Thursday, May 6, 2010

2.4.2 AI and expert systems

An expert system- Reliability: We rely on the information to the answers given by the expert systems.

Value of the development of AI-

Various Applications of AI- Reliability: We can not rely on machines to perform in decision making tasks because they don't have reasoning like human beings do.

"Smart Machines"- Control: People would be controlled by these machines for and the interaction between humans would decrease.

Military applications of AI- Security: These smart weapons can be programmed incorrectly which may harm the lives of innocent civilians when used.

Computers using AI-

Access to Knowledge- Policies and standards: Humans standards can be different from the expert standards which differentiate with one another in decision making which can create havoc between the system and humans which also can be an example of people and machines.

Thursday, April 29, 2010

Gaming Entertainment? Or training killers?

1.) Moore is reported to have told police, "Life is like a video game. Everybody’s got to die sometime." His brother Steve, a Methodist minister, wants the video game industry to pay: "Why does it have to come to a point to where somebody's life has to be taken before they realize that these games have repercussions to them? Why does it have to be to where my brother's not here anymore," says Steve Strickland. "There's not a day that goes by that I don't think about him."

2.) Doug Lowenstein, who represents the video game industry. "I don't think video games inspire people to commit crimes," says Lowenstein. "If people have a criminal mind, it's not because they're getting their ideas from the video games. There's something much more deeply wrong with the individual. And it's not the game that's the problem."

3.) Violent video games shouldn't be sold to minors and that the states should consider laws that would ban the sale of violent games to those under 17.

4.) They should think twice before the game designers or companies to create such a violent game. They have all the responsibility upon every teenagers behavior since they created the game in the first place and now anyone can have their hands on the game even youngsters.

Answer the handout q's:

http://www.cbsnews.com/stories/2005/03/04/60minutes/main678261.shtml

Wednesday, April 28, 2010

Social/Ethical Issues of online games:

Privacy and anonymity:-
Usually using online gaming one must create an account that identifies the user. This would become quite an issue if anyone were to get their hands on someone's account information. Usually your account is hacked and even credit card numbers are stored on accounts (for the online billing, so privacy and anonymity are major issues in almost every online aspect.

Equality of Access:-
not everyone is able to access the internet. It may be due to the country, or perhaps even just the area. Limited Internet access may be inaffordable.

People and Machines:-
The relationship between people and machines shift as you rely more on technology for entertainment and pleasure. The increasing popularity of online gaming is increasing human reliance upon machines.

Issues in regarding of online games is that people tend to get sick especially "pulling an all nighter" on Runescape which causes lack of sleep, lack of focus, fatigue and weakness. Also, many "act" like the characters on the game and which may result of violence. These are some issues related to games .

Tuesday, April 27, 2010

Review Questions: Chapter 6

#1.

#2.

#3. image resolution and pixel depth

#4. A paint program and a photo program both operate on pixels. The are discrete points in an image whether captured from a camera or generated in a paint program. The differences are related to the effects and image processing you employ. In photo processing you often want to correct color, brightness, crop, and clean up an image. In painting you use brushes and other tools to create an image.

#5. CAD software:
-Architectural design: buildings/ bridges
-Floor plans: interior design/ remodeling/ buildings
-Mechanical design: Machinery/ parts/ milling
-Electrical Design: circuit design

3D Modeling:
-Medical: modeling of human organs for learning
-Convey Ideas: can create something that doesn't exist yet, so people have an idea of what it will look like.
-Video game development
-Simulators: flight/ training/ research and development

#6. Since an image is made up of pixels. The mega pixel rating on a camera contains approximately that many millions of pixels. Those quickly add up on your camera's memory card allowing to take pictures in the day or night.

Thursday, April 22, 2010

Notes

DTP
Desktop Publishing is used for producing a book

1.) Write the text
2.) Edit Text
3.) Add text
4.) Design basic format for publication
5.) Arrange text and graphics on pages
6.) Print your pages
7.) Bind your work
8.) Share w/ friends and family

AOI: Business and employment

S/E: Eqality of access

Wednesday, April 14, 2010

DATABASES REVIEW

1.) Rational Databases Managements
2.) Appointments, Patients health information and prescriptions that are recommended
3.) Query
4.) Since it stores and organizes files in to a table which can be easily read
5.) Reliability that the database will have all the information drought down on a table
People and machines allows the users to connect with there databases

Monday, April 12, 2010

News Event Bubble

http://www.informit.com/articles/article.aspx?p=1434905

Key Terms for Database

1.) Field: each discrete chunk of information in a database record.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and Government

2.) Key field: a field that contains data that uniquely identifies the record.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


3.) Record: The information relating to one person, product, or event.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


4.)Search: Looking for a specific record.

