Wednesday, December 30, 2009

CrossCurrents: The Diskless PC Revolution

Discussion Questions:
1- Carrying a flash memory device makes it easier to access the information you need when you need it. It can be used in most computers. However, if the device gets stolen and it is not password-protected, private information can be stolen. Carrying personal data on a laptop PC feels safer, and is more tangible. Again, though, if the laptop is stolen and not protected, all personal information will be stolen.

2- I think it would be more secure kept on a flash memory with me than on a network-connected file server. On the network server, people can hack into the information and access it. On the drive, the information would go with me wherever I go, and can only be accessed by me, and taken only if it is stolen from my person.

Tuesday, December 29, 2009

Biometric System Questions

1- define biometrics.
Biometrics is the method of identifying individuals based on biological properties. Technology scans a body part to match the scanned data with data previously stored in the system. Examples are fingerprints, DNA scans, voice recognition, and retina scans.


2- list and explain a use of a biometrics system in each area of impact.
Business and employment: Many US financial institutions are using biometric identification at the employee or customer level.

Education: Schools are using fingerprinting to replace library cards.

Health: Individuals are identified through DNA samples.

Arts/entertainment/leisure: Walt Disney World season pass holders are identified by biometric data.

Science and environment: Biometrics itself is a science. It is used to allow access to high security labs and workspaces.

Politics and Government: Law enforcment uses facial recognition and fingerprints to identify criminals.



3- explain how one type of biometric system works.
Fingerprint scanners scan the person's fingerprint then match the print against a database of other fingerprints.


4- who approves/disapproves of the use of biometrics?
Civil liberty Unions disapprove of the use of biometrics because it raises many privacy issues. They are afraid that it will become a means of tracking individuals on maps across our lives, as more and more of our data about our activities is being tracked and recorded. Consumers also are suspicious of this technology because they fear that the government will use the information against them. Business and other large corporations approve of its use, as they think it will make their business more secure and efficient.

5-explain 3 concerns regarding the use of the biometrics system.

-The government will misuse the information.

- Criminals will still find a way to get around the system, such as stealing the body parts necessary to access a certain area.

- Our data cannot be altered, so if it is stolen, there is a BIG problem.

6- explain 3 advantages to using the biometrics system.

- Criminals can be easily identified and caught.
- It is very hard and almost impossible to change our biometric data making us always recognizable. (This can also be a bad thing.)
-Can help reduce identity fraud



7- what is the benefit of using biometrics as shown in the last clip?
Advertisers can personalize their ads through retina scanning, making the ads more personal and appealing.

Friday, December 25, 2009

CH. 3 Review Q's

Multiple Choice:
1- C
2- D
3- B
4- E
5- D
6- E
7- C
8- A
9- D
10- B
11- C
12- E
13- C
14- C
15- C

7- Non-impact printers print many pages per minute of high-quality text and graphical output. They are fast, durable, and reliable. Impact printers are limited to printing characters and cannot print graphics.

8-Storage devices can be both input and output devices. We can store information on them, as well as retrieve that information. An example are DVD-RW and CD-RW drives.

9- Sequential access means that the information can only be accessed in the order that it was recorded. This type of storage is mostly used for backing up data, and operations which aren't time-sensitive. Random access means that information can be retrieved regardless of the order in which it was recorded. This storage is used with most popular media for everyday storage needs.

Biometrics Article:
http://findarticles.com/p/articles/mi_m2194/is_6_69/ai_63649260/?tag=content;col1

Thursday, December 24, 2009

keywords

Data: information in a form that can be read, used, and manipulated by a computer
information

Processing: an activity that manipulates and organizes information in ways that add value.



Hard disk: a rigid magnetically sensitive dik that spins rapidly and continuously inside computer chassis; used as a storage device
Disk drive: device used to retrieve information from a disk and in some cases to transfer data to it

Storage: long-term repository for data, disks and tapes are examples
-Primary: A computer's main memory

-Secondary: The category of computer storage found in peripherals such as tape and disk drives

-optical disk drive: a disk drive that uses laser beams to read and write bits of information on the surface of an optical disc
USB: (universal serial bus) a data path standard that theoritically allows up to 126 devices to be chained together from a single port, allowing for data transmission that is much faster and more flexible than through traditional serial and parallel ports

compatibility, interface standards, random access


RFID: Radio frequency identification

OCR: optical character recognition; locating and identifying printed characters embedded in an image, allowing the text to be stored as an editable document

OMR: optical mark reader; a reading device that uses reflected light to determine the location of pencil marks on standardized test answer sheets and similar forms.

Bar code: code consisting of a series of vertical bars of variable width that are scanned by a laser; an optical-machine readable representation of data

MFP: multifunction printer, an all-in-one output device that usually combines a scanner, a laser, or inkjet printer and a fax modem.

Sound card: a circuit board that allows the PC to accept microphone input, play music and other sound through speakers and headphones, and process sound in a variety of ways.

CRT: Cathode-ray tube; a computer display made from large electronic vacuum tube, similar to the classic television display

LCD: flat-panel displays, once primarily used for portable computers but now replacing bulkier CRT monitors for desktops

Resolution: Density of pixels, measured by the number of dots per inch dpi: dots per inch

Pixel: a picture element (d0t) on a computer screen or printout. Groups of pixels compuse the images on the monitor and the output of a printout

Baud: a speed of data transmission

Sensors: a device that enables digital machines to monitor a physical quantity of the analog world, such as temperature, humidity, or pressure, to provide data used in robotics, environmental climate control, and other applications.

Voice input: use of a microphone to speak commands and text data to a computer, which uses speech-recognition software to interpret the input

Speech recognition: the identification of spoken words and sentences by a computer, making it possible for voice input to be converted into text files.

Ergonomics: the science of designing work environments that enable people and things to interact efficiently and safely.


Repetitive-stress injuries: conditions that result from repeating the same movements over long periods, such as keyboarding-induced carpal tunnel syndrome, a painful affliction of the wrist and hand

Digitize: converting information into a digital form that can be stored in the computer's memory
Scanners: an input device that makes a digital representation of any printed image.

