Thursday, May 6, 2010

Key Terms--Integrated System

robot: computer controlled machines designed to perform specific tasks
android: an automaton that resembles a human being
cyborg: a cyber organism: a living organism with biological and machine components
sensors: A device that enables digital machines to monitor a physical quantity of the analog world, such as temperature, humidity, or pressure, to provide data used in robotics, environmental climate control, and other applications
AI: The field of computer science devoted to making computers perceive, reason, and act in ways that have, until now, been reserved for human beings.
Turing test: a way to test machine intelligence
parallel processing: using multiple processors to divide jobs into pieces and work on the pieces simultaneously
machine learning: Artificial intelligence techniques that make it possible for machine performance to improve based on feedback from past performance.
natural language: language that people speak and write each day
common-sense knowledge: the collection of facts and information that a person is expected to know
agent: Software programs that can ask questions, respond to commands, pay attention to users’ work patterns, serve as a guide and a coach, take on owners’ goals, and use reasoning to fabricate their own goals.
pattern recognition: identifying recurring patterns in input data with the goal of understanding or categorizing that input
expert system: Information systems or software programs designed to replicate the decision-making process of a human expert.
knowledge base: a database that contains both facts and a system of rules for determining and changing the relationship among those facts
inference engine: a computer program that tries to derive answers from a knowledge base
heuristics: a rule of thumb
fuzzy logic: A type of logic that allows conclusions to be stated as probabilities rather than certainties
knowledge engineer: an engineer who obtains knowledge from human experts and organizes it into a knowledge bas for an expert system
domain:

Friday, April 30, 2010

Friday Notes

EMR/EHR: Electronic Medical/Health Records
-nurse takes information, charts it. All this has been moved to the computer. Easier to locate patterns, access information. Doctor's handwriting messy, technicians get confused, mess up drug prescriptions, lab results, etc.
CCD: Continuity Care Document: medical records to be transported

Tuesday, April 27, 2010

Review Questions 2-6

2- Bitmapped graphics are maps showing how the pixels on the screen should be represented. Object-oriented graphics store pictures as a collection of lines and shapes as opposed to a collection of dots. The disadvantages of bitmapped images is that the bit depth limits an artist's ability to create images.

3- The bit depth and resolution limit the realism of a bitmapped image. Realistic color graphics need more memory. They require hardware that can display millions of color at one time. Also, some computers can not display every pixel at high resolutions.

4-Digital image processing edit images. Digitial photos are bitmapped images. Digital image processing software manipulate these images.

5- 3-D modeling and CAD software can be used by graphic designers to create 3D objects. They can be rotated, stretched, and combined with other objects to create complex 3D scenes. These scenes can then be navigated around, to view it from different angles. This is used in animated movies like Finding Nemo. CAD allows engineers to design products.

6-Image compression is an important part of digital video technology because digital data can take up a lot of storage space. Compression allows the data to be stored in a smaller space with slight loss in quality.

Tuesday, April 20, 2010

notes ch 5

paperless publishing
Pdf- portable document format, lets all document types be edited, moved and etc. on any system
copyright protection: posting on the web are available for anyone to read or copy and claim as their own
ebook: a handheld device that contains all kinds of written material like newspapers and books
epaper: a flexible, portable, paper-like material that displays black and white text and images on its surface, can erase itself and show new material as readers "turn" the page
spreadsheet software enables to the user to control numbers, spreadsheet programs siplify calulations
worksheet: spreadsheet doc that appears on screen with grids of numbered rows and lettered columns
each box that is an intersection of row and column is called a cell
values: raw material spreadsheet software uses to perfurm calculations
functions are set calculations
macros are custom-designed procedure programs that automates tasks in application
auto recalculation changes all data related to a change
templates:ready to use worksheet layouts
automatic links: when something changes, all linked worksheets update automatically
pie charts: show relative proportions of parts to the whole
line charts: show trends over time
bar charts: like line graphs, better for when data falls into more categoreies
scatter charts: used to discover a relationship between two variables
guidelines to prevent errors:
-plan worksheet before you enter values and fomulas
- make assumptions as accurate as possible
- double-check everything
-make formula readavble
- take advantage of programmed functions and templates

most businesses use accounting and financial management software instead of spreadsheets
mathematics-processing software: for those whose math needs go beyond capabilities of basic spreadsheets. include interactive wizard
statistics: the science of collecting and analyzing data
statistical sofware helps answer questions
scientific visualization software: uses shape, location in space, color, brightness and motion to help understand relationships that are invisible to us.
modeling: the use of computers to create abstract models of objects, organisms, organizations, and process that can be done with spreadsheets, mathematical applications or standard programming languages
abstraction: a set of concepts and ideas
feedback loop: the user and computer responding to data from each other
Desktop publishing: producing a book magazine or any other publication
source docs:use standard word processors and graphics programs to produce these documents
template: professionally designed empty page
DTP can be used by all kinds of people, both big business and regular people
Computer simulation and visualization
can come in forms such as numerical data or graphical representation
the human body was cut up, photographed, digitized and put together
a computer can be used as a visual lab that simulates physical process without any hands-on, real-world experiments
computer modeling- the use of computers to create abstract models of objects, organisms, organizations and processes
abstraction: a set of concepts and ideas designed to mimic some kind of system