Social and Ethical Issues: Privacy
Area(s) of Impact: Business and government


5.)query: An information request.

Social and Ethical Issues: Privacy
Area(s) of Impact: Business and government


6.) Sort: Arrange records in alphabetic or numeric order based on values in one or more fields.

Social and Ethical Issues: Privacy and Security
Area(s) of Impact: Business and government


7.) Database management system: A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.

Social and Ethical Issues: privacy and security
Area(s) of Impact: Business and government


8.) Mail merge: A feature of a word processor or other program that enables it to merge names and addresses from a database mailing list into personalized form letters and mailings.

Social and Ethical Issues: security and privacy
Area(s) of Impact: Business and government


9.) Relational database: A program that allows files to be related to each other so changes in one file are reflected in other files automatically.

Social and Ethical Issues:privacy/ security
Area(s) of Impact: Business and government

Privacy of info. in different cultures

Saturday, April 10, 2010

Social consequences of the release of sensitive data stored in databases

If your sensitive data is taken by someone it can be a really big problem. You might lose money, privacy and might even be falsely accused for a crime you never committed. As people have become more aware of identity theft, they are realizing the necessity of the protection of their personal information. It is important to protect our information.

Sensitive data are information that adversely affect a person, the national interest and etc through unauthorized access, or modification. Here's a list of some aspects of Sensitive Data:

1.) Social Security number (SSN)
2.) Credit card number or banking information
3.) Tax information
4.) Credit reports
5.) Anything that can be used to facilitate identity theft (e.g., mother's maiden name)

Sensitive data still exist on discarded or second-hand computer hard disk drives. Most of the people are unaware that sensitive data remain in a hard drive and can be easily recovered. It is very easy to get information about a person. When you visit the web sites, all information is in browser’s history. Even if you delete those temporary Internet files, not all of them are deleted completely. For example word processing creates temporary files when you are working on the programs.

When we delete a file, the file is not actually “deleted.” We all know that the file first goes to the Recycle Bin. But even when we delete files in the Recycle Bin, the files still remain in your computer disk. What happens when you delete a file is that the pointers to the file are removed from the space where it is stored on disk becoming reusable.Even if you format the hard drive, the data are still there. If someone is going to take away your sensitive data, all he/she has to do is to take your hard drive and recover all the data. It is that easy to steal the data. We have to be aware that sensitive data can be easily taken away and we had better take some actions to protect our sensitive and personal information.

Thursday, April 8, 2010

Review Questions: #7-#11 p.259

7.) It allows you to arrange records in alphabetic or numeric order based on values in one more fields.

8.)In the database design you can add default constraints on columns to avoid data entry errors but usually the front end application that is used to capture the data does most of the validation and disallows saving of that which means the database is left untouched until the correct information is entered.

9.) Record matching compiles profiles by combining information from different database files by looking for a shared unique field.

10.) Yes based on the U.S. Laws Protecting Personal Privacy from Fair Credit Reporting Act to Health Insurance Portability and Accountability act.

11.) Since the computer has all of you information which may be obtained by hackers.

Wednesday, April 7, 2010

Internet Exercises: Databases and Business Intelligence

BI components include: reports, spreadsheets, charts, and dashboards which are used for a detailed analysis and reporting. This helps an organization gain critical insights into its day to day functioning. Spotting potential opportunities becomes as easy as spotting potential pitfalls. As a business, BI helps you make more precise and informed decisions.

First Business Application:

Microsoft® SQL Server™ 2005 is a complete business intelligence (BI) platform that provides the features, tools, and functionality to build both classic and innovative kinds of analytical applications. This provides an introduction to the tools that you will use to build an analytical application, and highlights new functionality that makes it easier than ever to build and manage complex BI systems.