Digital cameras: a camera that captures images and stores them as bit patterns on disks or other digital storage media instead of using film


Vector graphics: the storag3e of pictures as collections of lines, shapes and other objects

MP3: a method of compression that can squeeze a music file to a fraction of its original CD file size with only a slight loss of quality MIDI: (Musical Instrument Digital Interface) a standard interface that allows electronic instruments and computers to communicate with each other and work together

Fire wire: industry standard for relatively new, extremely fast serial communications protocol, especially well suited for mulitmedia applications such as digital video

Review Questions p. 97

5- What are the advantages of CRT monitors over LCD monitors?
CRT monitors would be harder to steal than an LCD monitor because they are heavier. Also, they were inexpensive and produce high-quality images at a variety of resolutions.

6- Name at least two hardware devices that use LCDs because using a CRT would be impractical.
Video projectors and laptop computers use LCD monitors because they are less bulky and can project computer screen images to large audiences.

Wednesday, December 23, 2009

HW

Article on peripherals:
http://http://news.yahoo.com/s/ap/20091223/ap_on_hi_te/us_tec_digital_life_tech_test_gaming_pcs_accessories;_ylt=AjMfGP6AQQWq2XS6z2KhAH4jtBAF;_ylu=X3oDMTNsamlrZHFpBGFzc2V0A2FwLzIwMDkxMjIzL3VzX3RlY19kaWdpdGFsX2xpZmVfdGVjaF90ZXN0X2dhbWluZ19wY3NfYWNjZXNzb3JpZXMEY3BvcwMzBHBvcwM5BHNlYwN5bl90b3Bfc3RvcnkEc2xrA3Jldmlld3NsaWNrYQ--

Questions:
Social Issues:
2- This new keyboard was invented by a man who was annoyed by the traditional QWERTY keyboard, and felt that a different keyboard would be easier to type with.
3- The stakeholders are the inventor, John Parkinson, any companies that choose to support/endorse his product, and the general public, who will need to be convinced that his keyboard is better than the standard one.
6- This new keyboard may not have that much impact on human life in general. This product may fail to interest the public and crash and burn as a project, losing the inventor time and money. While the style of the keyboard may be more healthy for the hands, if no one is interested in learning a new style of typing, there will be no point, especially when ergonomically designed QWERTY keyboards can be had.
7- The invention of this keyboard shows creativity on the part of the inventor, who had a problem and came up with a solution. The keyboard may gain some users locally, but it is doubtful that it will greatly affect the global community.

Ethical Issues:
1- An issue brought up with this new keyboard is reliability. Will this keyboard work as well as the QWERTY one? People have grown so used to this keyboard, that it will be very hard to change to a new style of typing.
2,3- John Parkinson is both responsible and accountable for making sure his new keyboard works properly, and gains market among the public.
4- I do not think that any policies, rules or laws apply to this situation.

Reading Review

1- List five input devices and three output devices that might be attached to a PC. Describe a typical use for each.
INPUT
Keyboard-sends signals to computer through cables, enters text and numeric data
Mouse-used to point at specific characters and objects
Optical Mark Reader- use reflected light to determine location of pencil marks on standardized tests
Bar Code Readers- use light to read UPCs, inventory codes and other codes created from patterns of variable width bars.
Touch Screen- responds when user points to or touches different regions on screen

OUTPUT
Monitor- displays information in computer on a screen for user to view and interact with
Projector-shows information from monitor onto a large board or other surface to make it easier for large audiences to view
Printer- transfers the information to paper

2-Name and describe three special-purpose input devices people commonly use in public places, such as stores, banks, and libraries.
People use touch screens in grocery stores when using the self-checkout. Also used are bar code readers to scan the goods being purchased and Radio frequency identification readers use radio waves to communicate with RFID tags. THey are used to identify cars at toll booths, library books at checkout counters, and are in the antitheft cards attached to clothes in department stores.

3- Many people find that the mouse is impractical for use as a pointing device on a laptop computer. Describe at least three alternatives that are more appropriate.
Three alternatives to a mouse on a laptop are touchpads, pointing sticks and trackballs. Touchpad is a small flat panel sensitive to light pressure. To use it, the user moves their finger across this pad. Pointing stick is a small handle in the centoer of the keyboard that responds to finger presser by moving pointer in the direction it is pushed. The trackball is like an upside-down mouse. It is stationary while user moves a large ball to control cursor on screen.

Monday, December 21, 2009

Criterion G & H: ITGS Project

Criterion G:
As Muslim females, we should dress modestly. However, it is very hard to find clothes that are both modest and stylish. Enter Nawal Hassouneh, a designer of fashionable modest clothing. Nawal designs clothes that fit the Islamic requirements for modest clothing, yet are appealing to those who wish to dress in fashion. These clothes, however, are only available to those who closely know Nawal, and know that she designs clothes. These designs are not available to the global female Muslim community. If her designs are published somewhere, they will be more accessible to people.

Criterion H:
Two possible IT solutions to this problem are a website or a brochure of her designs. The advantages of a website are that the website can be easily updated, it will be accessible to a global population, clear pictures with different views of the designs can be shown, the cost for making a website would be minimal. Some disadvantages include the fact that only people with computers and internet access will be able to view the site. Also, it might become troublesome to keep up with updating the website, and it may become outdated. Advantages of making a brochure are that it is easy to read, the pictures are clear, it can be read anywhere and distributed to local business willing to advertise. A disadvantage is that it would not reach as big a community as possible. Also, the printing costs for the brochures, especially if given away for free, could be quite expensive. Once the brochure is made, it is harder to update it or correct any mistakes. As a result, I have chosen to produce a website to display the designs. It can reach a larger amount of people, and is less expensive to produce.

Sunday, December 13, 2009

Draw and Label a CPU


CrossCurrents: Get Ready for the Real Bionic Man

1- Yes, there is a difference, but not an especially significant one. Both help with vision or with walking. The difference is that they are more technologically advanced than glasses or an artificial hip.