Monday, April 19, 2010

Key Terms

  1. WYSIWYG: short for "what you see is what you get". Basically, in a word processor, words appear on the screen almost exactly as they will appear on a printed page.
  2. Justification: the alignment of text on a line
  3. Headers: a block that appears at the top of every page in a document, displaying repetitive information like a chapter title.
  4. Footers: block of information that appears on the bottom of every page in a document, displaying repetitive information such as an automatically calculated page number
  5. Stylesheets: custom styles for each of the common elements in a document
  6. Automatic Footnoting: a word processing feature that places footnotes where they belong on the page
  7. Automatic Hyphenation: a word-processing feature that divides long words that fall at the end of lines
  8. Automatic Formatting: (autoformat): a word processing feature that applies formatting to the text
  9. Automatic Correction (autocorrect): a word processing feature that catches and corrects common typing errors
  10. wizards: a software help agent that walks the user through a complex process
  11. HTML: an HTML document is a text file that includes codes that describe the format, layout, and logical structure of a hypermedia document.
  12. Outliners: software that facilitates the arrangement of information into hierarchies or levels of ideas. some word processors include outline views that serve the same function of separate outliners.
  13. Outline View: the outliner option built into Microsoft Word, which enables the user to examine and restructure the overall organization of a document, while showing each topic in as much detail as you need.
  14. Thesaurus: a synonym finder; often included with a word processor
  15. Spelling Checker: a built-in component of a word-processor or a separate program that compares words in a document with words in a disk-based dictionary, and flags words not in the dictionary. may operate in batch mode, checking all the words at once, or interactive mode, checking one word at a time.
  16. Grammar and Style Checker: component of a word-processing software that analyzes each word in context, checking for content errors, common grammatical errors, and stylistic problems
  17. Mail merge: a feature of a word processor or other program that enables it to merge names and addresses from a database mailing list into personalized form letters and mailings.
  18. Groupware: softare designed to be used by work groups rather than individuals
  19. Speech-recognition software: the identification of spoken words and sentences by a computer, making it possible for voice input to be converted into text files.
  20. Desktop Publishing (DTP): software used mainly to produce print publications.
  21. Source documents: in DTP, the articles, chapters, maps, drawings, charts, and photographs that are to appear in the publication
  22. page-layout software: in desktop publishing, software used to combine various source documents into a coherent, visually pleasing publication
  23. kerning: the spacing between letter pairs in a document
  24. leading: the spacing between lines of text
  25. templates: in DTP, professionally designed empty documents that can be adapted to specific user needs.
  26. spot color: the relatively easy use of a single color (or sometimes two) to add interest to a DTP product
  27. full-color: a desktop-published document that uses a wide range of color
  28. camera-ready: typeset quality pages, ready to be photographed and printed
  29. Portable document format (PDF): allows documents of all types to be stored, viewed, or modified on any Windows or Mactinosh computer, making it possible for many organizations to reduce paper flow
  30. electronic book: a handheld device that displays digital representations of the contents of books
  31. electronic paper: a flexible, portable, paper-like display
  32. spreadsheet software: enables the users to control numbers, manipulating them in various ways. this software can manage budgeting, investment management, business projections, grade books, scientific simulations, checkbooks, financial planning and speculation, and other tasks involving numbers
  33. worksheet: a spreadsheet document that appears on the screen as a grid of numbered rows and columns
  34. columns: along with rows, comprise the grid of a spreadsheet
  35. cell: the intersection of a row and column on the grid of a spreadsheet
  36. address: in a spreadsheet, the location of a cell, determined by row number and column number
  37. value: the numbers that are the raw material used by spreadsheet software to perform calculations
  38. labels: in a spreadsheet, a text entry that provides information on what a column or row represents.
  39. formula: step-by-step procedure for calculating a number on a spreadsheet
  40. replication: automatic replication of values, labels and formulas, a feature of spreadsheet software
  41. automatic recalculation: a spreadsheet capability that allows for easy correction of errors and makes it easy to try out different values while searching for solutions
  42. functions: a predefined set of calculations such as SUM and AVERAGE in spreadsheet software
  43. macros: custom-designed, embedded procedure program that automates tasks in application programs
  44. automatic links: a link between worksheets in a spreadsheet that ensures a change in one worksheet is reflected in another
  45. equation solver: a feature of some spreadsheet programs that determines data values
  46. pie charts: a round, pie-shaped chart that show the relative proportions of the parts to the whole
  47. modeling: the use of computers to create abstract models of objects, organisms, organizations, and processes
  48. abstraction: a set of concepts and ideas designed to mimic some kind of system
  49. scientific visualization software: uses shape, color, location in space, brightness and motion to help understand relationships that are invisible to us. can come in forms of numerical data or graphical representations.
  50. statistics: the science of collecting and analyzing data