Second Business Application:

Oracle Business Intelligence (BI) Applications are complete, prebuilt BI solutions that deliver intuitive, role-based intelligence throughout an organization. These solutions enable organizations to gain more insight and greater value from a range of data sources and applications including Oracle E Business Suite, PeopleSoft, JD Edwards, Siebel, and third party systems such as SAP. Oracle BI Applications are built on the Oracle BI Suite Enterprise Edition, a comprehensive and market leading BI platform. This enables organizations to realize the value of a packaged BI application, such as rapid deployment, lower TCO, and built-in best practices, or to build custom BI applications—all on one common BI foundation.

Tuesday, April 6, 2010

Review Questions: p.259

#2. A file manager is a program that enables users to manipulate files on their computers. A database-management system manipulates data in a large collection of files.

#3. All databases have a structure that outlines how data will be stored in the database.

#4. A query is an information request.

#5. For a web application there are certain guidelines that needs to followed:

A. Define the ODBC connection that would associate to your database.
B. You need a server side technology
C. Create a SQL query using the syntax of the server side technology to search your database.
D. Assuming that the search result set is not blank, you would loop through the result set to display the report. The most convenient way would be using a table.

6.) if you write something down on paper it has a better chance of getting lost using management software which makes it easy to find things and you will always no where it is, but storing stuff on a computer is just as insecure as hackers could steal all of your information.

Thursday, March 25, 2010

Software Upgrades: Microsoft

1.) Microsoft Word 2007 is the most recent version.
2.)Microsoft Word 2010
3.) Office 2010 includes extended file compatibility, user interface updates, and a refined user experience. It will be available for Windows XP SP3 (32-bit), Windows Vista SP1 and Windows 7. With the introduction of Office 2010, a 64-bit version of Office[7] will be available for the first time, although only for the Windows Vista and Windows 7 operating systems.
4.)It depend, but approximately every 3-4 years
5.)A beta copy is what is first released to the public of a new product or software program.
6.)you can obtain tar bundles of all the patches from the J2SETM 1.3.1 download web site. These are consolidated bundles that contain patches for all JDK versions.
7.)The patch bundles are the recommended way to obtain the required patches.

Wednesday, March 24, 2010

Review Question: Chapter 4

2.) Compilers and other translator programs: compiler is primarily used for programs that translate source code from a high-level programming language to a lower level language an Example is an assembly language or machine code.

Software applications: is computer software designed to help the user to perform a singular or multiple related specific tasks. Typical examples are word processors, spreadsheets, media players and database applications.

System software: System software is computer software designed to operate the computer hardware and to provide and maintain a platform for running application software. Typical examples are Microsoft Windows and linux.


3.) The operating system is the first to load on the computer's memory because computers today depend on the operating system. operating system is programmed to handle the resources and access protection of the hardware. This relieves the application programmers from having to manage these details.

4.)1. Loosen the lug nuts on the flat tire; don’t remove them yet.
2. Get the jack and jack up the car.
3. Remove the lug nuts from the flat tire and remove the tire.
4. Get the spare tire, place it on the wheel, and tighten the lug nuts.
5. Lower the car.
6. Secure the jack and flat tire in the trunk.

5.) mulituser operating system: the operating system is responsible for authentication and authorization. authentication mechanism requires to enter your user name and password. and example of authorization mechanism is giving priviliages to others to create an application software.

Key Terms: 3/24/10

GUI: A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

S/E
reliability
equality of access


command-line interface:
User interface that requires the user to type text commands on a command-line to communicate with the operating system.

S/E
equality of access

RQ & DQ #1 p.134

RQ: 1.) An algorithm is a system independent idea; a program is a concrete implementation of that idea for a given computer system.

DQ: 1.) Because you have to program the computer, and you need to know math and logic and syntax. That's why it's easier to use child labor to get work done than a computer.

Computers are totally logical; people can interpret different clues to help figure out instructions. Computers can't work a step and think. They just follow whatever is programmed.

Tuesday, March 2, 2010

Discussion Questions (Chapter 13) pg. 490

1.) Discuss why you believe e-commerce is important in today's business world. What impacts do you think e-commerce is having on consumers?

E-commerce presents a world of opportunity for doing businesses, reaching global markets and purchasing without leaving the home or office. E-commerce can provide opportunities to improve business processes, just as phones, faxes and mobile communications have in the past.