2-Benefits include making life easier for those who have disabilites. A risk is that these devices malfunction and harm the person using them, or stop working at a critical time. Also, we may come to rely on them too much, and not be able to function with out them.

3- Yes, I think the development of advanced bionic devices is inevitable, and no doubt, decades or millineums from now, they will be as mainstream as laptops and cell phones are today.

Missing Work: 10/12 Investigate Podcasts

The Podcasts all started out with a theme song, then continued to the announcer who introduced the name of the podcast, the topic of the day, and any guests that would be on the show. Then, they continued to discuss the topic. They end with comments from viewers about past podcasts, then exit with the theme song.

Missing Work: 10/22 Homework

Technology in:
Entertainment: The X-box allows users to access the internet through their consoles and play with other users. www.xbox.com
Publishing: The Espresso Book Machine allows people to publish their books on demand, without going through a publishing company. www.ondemandbooks.com/home.htm
Medicine: Web MD is a website that allows people to check their symptoms and diagnose themselves. It also provides many different articles related to health. www.webmd.com
Airlines: Airlines use computer technology for all kinds of things including scanning bags, and directing air traffic.
Science: Many missions on Mars and other areas in space are conducted through spaceships and satellites. www.nasa.gov/missions/index.html

Thursday, December 10, 2009

Review Questions

3- ASCII codes are numbers that represent different characters in an 8-bit code. The computer cannot understand numbers by themselves.

4- Information is stored in binary format because a computer does not understand words, numbers, pictures or even letters. The computer can only digest information if it has been broken into binary digits. A bit can have one of two values that are combined together to form codes that store the information.

5- You cannot run Macintosh software on a PC with an Intel Pentium 4 CPU because not all software is compatible with every CPU. An Intel Pentium 4 CPU cannot decipher Macintosh instructions.

6- Another thing that determines CPU processing speed is the CPU's word size, or how many bits in can process at one time. Also, to increase the speed, manufacturers have been offering multicore processors, multiple CPUs on a single chip.

7- It is important that computers support both internal and external expansion because it enables humans to communicate with computers through keyboards and mice and such. External expansion can be used to customize the computer or make it run faster.

8- Symmetrical multiprocessing can increase a computer's performance by making the computer run faster. As the clock speed increases, the heat generated by the CPU increases as well, making larger fans a necessity. This takes up space. Using more than one processor simultaneously means that the computer can process more bits at the same time, making the computer much more effecient and faster at performing operations.

9- RAM is the Random Access Memory. The RAM is divided into many smaller compartments on which information is stored randomly. When commanded to retrieve the information, the computer quickly does so. However, when the power goes off, the computer instantly forgets everything stored in the RAM. ROM is read-only memory. The information on the ROM was etched onto it when it was manufactured. No new information can be written to it. Information can only be read from it. It cannot be changed except by replacing the ROM chip.

10- Primary storage is a device where computer data is stored during processing. An example is the RAM and ROM. The secondary storage is where data for software is stored. Examples are CD-ROMs, floppy disks, and flash drives.

Tuesday, December 8, 2009

Functions of a Computer

What are the four basic functions of a computer?
The four basic functions of the computer are the recieve input, produce output, process information and store information.

What does CPU stand for?
CPU stands for Central Processing Unit.

Explain what a bit is.
A bit is binary digit. It is the smallest unit of information a computer can process. It can have two values, 0 and 1. Different combinations of these two numbers store information.

Name two codes used to convert words, etc. into bits.
ASCII and Unicode are both used to convert words into bits. ASCII uses 256 patterns that make codes for the 26 letters, 10 digits, and a few special characters. However, it cannot accomodate other languages, so Unicode was developed. Unicode uses around 65,000 unique characters that support all different languages.

Why is informations stored in some kind of binary format in computers?
Computers cannot understand words, pictures or anything of that sort. They only understand information in small units. For that reason, information is stored in the bits, the numbers 1 and 0. These two numbers are combined together to form many different combinations with different information on them.

Monday, December 7, 2009

Parts of a Computer

Parts of a Computer:
Motherboard: every part either sits on it or is connected to it
CPU: Centrul Processing Unit brain of computer, runs software and processes data
RAM: Random Access Memory, holds data and software currently running
Video Card: creates images that appear on monitor
Power Supply: supplies power that computer needs
Hard disk: holds all information, even when power off. When computer is turned off, all data is loaded onto computer for you to access.
Optical Drive: uses laser to read and write CDs and DVDs

Thursday, December 3, 2009

Project Proposal

Project Title:
Nawal's Fashion Gallery

Client:
Nawal

Criterion G:
Nawal designs clothes. However, nobody is able to see these designs. I would like to do a project that would be her designs more accessible to other people.

Criterion H:
Two ways that I can do this are by making a website or a video presentation with her designs. I can use a web design program to design a website that displays Nawal's designs with a description. For the video presentation, I can display the sketches that Nawal drew as well as an outfit or two that she has made, and let her show them off. This could also possibly be viewed by colleges when she comes to apply to a fashion one.

Tuesday, December 1, 2009

TechReflect: Telecommuting

Discuss the advantages and disadvantages of telecommuting.
Telecommuting has several advantages and disadvantages. Some of the advantages of telecommuting include increased work productivity, environment protection and more flexibility. Telecommuting is basically working from home and connecting to company computers by modem. Telecommunication reduces traffic on the road and makes for less car accidents. Pollution decreases and energy is saved. Telecommunication also allows for a more flexible schedule. The worker can work at a time that suits him and that he is most productive at, instead of adhering to a strict schedule. This is also beneficial to parents with young children. Telecommuting also has disadvantages. The worker may get distracted at home with children, chores and errands and may not get the work done. On the flip side, they may spend all their time working and not spend time with their families and complete chores and errands. Also, if several workers are telecommuting, ties to the company and to co-workers may be weakened. When working at home, they are off their boss's radar and the boss may not remember him/her come promotion time. Meetings will be harder to hold. Not everybody is comfortable working at home.

