Thursday, April 29, 2010

Gaming Entertainment? Or training killers?

1.) Moore is reported to have told police, "Life is like a video game. Everybody’s got to die sometime." His brother Steve, a Methodist minister, wants the video game industry to pay: "Why does it have to come to a point to where somebody's life has to be taken before they realize that these games have repercussions to them? Why does it have to be to where my brother's not here anymore," says Steve Strickland. "There's not a day that goes by that I don't think about him."

2.) Doug Lowenstein, who represents the video game industry. "I don't think video games inspire people to commit crimes," says Lowenstein. "If people have a criminal mind, it's not because they're getting their ideas from the video games. There's something much more deeply wrong with the individual. And it's not the game that's the problem."

3.) Violent video games shouldn't be sold to minors and that the states should consider laws that would ban the sale of violent games to those under 17.

4.) They should think twice before the game designers or companies to create such a violent game. They have all the responsibility upon every teenagers behavior since they created the game in the first place and now anyone can have their hands on the game even youngsters.

Answer the handout q's:

http://www.cbsnews.com/stories/2005/03/04/60minutes/main678261.shtml

Wednesday, April 28, 2010

Social/Ethical Issues of online games:

Privacy and anonymity:-
Usually using online gaming one must create an account that identifies the user. This would become quite an issue if anyone were to get their hands on someone's account information. Usually your account is hacked and even credit card numbers are stored on accounts (for the online billing, so privacy and anonymity are major issues in almost every online aspect.

Equality of Access:-
not everyone is able to access the internet. It may be due to the country, or perhaps even just the area. Limited Internet access may be inaffordable.

People and Machines:-
The relationship between people and machines shift as you rely more on technology for entertainment and pleasure. The increasing popularity of online gaming is increasing human reliance upon machines.

Issues in regarding of online games is that people tend to get sick especially "pulling an all nighter" on Runescape which causes lack of sleep, lack of focus, fatigue and weakness. Also, many "act" like the characters on the game and which may result of violence. These are some issues related to games .

Tuesday, April 27, 2010

Review Questions: Chapter 6

#1.

#2.

#3. image resolution and pixel depth

#4. A paint program and a photo program both operate on pixels. The are discrete points in an image whether captured from a camera or generated in a paint program. The differences are related to the effects and image processing you employ. In photo processing you often want to correct color, brightness, crop, and clean up an image. In painting you use brushes and other tools to create an image.

#5. CAD software:
-Architectural design: buildings/ bridges
-Floor plans: interior design/ remodeling/ buildings
-Mechanical design: Machinery/ parts/ milling
-Electrical Design: circuit design

3D Modeling:
-Medical: modeling of human organs for learning
-Convey Ideas: can create something that doesn't exist yet, so people have an idea of what it will look like.
-Video game development
-Simulators: flight/ training/ research and development

#6. Since an image is made up of pixels. The mega pixel rating on a camera contains approximately that many millions of pixels. Those quickly add up on your camera's memory card allowing to take pictures in the day or night.

Thursday, April 22, 2010

Notes

DTP
Desktop Publishing is used for producing a book

1.) Write the text
2.) Edit Text
3.) Add text
4.) Design basic format for publication
5.) Arrange text and graphics on pages
6.) Print your pages
7.) Bind your work
8.) Share w/ friends and family

AOI: Business and employment

S/E: Eqality of access

Wednesday, April 14, 2010

DATABASES REVIEW

1.) Rational Databases Managements
2.) Appointments, Patients health information and prescriptions that are recommended
3.) Query
4.) Since it stores and organizes files in to a table which can be easily read
5.) Reliability that the database will have all the information drought down on a table
People and machines allows the users to connect with there databases

Monday, April 12, 2010

News Event Bubble

http://www.informit.com/articles/article.aspx?p=1434905

Key Terms for Database

1.) Field: each discrete chunk of information in a database record.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and Government

2.) Key field: a field that contains data that uniquely identifies the record.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


3.) Record: The information relating to one person, product, or event.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


4.)Search: Looking for a specific record.

Social and Ethical Issues: Privacy
Area(s) of Impact: Business and government


5.)query: An information request.

Social and Ethical Issues: Privacy
Area(s) of Impact: Business and government


6.) Sort: Arrange records in alphabetic or numeric order based on values in one or more fields.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


7.) Database management system: A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.

Social and Ethical Issues: privacy and security
Area(s) of Impact: Business and government


8.) Mail merge: A feature of a word processor or other program that enables it to merge names and addresses from a database mailing list into personalized form letters and mailings.

