Wednesday, December 30, 2009
Discussion Questions: 12/30
2.) Your personal data is private so it is best if you kept it in a USB so your information and privacy cannot be easily shared if it was on a networking server which can be seen by other users on the web.
Tuesday, December 29, 2009
Researching the Biometric System: 12/29
Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.
2.list and explain a use of a biometrics system in each area of impact
a) Business and Employment: Banks would use IRIS scanning technology so that only employees can access financial accounts. Retailers also allow customers to pay for their items using fingerprint scanners for example in Walt Disney World in Orlando they would scan the visitors fingerprints before entering the theme park.
b) Health: DNA recognition can be used to tell individuals apart based on DNA samples.
c) Arts, Entertainment, and Leisure: Regarding travel, airports will be using iris scanners when checking in people for flights.
d) Politics and Government: Law enforcement uses DNA recognition to accurately find and identify criminals of a crime scene.
3.Explain how one type of biometric system works.
IRIS recognition scans the iris and compares the scanning to a database of IRIS patterns to math up the iris scan to data connected to it. Fingerprint scans work in the sane manner, the finger is scanned and the image is compared to other fingerprints in the database to math the print with data.
4.who approves/disapproves of the use of biometrics?
Companies and organizations concerned about security and think biometric systems would be most secure by adopting them in their systems. It is also efficient when it comes to certain processes and accurate in identifying people.
5.explain 3 concerns regarding the use of the biometrics system.
a) Security: corporations may abuse biometrics and use the information for personal needs.
b) Crime: People who want to access things that involve biometric security may start o steal body parts and such to access the area.
6.explain 3 advantages to using the biometrics system.
a) Security: It keeps restricted areas open to authorized people only, so that others can't.
b) Accuracy:It's easier to recognize people.
c) Less Chance of identity theft: People's identities would be more secure.
7.what is the benefit of using biometrics as shown in the last clip?
It can be used by advertisers to recognize the consumer it can help advertising agencies and businesses sell their products.
Thursday, December 24, 2009
M/C and Review Q's 12/24
2.c
3.a
4.d
5.d
6.e
7.e
8.c
9.c
10.a
11.d
12.b
13.b
14.c
Review Q's:
7.)Nonimpact printers such as laser and ink-jet printers are quiet and provide high-quality output when compared to impact printers. Nonimpact printers, however, are not appropriate for use with multipart forms.
8.)Modems both send and receive information and are, therefore, both input and output devices. Touch screens provide another example. Users provide input by touching the screen and the screen displays information to the user, providing output.
9.)Random access means that any location on the media may be accessed at any time. RAM, hard disks, various diskettes, magneto-optical cartridges, and CD-ROMs are examples. Information stored on media such as tapes may only be accessed sequentially.Tapes are often used for making backups of data and are often considered more secure than many types of diskettes and cartridges.
Classwork: 12/24
6. Laptop computers and video projectors.
Wednesday, December 23, 2009
HW: 12/24
"Logitech G19 Gaming Keyboard" (http://techgage.com/article/logitech_g19_gaming_keyboard/)
Q's for Analyzing Social Issues:1.) Control: You as a gamer have total control of the keyboard for serious gaming or just surfing the web.
2.) It brought changes from the last model keyboard in 2005 and adjusted more features to it which brought the next evolution of the current model in 2009 the G19
3.) Mainly intended to Gamers
4.) Pros:
Comfortable.
Wide range of backlight colors.
Excellent multimedia controls.
Many programmable macro keys.
Cons:
Very pricey.
Current limited support for LCD applications.
5.) Its the price ($200) that buyers won't be willing to pay but maybe one solution is to cut the price in half which may bring more buyers in buying this product.
6.) The impact of the keyboard is designed to make it easy to enter data and commands into the computer
7.)*
Q's for Analyzing Ethical Issues:
1.)People and machines- as a user you have total control of the machine (keyboard) in a way you connect to the machine as a guide through your research on the web or gaming online.
2.) The producer of the G19 keyboard
3.) Yourself
4.) There is no policies or standards for a keyboard
5.)*
6.)*
(The Questions that i did not answer were not answerable since the product (the keyboard) did not meets it standards in answering the question.) *
Reading Review: 12/23
Input:-
2.) The Mouse: To move a pointer around the screen and point to objects
3.) Scanners: Creates a digital image of the page that it can store in memory
4.) touchpad: The user moves the pointer by dragging a finger across the pad.
5.) touch screen: Responds when the user points to or touches different screen regions.
2.) Printer- produces a hard copy on paper of any information that can be displayed on the computer's screen.
3.) Fax machines- transmits info. stored on paper
Bar code readers are used to scan bar codes on products.
Magnetic strip readers are used to read information encoded on credit cards.
3.) The trackball, the touchpad, and the trackpoint are all devices that provide suitable alternatives to the mouse on laptop computers.
Tuesday, December 22, 2009
Criterion H
Advantages to the creating the electronic flier: is that a picture layout posted on the web will grasp my audiences attention with BIG Words and color layout and would take time to read the flier and would want to attend the event.
Disadvantage: The posting of the flier to the web site may not be able to be viewed (technical difficulties) and also maybe the facebook users would not be on their profile the day of the flier that is posted.
Advantage of the video- in a way of a "commercial" set up may grab the audiences attention
Disadvantage- the video itself well take some time.
The IT solutions will solve the problem of announcements around school and students well want to attend the events or be aware of an upcoming event in the school.
Criterion G: 12/22
Friday, December 11, 2009
Discussion Q's:
Thursday, December 10, 2009
Review Questions, Pg. 60 #''s 3-10
3.) If the input 123.4 is read as a number, this means that the decimal representation of the number 123.4 is translated by the computer into its binary equivalent (a series of 1s and 0s). If the input 123.4 is instead read as a set of ASCII codes, this means the computer is treating each character (1, 2, 3, ., and 4) as a literal character. Each of these characters has an ASCII code (a number between 0 and 127). Each code is then translated by the computer into its binary equivalent.
4.) At their core, computers are just a series of switches that have two positions, on and off. Therefore, the binary system of 1s and 0s allows computers to represent rich information from our world using its switches, where 1 is on and 0 is off.
5.) Software is written to run properly on a particular operating system and processor. So software written to run on a Pentium II chip won't work on a PowerPC-based computer like a Macintosh unless a "platform independent" programming language like Java is use
6.) In addition to clock speed (MHz), the architecture of the processor and of the entire computer also determines speed.
7.) Since the mother board is the "heart" of the computer and everything is depended on the external and internal devices have to work together in order to run the hard drive smoothly.
8.) Symmetric Multiprocessing involves a multiprocessor computer architecture where two or more identical processors can connect to a single shared main memory. Most common multiprocessor systems today use an SMP architecture.
9.) RAM (Random Access Memory) provides the computer a place to store information until the processor is ready for it. So the computer can both write to and read from RAM. ROM (Read Only Memory) provides important information to the processor, but this information is stored permanently and cannot be changed.
Tuesday, December 8, 2009
Tuesday, Dec. 8
Storage Device
Output Devices
Memory
-Central Processing Unit
- A bit is the smallest unit of info a computer can process.
- ASCII and Unicode
- Because computer chips are made with transistors that can only be in the on or off positions.