Wednesday, November 18, 2009

Parts of a computer


Tuesday, November 10, 2009

HW: Review Questions

Review Questions: Pg. 420 4-10, 12-17

4. Telecommuting allows the worker to work from home on their own schedule. The times are more flexible. Also, because they are in a comfortable working environment, their productivity increases. Telecommution also benefits the environment. With more people working at home, there are less people driving to work and harming the environment. Accidents and traffic are reduced.

5. Managers use surveillance technology to keep tabs on their employees. They also use wireless handheld devices that are portable, so they can be in the office at all times.

6. De-skilling is when a job is transformed so that it requires less skill due to technology. For example, computerized screens in fast-food shops have buttons labeled "fries" rather than numbers to press. Up-skilling is when, because of automation, a job becomes more complicated. When an office adopts databases, spreadsheets, and email systems, secretaries have to know how to use them.

7. In electronic sweatshops, minorities and often women, perform mindless, repetitive tasks on computers, in large windowless rooms. Their breaks are monitored, and many health problems come from these jobs. Workers are paid little money and are oppressed in these jobs.

8. Even though more and more jobs are becoming automated, we still need someone to run the machines. Students need to be educated so they are able to perform in the jobs that they will eventually work in.

9. The goeals of education in the industrial age was to teach students the basic facts and survival skills they owuld need in for jobs in industry and agriculture. Students were expected to sit quietly and absorb facts. Today, the goals are still the same: to prepare students for their future careers. However, there is more emphasis on individual learning and more creativity, as opposed to the uniformity of before.

10. to live and work in teh information age, a student should be familiar with technology, be able to read and write, know basic mathematics as well as understand and apply concepts, know how to interact with others, be able to learn quickly, and have a strong cultural component.

12. Students and teachers use powerpoint presentations, educational software, educational games, simulations, and programming tools. They can also make video presentations.

13. Students can communicate with students in other states and countries, giving them new perspectives into what they are learning. Experts and other teachers can make "guest appearances" over videoconference. If a student is in a small area, they can join online groups for people with similar interests.

14. To ensure success, technology should be incorporated into the students lives, not simply one lab trip a week.

15. People use home computers for all kinds of things. They can work from them, manage the budget, use email and chat for keeping in contact with others, find recipes and stories, play games, do research, shop and so much more.

16. Smart cards contain microprocessors and memory. They store information such as ID information, transactions. They can be used for meal tickets, keys to access data, and replacements for food stamps and driver's licenses.

17. Many games are simulations. However, with advances in technology, home entertainment could become more interactive, with viewer controlled movies and TV.

Discussion Questions

Discussion Questions, p. 420 #4, 6, 11-13


4. For the worker, being replaced by technology would not be good as they would lose their jobs, or have their duties de-skilled. However, things in society run smoothly because of these people.


6. While I agree that students can become too dependent on computers and calculators, there is no doubt that they are extremely useful. The key is to use them in moderation. You do not need to use a calculator to add or subtract basic amounts. To some degree, we should be able to add, subtract, multiply, and divide mentally. For long complicated numbers and equations, then we should use calculators. As for computers, it is easier and faster to type and edit a paper than rewrite it several times over and over. However, people can become dependent on spell check, and instead of learning how to spell the words, they use spell check to correct everything. This leads to weak spelling ability, and when one has to write something, they will spell many words wrong because they do not have spell check in front of them.



11. In terms of technology, my use of it in school for school has only recently begun to increase. As a grade school student, the computer was only used to type up big reports and projects, or to research something that could not be found in a library. All my papers were hand-written, all research was done at the library. I did not use email. However, since the beginning of high school, most of my research is done on the internet, and most of my papers are typed. A lot of communication is done through email. I have begun to use computers for so many more things than I used to. Despite all this, I do not think that I have been really missing anything from my education. I think that because I did not use computers from a young age, I developed other important skills, like how to research in a library.

12. Yes, I think computers can strengthen families and communities, but they can also weaken them. If a family is in separate places, then the computer makes it easier for them to chat with each other and keep in contact, instead of just seeing them once every year or two or so. However, the computer can also cause division in the family. Children fight over whose turn it is to use the computer, or they may spend most of their time on the computer instead of interacting with their family around them.

13. The computers themselves cannot make people more or less creative. It is the people themselves who have to make this change. I do think, though, that due to the advances in technology, it will be easier to be more creative. Even those who are not creative may wish to try out their creativity on the new technology. The technology may make it easier for uncreative people to bring out the creativity within themselves.

Thursday, October 22, 2009

TechReflect 10/22

1- TechReflect: Imagine you were alseep for a thousand years and suddenly woke up in this technological age. What are some things that can help you get up-to-date with using technology.
To get up to date on current technology, I would go to a library and find books about technology. I would also ask a librarian for help with the technology. After I got a basic understanding, I would use the internet to research and use the various technologies available.

2- Read p.383-4. What inspired Alan Kay? What did he accomplish?
Alan Kay was inspired by Douglas Engelbart and his demonstration of interactive computing. After this, Kay began to build a personal computer. However, he wanted the personal computer to be somthing that would go everywhere and work as a calculator, calendar, word processor, graphics machine, communication device, and reference tool. Apple's Macintosh took Kay's ideas and built on them, become on the first inexpensive personal computers with his ideas. He also developed a graphical programming tool for children with Disney.

Wednesday, October 21, 2009

TechReflect

TechReflect:
a-Do you think educational games are good ways for students to learn in schools? Give examples that support your arguments.
I think that educational games are a good way for students to learn. Games make the lesson more exciting and children will pay more attention when they are interested. If they are enthusiastic, they are more likely to remember what they learned in their class. For example, there are games on Mavis Beacon that help students type. They can play a game where they must type the letters before the penguin falls off the iceberg. Or there are games for spelling. The student must spell the word correctly before time runs out, or to keep the balloon afloat until it reaches its destination.
b. Other games can help with certain skills, like training the mind to think in new ways and find new solutions. However, there are some games that are completely pointless and a waste of time, though entertaining

Thursday, October 15, 2009

Review

1- Write the URL for your blog.
http://www.aliatechblog.blogspot.com
2- What is a domain? Where does it appear in the URL?
A domain is the address of a website or the name of a host system in a network. It appears after the name of the site. For example, www.blogger.com or www.aliatechblog.blogspot.com
3- What is Boolean logic? How can you use it to find a passage of Beowulf in Old English?
Boolean logic is the system used for searching on the internet. It specifies keywords or other important things to make searches easier. It uses quotations, and words like AND and AND NOT, to specify. You can search, for example, "Beowulf Old AND English".
4- How is using the search engine helpful in different classes? Math? Arabic?
Using a search engine, we can find supplementary materials to what we have learned. We can also search for help or explanations of confusing material. We can use search engines like Yamli.com to search articles in Arabic.
5- What is the purpose of a network server?
A network server shares data, programs and other resources. They give you access to the internet and other resources.
6- Pros and cons of USB drives?
USB drives can be a backup storage. They are small and portable. However, they can get lost. They can run out of memory. They can be stolen.

