network communication for almost every type of computer and network. They are important because they define how information can be transferred between machines and how machines on the network can be identified with unique addresses.

4. It influences the limits and abilities placed on you while you are using the internet.

6. They are both used in the domain naming system.

9. It shrinks the file size but keep it as it is at the same time so it causes less traffic.

Thursday, March 17, 2011

Wednesday, March 16

DQ: Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

Telephone

The advantage of using the telephone to communicate with your friend is that it is a very reliable device and you can talk to your friend as if you were face to face with them, no matter how far you are. Unlike sending emails, or anything of that sort, using the telephone has the best response time. The disadvantage to using the telephone is that you might be a great distance away from your friend and the signal might get interrupted or might just drop and you cannot do anything about it.

Email

The advantage to email is that when you send the message to your friend you don't need to sit and wait for a response. The message is stored in a database and your friend can choose to read it whenever they wish. You can go do whatever you want and come back sometime later to check whether you have received a message. The disadvantages to using Email is that you must be connected to the internet to be able to send messages to your friend. If you do not have internet connection then you are unable to send a message.

Real-time teleconference

The advantage to real-time teleconference is similar to that of the telephone. You can directly speak to your friend. You can also add multiple people to your conference and speak with them. The disadvantage is that you can get disconnected from it and it may become hard for everyone to get setup again.

Fax

The advantages of using a fax machine is that you may send the documents straight to your friend if they also own one. The disadvantages of using fax is that your friend may not also own one so that way it might not work. Also, like the telephone, the fax machine goes through telephone service so that may get disrupted somehow.

Overnight mail service

The advantages of overnight mail service are simple. You and your friend may send messages back and forth overnight. The disadvantage is that it takes time to send messages back and forth so this is the least efficient method of them all.

Wednesday, March 9

DQ: What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?

I think that most of the time I spend on the computer while I'm online involves a database. One main thing I can remember and be sure about is using Google.com. Google.com is a big database and when I search something it narrows the options in that database to that specific item and finds it for me. I personally depend a lot on databases so if I did not have a database during this week I would have probably not been able to do many things such as searches and finding solutions to my problems.

Wednesday, March 16, 2011

Reading Questions: Chapter 8(contd.)

9. - You can send mail over a large network and it would be received faster than normal mail.
- It is not tangible, therefore there is no fear of physical corruption of the mail.

10. - The signal may be disrupted, therefore causing no connection to email or teleconferencing program.
- Not everyone may be able to have access to these features.

11. From my understanding it means that money can be exchanged for anything that might be of information. It relates to communication technology because communication technology is used to transfer money and organize transactions.


13. Netiquettes are important because they keep order on the net and they set a standard for people on the net to follow. Some examples are: - Usenet
- Mailing lists
- Blogs
- Forums

Monday, March 14, 2011

Reading Questions: Chapter 8

2. a. Networks enable people to share computer hardware resources, reducing costs and making it possible for more people to take better advantage of powerful computer equipment.

b. Networks enable people to share data and software programs, increasing efficiency and productivity.

c. Networks enable people to work together, or collaborate, in ways that are otherwise difficult or impossible.


6. a. Terminal emulators: A program that emulates a video terminal within another form of display.

b. File transfer programs: Transmitting files over a computer network or the internet.


7. It can be used to share files over a network to each student's computer station. A software licensing issue that might be raised by using a file server in a student lab is that although the stations are connected through a network, you must still get a separate software license for each student's computer.


8. a. Email is transmitted from the sender’s computer to server and from there to the recipients server from where it can either be viewed or downloaded. IM is short for Instant Messaging and needs the users to be logged in to the same server. Messages are delivered instantly.

b. Email can be read independent of the software that was used to create it whereas the IM requires the users to use the same client.

Wednesday, March 9, 2011

Reading Questions: Chapter 7(contd.)

3. A database is a collection of information in a file. This collection is stored in well-defined tables. The columns in a database table provide characteristics of the records. These characteristics are called database fields. Each field contains one specific piece of information.


5. A. Create a connection to your database.
B. Query the database.
C. Build a report in advance that would layout where you want to display the data.
D. At the time when you build your report, it would be great if you can tie a display field to a column in the database.
E. In your desktop application, you would pass the resultset to this pre-defined report.



10. We have the right of privacy to a certain extent. We need a certain amount of privacy to maintain our dignity and freedom, but on the other hand, our general information such as mailing address and email address may be of great importance to society so they may take that information.


11. Because people store so much information about themselves and their belongings such as bank information and if those were invaded then it would be very bad for those people.

Monday, March 7, 2011

Reading Questions: Chapter 7

2. A file manager is a program that enables users to manipulate files on their computers and a database management system is a program or system of programs that can manipulate data in a large collection of files. They are similar because they both include manipulating files whether it is in the beginning or sometime down the road.

4. A query is an information request. An example of a question answered by a query is, " Who assassinated President Abraham Lincoln?" in the context of a database on the life of Abraham Lincoln.

7. To sort a data-file means to edit the content of the file.

8. Because it can back up and correct any entries that you make based on the databased.