3.) E-commerce in today's business world because business now revolves around the web. Most people shop on the internet and most businesses make most of their money on the internet. The universities have their own private internet network only accessible to students and staff members. If our school formed a B2B to have a more efficient transaction with other businesses, because they would not be disturbed by other schools or businesses.

6. Privacy is the best way t secure your identity from hackers online. I would pay extra to keep my identity safe because anyone can have access to my account and it would be under my name. Privacy, especially in this world, needs to stay personal because one who steals privacy can do so much with it to their own use.

Wednesday, February 24, 2010

2/24/10

1.) Why Computer based translations perform translations badly:

The reason is that for instance Google translator translates word for word to another language which may have a different meaning then from the original text. Some words may have more than one meaning and this can require very complex processing.

2.) How a markup language works?

Is a text based language- particularly in web pages.

Wednesday, February 17, 2010

2/17

1)

a. e-commerce is not possible without the internet since e-commerce publishes ads or commercials on the web for use of business.

b. B2B - Business 2 business
B2C - Business 2 Customer
C2B -Consumer-to-Business
C2C - Customer 2 customer

c. Characteristics: An intranet can serve its constituents faithfully, as long as network bandwidth suffices to meet user demands. As more intranet applications become available and more organizations and users begin to appreciate what they can do, demand will rise dramatically.The Web is platform neutral and global, and Web browsers function as universal clients. Web technology is based on open standards, is available for nearly all leading operating systems and hardware platforms, and can leverage legacy database systems.

Tuesday, February 16, 2010

IB Test Practice

1.) GPS (to navigate the pilot's route for the training) and a Headset (to speak to passengers on board or his instructors who are observing his training)

2.) Advantage of a student carrying a USB is that its handheld in size and can be easily carried around and saves all the students document and work onto the flash drive which gives him easy access instead of opening his/her email and downloading the attachment. A disadvantage of a USB is that it can be easily be lost which leaves the student in a tough situation in how he/she will present the assignment.

Key Terms- 2/16

1.) Intranet: A self-contained intraorganizational network that is designed using the same technology as the Internet.

S/E: Reliability- The intranet should be reliable in giving the same designed network as the internet.
AOI: Business and employment- Used in offices for networking


2.) Middleware: Connectivity software linking the client and server machines, providing easy access to information.

S/E: People and Machines- The client and server are connected in linking of accessing information

AOI: Business and employment-


3.) e-business: Though sometimes used interchangeably with the broader term e-commerce, here used to refer to the e-commerce activities of a particular company or organization.

S/E: Control- The client has control over the activities going around the company’s business.

AOI: Business and Employment

4.)e- Commerce: Programs on a Web server that provide the commercial services to consumers and business partners on the Web site.

S/E: Reliability- Reliable on the program to be effective during a business transaction
Service

AOI: Business and Employment-


5.) Dot-coms: Internet-based companies.

S/E: People and Machines- The client is linking with the internet

AOI: Business and Employment- Used in business purposes



6.) Mobile commerce: in which workers use laptops and wireless handheld devices to take their offices with them wherever they travel.

S/E: People and Machines: The users are using hand held technology to get the job done at work
AOI: Business & Employment and Education

Thursday, February 11, 2010

2/11 Practice Test Questions

Define:

1- Computer Simulation are those programs based on models, based on reality in order to imitate a certain scenario. In a computer simulation, the user and the computer respond to data from each other.

2- Bandwidth means the quantity of information that can be transmitted through a communication medium in a given amount of time.

2/11

Tuesday, January 26, 2010

1.)

2.)A static IP address is an address that does not change over time unless changed manually. It is used when you need the IP address or network location to remain the same consistently. A Dynamic IP address is an address that keeps on changing. It is mostly used when having a consistent IP address is not necessary.

Google's IP Address: 216.239.51.99

Tuesday, January 19, 2010

Discussion Questions: 380 HW

4.) I believe that everybody should have the right of security on the web especially through email.

5.) I would not mind working in a business where all employees were required to wear active badges. As a matter of fact, in some ways I do. By knowing where all of the employees are located in the building, the employee can be located if they receive an emergency phone call. Also, let's say there is a fire in the building. Security would be able to tell if anyone was trapped inside. I think it's a great idea!