Sunday, October 11, 2009

Censorship on the Internet

Least Access to Most Access:
Cuba: Most of Cuba's population does not have access to the Internet. Those that do are under much control and surveillance. The government has banned all private internet connections. Cubans must use public access points that are easier to monitor. Secondly, their is software that alerts the government when "subversive" keywords are typed. It is also made sure that political enemies and independent journalists do not have internet access to publish. There is severe punishment in Cuba for accessing the internet illegally or publishing anti-government content.

China: The Chinese government blocks all websites that are anti-government, media sites with unregulated content, sites related to Taiwan, and sites with obscenity, pornography, and criminal activity. At least 18,000 websites are blocked in mainland China.

Saudi Arabia: All internet traffic is directed to King Abdulaziz City for Science and Technology where it is filtered. Blocked sites include those that contain immoral content, and those based on directions from the Ministry of Interior. These, obviously, include anti-government sites.

Brazil: Brazil prohibits the anonymity of journalists, forbids freedom of expression, and blocks sites that are racist or offensive.

France: French internet users that illegally download copyrighted material have their internet disconnected. There is also a blacklist of sites with child pornography which service providers will have to block.

Germany: Germany is in the process of building a system for censorship, especially of sites involving child pornography

India: India has blocked approximately 17 sites, mostly pertaining to separatist groups, and defamatory content.

Japan: Japan uses filtering software to remove information it deems harmful.

United States: There are few sites blocked in the United States, although some schools and libraries use filtering software to block sites inappropriate for children.

The intent behind these restrictions is to limit repercussions against the government, especially when they oppress people. If people are forbidden from discussing the oppression of the government, then they will not know who agrees with them and will not be able to organize some sort of uprising against the government. By restricting people's access to the government, the government only gains more control over them and their lives. These restrictions, however, can also be helpful in preventing the exploitation of children, or from letting them see inappropriate content. I think that in most cases, the restrictions will work. People will be too afraid to stand up against the government, especially if there are very strict punishments (years in jail, etc.), and they have been oppressed by the government for years.

Friday, October 9, 2009

Review Questions

1- Why is file compression important on the Internet?
File compression is reducing the size of a file so that more files can fit in the same amount of disk space. This allows messages to be transferred through the networks faster.

2- What new services are available as a result of the commercialization of the Internet? What new problems are arising as a result of that commercialization?
As a result of the commercialization of the Internet, there are many new services available to users. Users are able to shop online, research topics for homework or entertainment, share files, read articles and comment on them, and communicate with one another. However, there are several issues that arise with the commercialization of the Internet. These include security, privacy, and the idea of intellectual property. Hackers are able to get into computer systems and steal people's personal information which may lead to identity theft. Regarding privacy, there are websites that have files documenting everything a person does and this information can be easily accessed. When sharing files online, people can violate copyright rules, in essence stealing from the original owners and creators.


3- Residents of the People’s Republic of China can have their Internet access blocked for a period of time if they attempt to access banned sites. Do you feel this is an effective way for the Chinese government to control people’s behavior on the Internet?
Yes, as much as I do not believe that the government should monitor and control people's behavior, I think this is an effective way of doing so. If you have tried to access a banned site and have your Internet blocked for some time, then you are not likely to do so again. People do not have the time to sit around all day waiting until their Internet is unblocked. So that they won't waste their time, they will not access the websites again.

Thursday, October 8, 2009

SMS in Kenya

What is SMS? How was it used in Kenya? What are some Social/Ethical Issues involved with it? What are some ways it could be used for Education?

SMS (short message service) is a type of messaging done over mobile devices (cell phones). It is basically text messaging. In Kenya, it is used as a part of health services combating malnutrition in children. The length and circumference of the child's upper arm is measured. All the data is collected on mobile phones, then sent to a central database via SMS messaging.
S/E Issues:
People and Machines: The things now done by the SMS system used to be done manually. Instead of the data being logged into books, it is done through computers.
Security and Privacy: All the data is stored on a central database. Health profiles of these children are built up over time. If someone hacks into the system, the privacy of these children can be undermined.
SMS messaging can be used for sending study notes, and tips for certain subjects. It can also be used for students and teachers to communicate in faster manner for help with homework.

Net Censorship and Democracy's Fall

1- Do you think Americans have a double standard when it comes to free speech and censorship? In other words, do you think Americans hold other societies to a higher standard when it comes to the right of free speech?
Yes, I do think that America has a double standard when it comes to free speech and censorship. The government only believes in free speech when it benefits them. As soon as something negative is said, it is censored. There is also the matter of tapping phone calls and snooping into people's private records and information. Then America turns around and denounces censorship in other countries.


2-Do you agree with Dvorak that "all censorship mechanisms are bad for society"?
No, I do not agree. Some censorship is necessary, such as censoring inappropriate content from television or places that children have easy access to. I do think, though, that people should have the right to give their opinion freely about whatever event without fear of it being censored by the government.


IT Systems:
This issue affects the internet, television, and other communication systems.


S/E Issues:
Privacy: With the government tapping phone calls and snooping through telephone and email records, people will be more careful about what they say, possibly lying in order to protect themselves from negative repercussions.
Reliability: Let's say that you bought a product from a company and had a negative experience throughout the whole process. So you go to the website and post a comment detailing your negative experience and warning prospective customers. If the company censors the comments, then all prospective customers visiting the site will not see any negative comments, and will think they will have a positive experience. This does not portray an accurate view of the company.


