Thursday, March 25, 2010

Software Upgrades: Microsoft

1.) Microsoft Word 2007 is the most recent version.
2.)Microsoft Word 2010
3.) Office 2010 includes extended file compatibility, user interface updates, and a refined user experience. It will be available for Windows XP SP3 (32-bit), Windows Vista SP1 and Windows 7. With the introduction of Office 2010, a 64-bit version of Office[7] will be available for the first time, although only for the Windows Vista and Windows 7 operating systems.
4.)It depend, but approximately every 3-4 years
5.)A beta copy is what is first released to the public of a new product or software program.
6.)you can obtain tar bundles of all the patches from the J2SETM 1.3.1 download web site. These are consolidated bundles that contain patches for all JDK versions.
7.)The patch bundles are the recommended way to obtain the required patches.

Wednesday, March 24, 2010

Review Question: Chapter 4

2.) Compilers and other translator programs: compiler is primarily used for programs that translate source code from a high-level programming language to a lower level language an Example is an assembly language or machine code.

Software applications: is computer software designed to help the user to perform a singular or multiple related specific tasks. Typical examples are word processors, spreadsheets, media players and database applications.

System software: System software is computer software designed to operate the computer hardware and to provide and maintain a platform for running application software. Typical examples are Microsoft Windows and linux.


3.) The operating system is the first to load on the computer's memory because computers today depend on the operating system. operating system is programmed to handle the resources and access protection of the hardware. This relieves the application programmers from having to manage these details.

4.)1. Loosen the lug nuts on the flat tire; don’t remove them yet.
2. Get the jack and jack up the car.
3. Remove the lug nuts from the flat tire and remove the tire.
4. Get the spare tire, place it on the wheel, and tighten the lug nuts.
5. Lower the car.
6. Secure the jack and flat tire in the trunk.

5.) mulituser operating system: the operating system is responsible for authentication and authorization. authentication mechanism requires to enter your user name and password. and example of authorization mechanism is giving priviliages to others to create an application software.

Key Terms: 3/24/10

GUI: A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

S/E
reliability
equality of access


command-line interface:
User interface that requires the user to type text commands on a command-line to communicate with the operating system.

S/E
equality of access

RQ & DQ #1 p.134

RQ: 1.) An algorithm is a system independent idea; a program is a concrete implementation of that idea for a given computer system.

DQ: 1.) Because you have to program the computer, and you need to know math and logic and syntax. That's why it's easier to use child labor to get work done than a computer.

Computers are totally logical; people can interpret different clues to help figure out instructions. Computers can't work a step and think. They just follow whatever is programmed.

Tuesday, March 2, 2010

Discussion Questions (Chapter 13) pg. 490

1.) Discuss why you believe e-commerce is important in today's business world. What impacts do you think e-commerce is having on consumers?

E-commerce presents a world of opportunity for doing businesses, reaching global markets and purchasing without leaving the home or office. E-commerce can provide opportunities to improve business processes, just as phones, faxes and mobile communications have in the past.

3.) E-commerce in today's business world because business now revolves around the web. Most people shop on the internet and most businesses make most of their money on the internet. The universities have their own private internet network only accessible to students and staff members. If our school formed a B2B to have a more efficient transaction with other businesses, because they would not be disturbed by other schools or businesses.

6. Privacy is the best way t secure your identity from hackers online. I would pay extra to keep my identity safe because anyone can have access to my account and it would be under my name. Privacy, especially in this world, needs to stay personal because one who steals privacy can do so much with it to their own use.