6.) How do the issues raised in the debate over the missile defense system apply to other large software systems? How do you feel about the different issues raised in the debate?

It seems reliably and fair and the issues raised in the debate seems quite fair.

Review Questions: 1/19/2010

10. Computer security can help protect private information by keeping viruses and other information stealing things out of our computer. But, such virus protection can be carried too far, preventing the computer user from getting any work done.

11. Smart weapons are missiles that use computerized guidance to locate their target. These weapons locate their target without being controlled from a third party. The advantage is that they can be extremely accurate to the target. A risk is that it reduces the amount of time people make to make life and death decisions.

Monday, January 18, 2010

Discussion Questions: p. 376

1.Yes I agree with the author's assessment on the widespread of RFID tags.

2. Yes, for that little price tag it would be reliable in using, if i loose any items at my house it would be easier to find.

3.I would most definitely embed an RFID tag in my dogs and cat if that would increase their chance of being returned to me.

Monday, Jan. 19: Review Qs #7-8

7.) computers have two inherent characteristics that leave them open to attack or operating error: A computer will do exactly what it is programmed to do, including revealing sensitive information. Any computer can do only what it is programmed to do.

8.)One way to reduce the risk of security breaches is to make sure that only authorized personnel have access to computer equipment. Depending on the security system, you might be granted access to a computer based on something you have&endash;a key, an ID card with a photo, or a smart card containing digitally encoded identification
something you know&endash;a password, an ID number, a lock combination, or a piece of personal history
something you do&endash;your signature or your typing speed and error patterns
something about you&endash;a voice print, fingerprints, retinal scans, or other measurements of individual body characteristics, known as biometrics

Wednesday, January 13, 2010

p. 363-366 notes

When Security Threatens Privacy:

*Active badges can simultaneously improve security and threaten privacy by:
*Identifying who enters a door or logs onto a machine
*Finding an employee’s current or earlier location
*Remembering: At the end of the day, an active-badge wearer can get a minute-by-minute printout listing exactly where and with whom he or she has been.

Rules of Safe Computing :

*Share with care.
*Beware of BBS risks.
*Don’t pirate software.
*Disinfect regularly.
*Treat diskettes with care.
*Take your password seriously.
*Lock sensitive data.
*Use backup systems.
*Consider encryption for Internet activities.
*Prepare for the worst.

1/13/10 Wednesday

1.) why is it hard to estimate the extent of computer crime?

Since Its happening everyday which is hard to keep track of the hackers



2.) What is the most common computer crime? Who Commits it? what is being done to stop it?

Identity Theft; The typical computer criminal is a trusted employee with personal or financial problems and knowledge of the computer system. Because of rising computer crime and other risks, organizations have developed a number of computer security technique to protect their systems and data.

Tuesday, January 12, 2010

Key Terms: 1/12/10

1.) Sabotage: A malicious attack on work, tools, or business.

2.) Malware: Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

3.)virus(es) :Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.

4.) Worms: programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.

5.)Trojan horse: A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.

6.) spyware: Technology that collects information from computer users without their knowledge or consent.

7.) Hackers: A slang term for a computer enthusiast, i.e., a person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject(s).

8.) Dos Attacks: (denial-of-service attack), a type of attack on a network that is designed to bring the network to its "knees" by flooding it with useless traffic.

9.) smart weapons: are missiles that use computerized guidance systems to locate their targets.

S/E issue: People & Machines
AOI:

10.)autonomous system : is a complex system that can assume almost complete responsibility for a task without human input.

S/E issue: People & Machines
AOI: Business

Monday, January 11, 2010

Key terms: 1/11/10

1.) Computer crime: Any crime accomplished through knowledge or use of computer technology.

S/E: Privacy and Security: Your privacy and security has been hacked by hackers through either identity theft on the computer
AOI: Business: the hacker might use if for money purposes

2.) Identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim’s credit cards.

S/E: Privacy and Security: Your information is not protected
AOI: Business

3.) Spoofing: A process used to steal passwords online.

S/E: Privacy and Security: Your account is now hacked and now free of access to hackers
AOI: Business; maybe your account had to do with business purpose.

4.) Social engineering: Slang for the use of deception to get individuals to reveal sensitive information.