AOIs:
This issue affects all the areas of interaction, especially those that have to do with the internet.

Chapter Review A

Explain how and why the Internet was created.
The Internet was created in the 1960s. It started with ARPANET, Advanced Research Projects Agency NETwork. It was basically a group of computers networked together. ARPANET was disbanded in 1990, but its technology started the Internet. The network of computers grew bigger and bigger to include the international community. The Internet was created as a project by U.S. military strategists who were afraid of an enemy attack that would render the government unable to communicate with eachother. The government wanted a network that could function even after connections were destroyed.

Describe the technology that’s at the heart of the Internet:
The technology at the heart of the Internet is called the TCP/IP protocol, or the transmission control Protocol/Internet Protocol. TCP/IP was developed as an experiment in connecting different types of networks and computer systems. The TCP protocol is like a postal system. When you send a message on the Internet, it is divided into packets which has all the information routers need to transfer the packet from network to network until it reaches its destination. The packets may follow different routes, however, at the end, they all reach the destination where they are reassembled into the original message. The IP protocol is the addressing system of the Internet. Every computer has an IP address, a string of four number separated by periods. IP addresses can be static, or a permanent address, or dynamic, used for computers temporarily connected to the Internet. THey recieve a new address everytime they log on.

Describe the technology that makes the Web work as a multimedia mass medium.
Plug-ins are available through Web browsers. These plug-ins download new features onto their computer that allow them to use different mulitmedia and applications on the Web.

Discuss the tools people use to build Web sites.
People use many tools to build websites. People can use codes such as HTML and XML in any word processor and publish that, or they can use some of the many availabe web-authoring softwares, like Macromedia Dreamweaver and Microsoft FrontPage.

Discuss the trends that are changing the Internet and the way people use it.
As more people log on to the Internet, it rapidly changes. People use the internet for communication, entertainment, shopping, sharing music, movies and other files, and watching or reading the news.

Discuss some of the most important social and political issues raised by the growth of the Internet.
Some social and political issues raised include equality of access, the abuse of freedom and censorship. Not everyone, especially those in low-income communities, are not able to access the Internet or even buy a computer. People are able to share files through the internet. This may lead to copyright issues as people share files protected by copyright. This in turn hurts those who supply these products the legal way. Also, governments may choose to block a website because of objectionable content.

Describe various ways that governments restrict access to the Internet.
Governments have certain websites, or topics blocked so that when they are searched, these websites are blocked.

Wednesday, October 7, 2009

TechReflect

How easy/difficult is it to use RSS? Find 2 online applications that display feeds. How difficult is it to use RSS (can a clue-less web browser figure out how to use it)? Post a picture of the icon used for RSS.
RSS is a type of push technology that delivers website updates straight to the subscriber. Suscribers to websites run RSS reading browsers that periodically visit the websites, examine the feeds, and display the new content. This makes it easier on the subscriber as they don't have to check all the different websites to see if they have been updated. RSS is relatively easy to use. Instead of checking all the different blogs I read to see if they have been updated, I can see when they have been updated when I log into my Blogger.com account.
These two websites use RSS: http://acpitgs.wordpress.com/classhw/, as well as our own blogs if we subscribe to other blogs.

Review: What is Boolean Logic?
Boolean logic is a complex query structure used by most search engines. For example, one can search "american AND indian AND NOT cleveland" to focus the search on Native Americans. Boolean logic allows a person to be very specific in their searches in order to find exactly what they are looking for.



Push and Pull Technology, RSS

Push and Pull Technology:
In pull technology, browsers on the user's computers pulls information from servers. The browser must make a request before any information is delivered. Push technology is the opposite. Push technology automatically delivers information to the computer. You subscribe to a service and specify the information you want to recieve. The server then delivers this information periodically. This can be used for news headlines, or getting the latest software upgrades.

RSS:
RSS stands for Really Simple Syndication. It is an XML-based format for sharing data. RSS check the websites or feeds that people subscribe to and send the subscriber all the new content, as opposed to the subscriber having to check several different websites to see if they have been updated.

Monday, October 5, 2009

Web Sites HW

So for homework we made two different web pages, one using basic HTML on Notepad, and the other on a Microsoft program. I used Word.
While using the HTML code, I had to research the different codes used for different features of the website and type them in. Sometimes they did not work, and in the end, when I tried to view the web page, it did not work. However, it was much easier using Word. I simply placed everything in their place and published as a a web page. One bad thing though, was that while I had placed the things in columns in Word, those columns were not shown or used on the web page.
Both HTML and the Microsoft program were useful. However, as much trouble as HTML code is, it is also a lot easier than rearranging all the elements around. With HTML code, one simply has to type the command in, and it arranges itself. The bad thing about this is that you have to memorize the code if you are going to use it frequently. Also, the page may not load when you are finished.

Technology in Schools

Technology that schools have:
  • The Activboard
  • Textbooks on CD
  • Personal student computers
  • SmartBoards in every classroom
  • Video announcement/PA systems
  • personal iPods

Wishlist:

  • classroom smartboards
  • student laptops

Friday, October 2, 2009

Email Addresses and URLs

What do email addresses and URLs have in common?
A web URL is the address of the Web server that holds the page. Email addresses use the domain name system to find the Internet location of the host computer that has that user's email server.