Social and Ethical Issues: security and privacy
Area(s) of Impact: Business and government


9.) Relational database: A program that allows files to be related to each other so changes in one file are reflected in other files automatically.

Social and Ethical Issues:privacy/ security
Area(s) of Impact: Business and government

Privacy of info. in different cultures

Saturday, April 10, 2010

Social consequences of the release of sensitive data stored in databases

If your sensitive data is taken by someone it can be a really big problem. You might lose money, privacy and might even be falsely accused for a crime you never committed. As people have become more aware of identity theft, they are realizing the necessity of the protection of their personal information. It is important to protect our information.

Sensitive data are information that adversely affect a person, the national interest and etc through unauthorized access, or modification. Here's a list of some aspects of Sensitive Data:

1.) Social Security number (SSN)
2.) Credit card number or banking information
3.) Tax information
4.) Credit reports
5.) Anything that can be used to facilitate identity theft (e.g., mother's maiden name)

Sensitive data still exist on discarded or second-hand computer hard disk drives. Most of the people are unaware that sensitive data remain in a hard drive and can be easily recovered. It is very easy to get information about a person. When you visit the web sites, all information is in browser’s history. Even if you delete those temporary Internet files, not all of them are deleted completely. For example word processing creates temporary files when you are working on the programs.

When we delete a file, the file is not actually “deleted.” We all know that the file first goes to the Recycle Bin. But even when we delete files in the Recycle Bin, the files still remain in your computer disk. What happens when you delete a file is that the pointers to the file are removed from the space where it is stored on disk becoming reusable.Even if you format the hard drive, the data are still there. If someone is going to take away your sensitive data, all he/she has to do is to take your hard drive and recover all the data. It is that easy to steal the data. We have to be aware that sensitive data can be easily taken away and we had better take some actions to protect our sensitive and personal information.

Thursday, April 8, 2010

Review Questions: #7-#11 p.259

7.) It allows you to arrange records in alphabetic or numeric order based on values in one more fields.

8.)In the database design you can add default constraints on columns to avoid data entry errors but usually the front end application that is used to capture the data does most of the validation and disallows saving of that which means the database is left untouched until the correct information is entered.

9.) Record matching compiles profiles by combining information from different database files by looking for a shared unique field.

10.) Yes based on the U.S. Laws Protecting Personal Privacy from Fair Credit Reporting Act to Health Insurance Portability and Accountability act.

11.) Since the computer has all of you information which may be obtained by hackers.

Wednesday, April 7, 2010

Internet Exercises: Databases and Business Intelligence

BI components include: reports, spreadsheets, charts, and dashboards which are used for a detailed analysis and reporting. This helps an organization gain critical insights into its day to day functioning. Spotting potential opportunities becomes as easy as spotting potential pitfalls. As a business, BI helps you make more precise and informed decisions.

First Business Application:

Microsoft® SQL Server™ 2005 is a complete business intelligence (BI) platform that provides the features, tools, and functionality to build both classic and innovative kinds of analytical applications. This provides an introduction to the tools that you will use to build an analytical application, and highlights new functionality that makes it easier than ever to build and manage complex BI systems.

Second Business Application:

Oracle Business Intelligence (BI) Applications are complete, prebuilt BI solutions that deliver intuitive, role-based intelligence throughout an organization. These solutions enable organizations to gain more insight and greater value from a range of data sources and applications including Oracle E Business Suite, PeopleSoft, JD Edwards, Siebel, and third party systems such as SAP. Oracle BI Applications are built on the Oracle BI Suite Enterprise Edition, a comprehensive and market leading BI platform. This enables organizations to realize the value of a packaged BI application, such as rapid deployment, lower TCO, and built-in best practices, or to build custom BI applications—all on one common BI foundation.

Tuesday, April 6, 2010

Review Questions: p.259

#2. A file manager is a program that enables users to manipulate files on their computers. A database-management system manipulates data in a large collection of files.

#3. All databases have a structure that outlines how data will be stored in the database.

#4. A query is an information request.

#5. For a web application there are certain guidelines that needs to followed:

A. Define the ODBC connection that would associate to your database.
B. You need a server side technology
C. Create a SQL query using the syntax of the server side technology to search your database.
D. Assuming that the search result set is not blank, you would loop through the result set to display the report. The most convenient way would be using a table.

6.) if you write something down on paper it has a better chance of getting lost using management software which makes it easy to find things and you will always no where it is, but storing stuff on a computer is just as insecure as hackers could steal all of your information.