S/E: Privacy and Security: Your information is now to the public and no sense of privacy by the hackers.
AOI: Business

Sunday, January 10, 2010

1/11/10

etiquette rules for appropriate behavior while on the internet:

While on the internet, it is important to follow guidelines and rules while surfing the net for instance being polite at all times while on the web even though you are not actually having a conversation with a person face to face, but you still have to respect to the person your chatting with and to be careful what you type, remember that you're not communicating with a computer screen. One easy thing that can be avoided is typing in CAPITAL LETTERS; it shows that your shouting to the person your chatting is one rule to avoid for appropriate behavior on the web. Also when you type something make sure you are not using slang or offensive words, it shows that you are a bad person on the web and face to face and may result to your account may be deleted for offensive behavior. There are many illegal programs on the internet which is tempting to download on your desktop, make sure not to break any laws and to follow policies and standards; you may get a fine from the government for breaking the law. Make sure that your identity is not to revealing to the world since anybody has access to the web and can read your information that you posted on a social networking sites like Facebook or MySpace, keep it restricted to people you only know and don't reveal to much information for. One last thing is to not expose yourself on the web by uploading pictures or videos or even posting up inappropriate pictures and it can be addicting and may become out of control which may lead to bad habits on the web. These are some etiquette rules for appropriate behavior while on the internet.

Thursday, January 7, 2010

Vocabulary Words

1.) Network: A computer system that links two or more computers.

S/E Issues: Reliability and Control

AOI: Business and Education

2.) Ethernet: A popular networking architecture developed in 1976 at Xerox.

S/E Issues: Policies & Standards: Certain requirement on this networking device and Reliability: since its been around for 30 years.

AOI: Business and Education

3.) Wi-Fi: A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.

S/E Issues: Reliability and Control

AOI: Entertainment

4.) LAN (local area network): Multiple personal computers connected on a network.

S/E Issues: Equality of access: each user get the same local network and Control

AOI: Business and Education

5.) Node: Each computer and shared peripheral on a local-area network.

S/E Issues: Reliability and Control

AOI: Business and Education

6.) fiber-optic cable: High-capacity cable that uses light waves to carry information at blinding speeds.

S/E: Reliability

Control

AOI: Business and Education


7/8.) Client/Server: Client programs in desktop computers send information requests through a network to server databases on mainframes, minicomputers, or desktop computers; the servers process queries and send the requested data back to the client.

S/E: People and Machines

Policies and Standards

AOI: Business and Education


9.) Spam: Internet junk mail

S/E: Control: you control what is junk

AOI: Business and Education


10.) Password: The most common security tools used to restrict access to computer systems.

S/E: Privacy: You only have access to your password

Security

11.) VPN (virtual private network): A network that uses encryption software to create secure “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.

S/E: Private and Security

AOI: Business



12.) Sysadmin: A system administrator, s a person employed to maintain and operate a computer system and/or network.

S/E: People & machines

AOI: Business



13.) Nodes: Each computer and shared peripheral on a local-area network.

S/E: Equality of access

AOI: Business and Education



14.) UPS (uninterruptible power supply): A hardware device that protects computers from data loss during power failures.

S/E: Reliability

AOI: Business and Education



15.) EDI: (electronic data interchange): A set of specifications for conducting basic business transactions over private networks.

S/E: Privacy and Security

AOI: Business and Education

"Online Study Guide": Ch.8

Summary of Results
76% Correct of 25 Scored items:
19 Correct: 76%
6 Incorrect: 24%

Tuesday, January 5, 2010

HW: 1/5/10

What are the different levels of access to the internet?

These are different levels of networks one can access and use:
1.)LANs allow Multiple personal computers connected on a network.
2.)MANs is a service that links two or more LANs within a city.
3.)WANs allows a network that extends over a long distance. Each network site is a node on the network.

Monday, January 4, 2010

Networking Sites

1.) Twitter: allows you to post up comment to different users and also send messages to your friends.

Facebook: another social networking site which allows to post images, videos, pictures and status almost similar to what of twitter (same concept).

Myspace: upload music, video on your profile share your mood update your layout almost similar to facebook and twitter.

2.)It allows to connect with friends and family with a click of a mouse and you can no what there up to by just reading their statuses it saves lots of time.

3.) Privacy
Security
Control