Thursday, October 1, 2009

Review: Internet Connections

a) How does the type of Internet connection influence the things you can do on the Internet?
There are several types of Internet connections. There are direct connections, dial-up connections, and several types of broadband connections. Direct connections are used mostly by school's and businesses. They allow you to store files on the computer and not on a remote host. Response time is much faster which means it is easier to transfer large files quickly. A computer with a direct connection is always connected to the Internet and have static IP addresses. Computers with dial-up connections are temporarily connected to the Internet and are given a temporary IP addresses. Dial-up uses a modem and telephone wires. Service is much slower and less reliable than that of a computer with direct connection. Speed is limited by the modem. It is used mostly in small business and houses. Broadband connections have a higher bandwidth than standard modem connections. The speed is relatively fast, comparable to the speed of a direct connection. Also, the Internet is always on and available at any time. Both static and dynamic IP addresses are available.

b) Choose 2 areas of impact to discuss 1-2 (in total 3) social & ethical issues related to Internet connections.
AOI: Business & Employment
S/E Issue: Globalization and Cultural Diversity
Many businesses have websites about their companies. They conduct business all around the world. They use the Internet to communicate with employees and well as business counterparts. With Internet connection, a business in California can communicate with another company in Japan that they are doing business with. The Internet allows business to expand into other parts of the world and participate with businesses in many different countries.

AOI: Education
S/E Issue: Intellectual Property, Equality of Access
In most schools, students use the Internet for research for projects and other homework assignments. The Internet is used by students to email each other questions about homework as well as articles they may find necessary for their project. However, students who may be homeless or live in a low-income area may not have access to the Internet or even a computer. This affects their education as they are not able to complete their work or study, which makes their grades drop. Also of concern, is that students with Internet connections may plagiarize information from the Internet into their assignments. They may copy/paste directly into their assignment or even worse, may buy a paper off the Internet.

Wednesday, September 30, 2009

Why is it hard to determine how big the Internet is today? Give several reasons.
The Internet connects millions of computers all over the world. Every year, millions of new users join the Internet and new connections are added all the time. The Internet does not have one main control center that has access to all user activity and all happenings. There are no boundaries to the Internet. There are many different ways of connecting to the Internet, each way with its own class of service and degree of interactivity.
Why are TCP/IP protocols so important to the functioning of the Internet? What do they do?
TCP/IP protocols are protocols that allow the transfer of information between different networks and computers. The TCP protocol works as a sort of postal system, transferring information in packets across connections and networks, until they reach their destination. The IP protocol is the address system of the Internet. Each computer has its own unique IP address. Computers are recognized by these. This is how the information that the TCP protocol transfers knows where to go.

Thursday, September 10, 2009

Cookies

HOW STUFF WORKS: Cookies

What is a cookie?

A cookie is a piece of text that a web server stores on a user's hard disk. They allow a web site to store information on a user's machine and later retrieve it. The information is stored as a name-value pair. A name-value pair is just a named piece of data. It cannot do anything. A website retrieves the information that it has placed on your machine.

How does a cookie work?

Basically, cookie data is the mane-value pairs stored on your hard disk. A website stores the data and later takes it back. Websites cannot look at any other cookie or take any other information from the machine. This is how it works. When you type a Website URL into the browser, the browser sends a request to the website for the page. When the browser does this, it looks on the machine for a cookie file for that website. If it finds a cookie file, the browser sends all of the name-calue pairs to the server. If it doesnt find a cookie, then it doesnt send any data. You can set an option in your browser so that it informs you everytime a site sends name-value pairs. They can be accepted or denied.

How do websites use cookies?

-To determine how many people actually visit the site

They can also see how many visitors arrive, how many are new vs. repeat visitors, and how often a visitor visits.

-To store user perferences

-Shopping sites can use shopping carts and quick checkout options

Problems with Cookies:

-People often share machines. If you use an online store, the store will leave a cookie on teh machine and someone could try to buy something under your account.

-Cookies get erased

-People use more than one machine in a day.

Privacy Issues:

-When you buy something from a catologue, the company has your name and address, and knowledge of the items purchased. This information can then be sold to telemarketers. On a website, everything you do is tracked down. This makes the information sold to telemarketers a lot more precise. Each site has its own policy.

-Cross-site profiling: when a company, such as DoubleClick, puts small GIF files on a site that load cookies onto your machine. DoubleClick can then track your movement across multiple sites, including things you type in search engines. Profiles are then formed with all the information collected.

Tuesday, September 8, 2009

Multiple Choice ?'s

Multiple Choice Questions:



  1. D

  2. D

  3. D

  4. B

  5. C

  6. D

  7. D

  8. B

  9. B

  10. B

  11. E

  12. A

  13. C

  14. C

  15. B

Whither the Renaissance Man Discussion Questions

Discussion Questions:
  1. The author suggests that people "invest in knowledge that won't wear out." What kinds of knowledge do you think he is referring to?

The author is referring to knowledge that will always be useful. This can be knowledge about basics, or it can be more specialized knowledge. This way, if all the books in the world disappeared, the knowledge would still be passed down through the generations. Knowledge that won't wear out is knowledge that will always be useful no matter what happens. For example, knowing how to cook, to build, to sew, is knowledge that won't wear out. People will always need to know how to do these things.

2. How could you make your own undergraduate studies more of an exploration and less of a routine?

To make your undergraduate studies more of an exploration rather than a routine, we should take classes in other subjects we are interested in, rather than only the ones we are specializing in. We should take the opportunity to take random classes and discover new things.

Thursday, September 3, 2009

Mainframes and Microcomputers

A Mainframe is a giant room-sized machine used for big computing jobs. Mainframe computers can communicate with several users simultaneously. They are used by banks. For example, when you make a deposit, a mainframe does the transaction.

A Microcomputer is basically a personal computer. It is based on a microprocessor and is meant to be used by one person at a time, unlike mainframes. They cannot perform functions and calculations as great as the mainframe can.

Wednesday, September 2, 2009

TechReflect

TechReflect: What major events before the twentieth century influenced the development of the computer?
Before the invention of the computer, humans had to do all mathematical calculations. These calculations took many hours to produce, and they were filled with mistakes. Two British visionaries imagined the building of a mechanical computers that would do these calculations faster, and with no mistakes. However, it would take another 125 years before this vision became a reality.

Automobile:
Positive:
  1. Travel is made easier.
  2. We can go longer distances in shorter times.
  3. The car industry provided many new jobs for people.
  4. The assembly line was invented.

Negative:

  1. We have become lazy and drive everywhere instead of walking or biking.
  2. Most cars run on gasoline, whose exhaust harms the environment.
  3. Natural gas is running out because of excessive use by cars.
  4. Many people die due to car accidents.

