1.
A)
An operating system is software, consisting of programs and data, that runs on the computer. It manages the computer's hardware resources, as well as providing common services for the execution of various softwares.
B)
Two utilities provided by an operating system that would be helpful for the author who has broken his arm would be speech recognition and the management of the communication between a microphone and the computer. This would allow the author to speak into the microphone and it would type this for him, allowing him to work on his novel while being crippled.
4.
A)
Artificial Intelligence is the theory and development of computer systems which are able to perform tasks that would normally require human intelligence.
B)
Clippy could tell that the user was writing a letter by possibly recognizing the format of the letter, or looking for key words such as dear. Also, letters normally contain an address at the top, which may be an indicator. Clippy is able to recognize these things and know that the user is writing a letter, and then it will give them the option of using its help or not.
2.
A)
Two technical reasons why the quality of videos viewed from web sites can be limited are that the files are compressed so that they can be held and shown on the websites. Also, the media-players on the website may not be high quality, and able to play videos in high quality. It also would take longer to download or stream a higher quality video.
B)
Two reasons why some web-based videos do not play at all on a home computer is because the media-player software may not be compatible with the computer system, or it may not be downloaded on the computer yet. An example of this is if a computer does not have adobe flash-player than it would not be able to play youtube videos. The browser may also be the problem, as some browsers such as safari have had problems playing videos online from sites such as youtube.
C)
This may be because of the web because it has gotten exposure for these performing arts. It also may have been used for advertising, which would catch the attention of people surfing the web and perhaps draw them in. Also, ticket sales may be available online, and information about these performing arts is very easily accessed if there is a website for them. Also, videos of these arts such as opera or ballet are able to be watched, and people may have watched them and realized they liked it.
3.
A) A text file is a storage of data which consists of characters.
B) An OCR can convert handwriting to a text file by scanning the written text and then changing it into characters and storing this in a file. The pattern of the written letters are matched with type and this is inserted into a word document.
Thursday, April 14, 2011
Tuesday, April 12, 2011
4.12 classwork
1
A) A print server manages one or more printers, and a network server manages network traffic. A database server processes database queries.
B) One advantage of a school giving students USB drives is that they are able to save their data and documents they make on school computers, and they are able to bring them home. A disadvantage is the students may use them for bad things, such as transferring viruses onto the school computers, or just use them for music.
C) They should save the documents in a different place such as google docs. They should also put the USB drives in a safe place when they are transporting them. This would make sure that they do not lose the USB drive. They should also put a password on the USB drive so nobody can access the documents and steal them.
4
A)
i)database
ii)Another task that could be performed by a wizard is to search a program.
B)
Two other IT methods to help them use application software would be to look up a tutorial on how to use the software, or to find an instructional video on using the application software. Both of these methods would allow the user to better understand the application, as well as find out how to do whatever they do not know how to do.
C)
It is the complete responsibility of the company to pay for the training of the employee. They are the ones who want to have the employee be able to use the software, and so it is their responsibility to pay for the training. The company will also benefit from the employee learning to do whatever they are learning to do, and so it will be in their interest for them to know how to do it. The employee is also using his or her time to learn, and so they should not have to pay as well.
5.
A)
i) 1024 GB, it is a multiple of a byte which holds information
ii) A GPS is a global positioning system, which determines the location of itself as well as its movement. It can be used to find places.
B)
First an image would be taken by a satellite of an area. Then this image would be saved by a hard drive on the satellite, or accessed by someone and then saved on their hard drive. These would probably be held on a server, and then displayed on google earth.
C)
The GPS technology and the mapping software help the user find the destination. The GPS finds the location of the user, and then the mapping software selects the route that the user will take. The GPS technology is then used to tell where the user is and when they have to make a turn, and is able to give the user real time directions to the destination as well as showing the user where they are on the map.
D)
A) A print server manages one or more printers, and a network server manages network traffic. A database server processes database queries.
B) One advantage of a school giving students USB drives is that they are able to save their data and documents they make on school computers, and they are able to bring them home. A disadvantage is the students may use them for bad things, such as transferring viruses onto the school computers, or just use them for music.
C) They should save the documents in a different place such as google docs. They should also put the USB drives in a safe place when they are transporting them. This would make sure that they do not lose the USB drive. They should also put a password on the USB drive so nobody can access the documents and steal them.
4
A)
i)database
ii)Another task that could be performed by a wizard is to search a program.