Television:

Positive:

  1. We can see the news happening all over the world.
  2. It provides us with entertainment.
  3. There are several educational channels that can teach us many new things about the world around us.

Negative:

  1. Inappropriate and objectionable content is often shown on TV.
  2. We become lazy and gain weight from watching too much television.
  3. From the many shows and programs, people can gain an unrealistic view on life and be living with their heads in the clouds.

As a result of the invention of these machines, our lives have, no doubt, changed very much. However, whether it was for the positive or negative can be argued. I think that the invention of the automobile was very beneficial. Before the car was invented, people traveled around on animals, and in carriages. Travel was limited by how fast and how far an animal could take you. The car made it easier for people to travel farther distances in shorter amounts of time. People are now able to drive from one coast to the other in about a week. Before, it might have taken months or even years. The car allows us to visit family and friends whom we might otherwise not be able to visit. The television, is both positive and negative. Through it, we can view events that are happening around the world. We can also watch shows that will keep us entertained. However, these shows often contain foul language and inappropriate content. I think that as Muslims, the harms of the television outweigh the benefits. While our life has benefitted from the car, I don't think that the television has benefitted our life as much.

The Computer has many positive and negative effects. Among the positive is that through computers, we can access the internet. We have email through which we can talk to relatives and good friends who may live far away in a timely manner. We can also research information for projects or out of curiosity. Their are programs on the computer that allow us to type up papers instead of handwriting them, making them faster to write and easier to edit. However, once the computer is in our life, we become dependent on it. The computer may crash, or have viruses, destroying our work and not letting us do anything else with it. Also, through the internet, we may gain incorrect information and inappropriate content.

Wednesday, August 26, 2009

IT systems in the News

http://http://tech.yahoo.com/news/ap/20090825/ap_on_hi_te/us_tec_sony_e_books

Sony is planning to release an e-book reader offering the ablility to wirelessly download books. It has a 7-inch touch screen and can get books and newspapers over AT&T's wireless network. Sony's e-book differs from the Amazon's Kindle in that it has an open e-book standard. This means that readers can get books from a variety of stores and move the books to other devices such as cell phones. Sony will also be loaning books from public libraries that are free and to be "returned" after 21 days. The Kindle, on the other hand, only displays books from Amazon's store. The devices books can be placed on are limited to the Kindle, the iPhone, and the iPod Touch.

Tuesday, August 25, 2009

Classwork: TechReflect

TechReflect:
How do you feel about computers and technology? Explain your positive and negative feelings.

Computers are very beneficial and helpful to me. I use them to type up my homework and essays instead of writing them. I use the internet to keep in contact with my friends that live far away and researching information. Computers aren't the only useful technology though. Other things like cell phones, televisions and radios play a very important part in my life. Technology allows us to keep in contact with others, know what is going on around the world, and do things in an easier way. I like technology most of the time. However, sometimes I have trouble understanding how to work new gadgets and adjusting to having them in my life. Also, sometimes they replace jobs that people would normally do, leading to unemployment. Or they do a job that we could otherwise do on our own, contributing to laziness and obesity.

Monday, August 24, 2009

IT Triangle Approach

Section 2: IT Systems in a Social Context
Projectors are very important at our school. They are used to project the day's lesson onto the board for students to copy down. Most teachers have opted to use PowerPoint presentations to present the lesson instead of writing it on the board. This makes it easier for the teachers to teach. However, it can also be troublesome for the school, because they have to purchase the projectors, and pay for their electricity consumption as well as any repairs they may require.

Section 1: Social and Ethical Issues
The use of the projectors in the school raises several issues. First is that of equality of access. If the school does not have enough money, then not every teacher will be able to have one. This might make some teachers feel unhappy or left out. Second is policies. Who will be allowed to use the projectors? Will there be times when projectors should not be used? And lastly, is people and machines. While this machine makes it easier for the teacher, it might make learning more impersonal for the student.


Section 3: Areas of Impact:
Education: It makes it easier for teachers to teach the lesson, rather than standing in front of the board and writing all day, hurting their arms.
Negative: Using the projector might make the students not pay attention or feel like they aren't truly being "taught". This might result in lower class participation and lower overall grades.

Sunday, August 23, 2009

Online Communities

Five popular online communities include:


  1. Facebook: keeping in touch with friends nearby and far away, meeting new people

  2. Twitter: having information readily available in easily processed bytes

  3. Myspace: keeping in touch with friends, sharing pictures and information

  4. Flickr: photosharing

  5. Youtube: sharing videos for education and entertainment

Privacy and Anonymity on Facebook:


Privacy is the ability for individuals and groups to determive when, how and to what extent information about themselves is shared with others. On Facebook, there is not much privacy. Comments can be seen by all. Also, with people being able to post pictures, there may be inappropriate pictures posted, or pictures of people who do not want their picture taken. Individuals whose pictures are taken without their knowledge are not able to control how it is shared. They may not want pictures of themselves distributed. People may also make fake accounts pretending to be someone else. These fake accounts may be used to harass people.

Thursday, August 20, 2009

ITGS Map








Wednesday, August 19, 2009

Death Star as an IT System

Equality of Access:

Death Star is in outer space. Reaching Death Star is only possible for those with spaceships. However, Death Star makes itself available to everyone when it decides to destroy another planet, or such. Death Star is also made available to those who belong to the Sith. All of them are able to access headquarters. If you are not a Sith, you do not have access.



People and Machines:

Death Star is controlled by the Sith. I would assume the design is safe and effective, as long as you didn't make an enemy of it. This machine takes away the jobs of humans. Instead of them personally going and fighting, the machine beams a killing beam at what it needs destroyed. However, this machine does not think for or control itself. It needs a human to control it.

I really hope that this is what you wanted. :)

Tuesday, August 18, 2009

Computers in our Life

Computers play a major role in my life. I use them to type homework and other assignments. I use the internet to check my email and keep in contact with friends who live far away. I also use the internet for research for assignments and homework. When I get bored, I play games on the computer. Computers are a very useful and vital component of my life.