B)
Two other IT methods to help them use application software would be to look up a tutorial on how to use the software, or to find an instructional video on using the application software. Both of these methods would allow the user to better understand the application, as well as find out how to do whatever they do not know how to do.
C)
It is the complete responsibility of the company to pay for the training of the employee. They are the ones who want to have the employee be able to use the software, and so it is their responsibility to pay for the training. The company will also benefit from the employee learning to do whatever they are learning to do, and so it will be in their interest for them to know how to do it. The employee is also using his or her time to learn, and so they should not have to pay as well.
5.
A)
i) 1024 GB, it is a multiple of a byte which holds information
ii) A GPS is a global positioning system, which determines the location of itself as well as its movement. It can be used to find places.
B)
First an image would be taken by a satellite of an area. Then this image would be saved by a hard drive on the satellite, or accessed by someone and then saved on their hard drive. These would probably be held on a server, and then displayed on google earth.
C)
The GPS technology and the mapping software help the user find the destination. The GPS finds the location of the user, and then the mapping software selects the route that the user will take. The GPS technology is then used to tell where the user is and when they have to make a turn, and is able to give the user real time directions to the destination as well as showing the user where they are on the map.
D)
Monday, April 4, 2011
Bike Database
4.
A) Two IT features of a smart card are that they contain a built-in processor and are programmable, and smart cards have secure storage for data including private keys. They can be used to open doors.
B) The process to authenticate the cyclist when collecting a bike would be for the cyclist to insert or have the rack scan their smart card. The information from the card would be taken, and then the cyclist would enter their PIN or secret code, and If this matched the information on the card, then the persons account would be charged for the bike and the bike would be released. The information of the bike that was taken would be recorded by the machine. The cyclist would then take the bike and ride away.
C) The benefits of using a relational database instead of a flat-file database would be the database would be able to match the bike number with the rental and then the person who rented the bike. This would save time in seeing who took the bike because instead of looking through the flat file database and trying to find databases, the relationships could be queried and the results would appear. This is much more efficient, and it also allows the Bike and Rental and People to be on different pages, which would cause less confusion. It is much easier to query and find the information than use a flat file database and have to search yourself.
D) There are many privacy and security concerns that could arise through the use of the database to record bike rentals, which relate to the credit card number of the cyclist being in the database, the location of the cyclist being known, and the security of a smart card. A security concern arises from the credit card number of the cyclist being recorded in the database along with his name. If the database is hacked, not only the credit card number will be stolen but also the name of the person would be known. They would know who they were stealing from, and this could cause targeted hacks looking for the credit card number of a certain person. This could result in black mail or the loss of money by the cyclist. The privacy and security of the cyclist is also risked when his information is put in the database, because the location and bike number that he used is known and recorded. Therefore, his approximate location is known. If a person wanted to know the persons location they could hack the database and easily find it out. The government could also use this to track the location of its citizens by seeing where they get their bikes and return them, and this could be used to track them. Also, a security concern that your account could be used by another person arises from the use of a smart card to rent your bike. The smart card could be lost and taken by another person, or your card could be copied or manufactured by another person. They could then rent bikes at your expense, and not return them causing your account to be charged with the late fees. All in all, the security and privacy concerns that stem from the use of a database to hold the cyclists information are numerous, and the cyclist is exposing themselves to a lot of danger by joining this service and giving the bike company their information.
A) Two IT features of a smart card are that they contain a built-in processor and are programmable, and smart cards have secure storage for data including private keys. They can be used to open doors.
B) The process to authenticate the cyclist when collecting a bike would be for the cyclist to insert or have the rack scan their smart card. The information from the card would be taken, and then the cyclist would enter their PIN or secret code, and If this matched the information on the card, then the persons account would be charged for the bike and the bike would be released. The information of the bike that was taken would be recorded by the machine. The cyclist would then take the bike and ride away.
C) The benefits of using a relational database instead of a flat-file database would be the database would be able to match the bike number with the rental and then the person who rented the bike. This would save time in seeing who took the bike because instead of looking through the flat file database and trying to find databases, the relationships could be queried and the results would appear. This is much more efficient, and it also allows the Bike and Rental and People to be on different pages, which would cause less confusion. It is much easier to query and find the information than use a flat file database and have to search yourself.
D) There are many privacy and security concerns that could arise through the use of the database to record bike rentals, which relate to the credit card number of the cyclist being in the database, the location of the cyclist being known, and the security of a smart card. A security concern arises from the credit card number of the cyclist being recorded in the database along with his name. If the database is hacked, not only the credit card number will be stolen but also the name of the person would be known. They would know who they were stealing from, and this could cause targeted hacks looking for the credit card number of a certain person. This could result in black mail or the loss of money by the cyclist. The privacy and security of the cyclist is also risked when his information is put in the database, because the location and bike number that he used is known and recorded. Therefore, his approximate location is known. If a person wanted to know the persons location they could hack the database and easily find it out. The government could also use this to track the location of its citizens by seeing where they get their bikes and return them, and this could be used to track them. Also, a security concern that your account could be used by another person arises from the use of a smart card to rent your bike. The smart card could be lost and taken by another person, or your card could be copied or manufactured by another person. They could then rent bikes at your expense, and not return them causing your account to be charged with the late fees. All in all, the security and privacy concerns that stem from the use of a database to hold the cyclists information are numerous, and the cyclist is exposing themselves to a lot of danger by joining this service and giving the bike company their information.
Friday, April 1, 2011
Intellectual Property Theft
6.
A) Intellectual property is the number of distinct types of creations of the mind from which a set of rights are recognized. Owners of this property are granted rights to these intangible assets.
B) Two services an ISP provides to internet users is internet access as well as server space. Through the ISP the user can access the internet, and then browse or do what they please. The ISP also can lease server space for smaller businesses or host other servers.
C) Two ways a home computer network could be adversely affected by uses of file sharing services is by the reduction of speed due to the downloading of files. For instance, if a person on the network is downloading lots of files the connection will be very slow. It uses up the bandwidth of the network. Also, viruses may be gotten from downloads and these would affect the network.
D) There would be many effects to the music industry if P2P sites were regulated. If the government regulated the use of P2P sites for file sharing, people would not be able to illegally download files through sites like lime wire. This would force people to pay for their downloaded music, which would bring more money into the music industry. The money companies like apple, who own the program itunes, would make more money. A downside to the regulating of P2P sites would be that artists would not get as much exposure. If people had to pay to get each of their songs, they might not download them and less people would listen to them. Also, people may turn to sites like youtube to listen to music instead of downloading it. Another consequence of the regulation of file sharing would be the income of artists from concerts. If people did not download a lot of music from the band because it cost money, they might not find songs by that band they like and they would be less likely to go to one of their concerts or tours. An upside of the regulation is that the artists would gain more money from their music, and this would allow to possibly buy new equipment and make better sounding music. They are putting time into making music and they would make money selling their songs. All in all, the regulation of P2P sites for file sharing would be effect the music industry positively because it would generate more income because people would be forced to buy the music if they wanted to download it.
A) Intellectual property is the number of distinct types of creations of the mind from which a set of rights are recognized. Owners of this property are granted rights to these intangible assets.
B) Two services an ISP provides to internet users is internet access as well as server space. Through the ISP the user can access the internet, and then browse or do what they please. The ISP also can lease server space for smaller businesses or host other servers.
C) Two ways a home computer network could be adversely affected by uses of file sharing services is by the reduction of speed due to the downloading of files. For instance, if a person on the network is downloading lots of files the connection will be very slow. It uses up the bandwidth of the network. Also, viruses may be gotten from downloads and these would affect the network.
D) There would be many effects to the music industry if P2P sites were regulated. If the government regulated the use of P2P sites for file sharing, people would not be able to illegally download files through sites like lime wire. This would force people to pay for their downloaded music, which would bring more money into the music industry. The money companies like apple, who own the program itunes, would make more money. A downside to the regulating of P2P sites would be that artists would not get as much exposure. If people had to pay to get each of their songs, they might not download them and less people would listen to them. Also, people may turn to sites like youtube to listen to music instead of downloading it. Another consequence of the regulation of file sharing would be the income of artists from concerts. If people did not download a lot of music from the band because it cost money, they might not find songs by that band they like and they would be less likely to go to one of their concerts or tours. An upside of the regulation is that the artists would gain more money from their music, and this would allow to possibly buy new equipment and make better sounding music. They are putting time into making music and they would make money selling their songs. All in all, the regulation of P2P sites for file sharing would be effect the music industry positively because it would generate more income because people would be forced to buy the music if they wanted to download it.
Subscribe to:
Posts (Atom)