Monday Lecture notes

Reliability:
-no errors
-does what its supposed to do
-no "bugs", bug-free. bugs=errors
-performs the way we expect it to

Integrity:
-when a virus is introduced into a software, the software does what the virus wants it to do, not what its supposed to do.
-denial of service: a device has a limitation that caters to a certain amount of people. if the request for the service suddenly increases, the sevice will break. DoS is a program that accesses web servers many times per second and makes the server shut down,

Security:
-authentications--usernames and passwords
-boxes with letters to prevent DoS attacks
-installing anti-viruses and firewalls (DeMilitarizationZone), encryption
-data in flight-is traveling, out of firewalls/protection etc., data at rest-within firewall, data center, protection
-HTTPS means it is secure

Wednesday, April 14, 2010

Key terms

  1. information: anything that can be communicated
  2. data: information in a form that can be read, used, and manipulated through a computer
  3. database: a collection of organized information stored in an organized form on a computer
  4. distributed database: data strewn out across networks on different computers
  5. relational database: a program that allows files to be related to each other so changes in one file are reflected in other files automatically
  6. object-oriented database: instead of storing records in tables, stores software objects that contain procedures (or instructions) with data
  7. object: in object-oriented databases, a data structure defined according to its class
  8. centralized database: a database housed in a mainframe computer, accessible only to information-processing personnel
  9. database management system (DBMS): a program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.
  10. database program: a software tool for organizing the storage and retrieval of the information in a database
  11. database server: a powerful computer for holding and managing an interactive, multi-user databse
  12. export data: transmitting records and fields from a database program to another program
  13. dirty data: data records with spelling mistakes, incorrect or obsolete values, or other errors
  14. data scrubbing/cleansing: the process of going through a database and eliminating records that contain errors.
  15. data mining: the discovery and extraction of hidden predictive information from large databases
  16. data translation software: software that enables users of different systems with incompatible file formats to read and modify each other's files
  17. data warehouse: an integrated collection of corporate data stored in one location
  18. data warehousing: software used to create and maintain large databases
  19. field: each discrete chunk of information in a database record
  20. field type: the characteristic of a field that determines the kind of information that can be stored in that field
  21. date field: a field containing only dates
  22. numeric field: a field containing only dates
  23. computed field: in a database, the field containing formulas similar to spreadsheet formulas; they display values calculated from values in other numeric fields
  24. key field: a field that contains data that uniquely identifies the record
  25. list view: showing data by displaying several records in lists similar to a spreadsheet
  26. form view: a view of the database that shows one record at a time
  27. record: in a database, the information relating to one person, product, or event
  28. search: looking for a specific record
  29. file: an organized collection of related information stored in a computer readable form
  30. file manager: a program that enables users to manipulate files on their computers
  31. query: an information request
  32. query language: a special language for performing queries, more precise than the English language.
  33. stored query: a commonly used query recorded by a database so it can be accessed quickly in the future.
  34. structured query language (SQL): a query language available for many different database management systems. More than a query language, SQL also accesses databases from a wide variety of vendors.
  35. sort: arrange records in alphabetic or numeric order based on values in one or more fields
  36. report: a database printout that is an ordered list of selected records and fields in an easy-to-read form
  37. record matching: compiling profiles by combining information from different database files by looking for a shared unique field
  38. select (records): looking for all files that match a set of criteria
  39. personal information manager (PIM): a specialized database program that automates an address/phone book, an appointment calendar, to-do lists, and miscellaneous notes
  40. privacy: freedom from unauthorized access to one's person, or information about one's person
  41. identity theft: the crime, committed by hackers and other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards
  42. batch processing: accumulating transaction and feeding them into a computer in large batches
  43. baud rate: a speed of data transmission; not necessarily equivalent to bits per minute, the preferred measurement for high-speed modems
  44. data transfer rates: the speed at which a drive can read or write data
  45. browse: the process of finding information in a database or other data source
  46. class: in an object-oriented database, the data contained in the object as well as the kinds of operations that may be performed on the data
  47. client/server: client programs in desktop computers send information requests through a network to server databases on mainframes, minicomputers, and desktop computers; the servers process queries and send the requested data back to the client
  48. Code of Fair Information Practices: called for a ban on secret government databases, citizen access to personal information kept in government databases, and agency responsibility for database reliability and security
  49. geographical information system: combines tables of data with demographic information and displays geographical and demographic data on maps
  50. interactive processing: interacting with data through terminals, viewing and changing values online in real time
  51. real time: when a computer performs tasks immediately

Databases Review

1- Define RDBMS:
RDBMS is relational database management system. It is data that is stored in several linked databases.

2-Identify 3 tables that could be part of a doctor's office patient relational database.
Three tables that could be part of this database would be the patient's medical record number, lab test results, and his name.

3-Searching the database to find specific information is called a _query_.

4- Why are we concerned about electonic databases?
There are several concerns with electronic databases, specifically the information being used improperly or getting into the wrong hands. Their is always the worry that the information may be incorrect, or that it is not securely stored.

5- Explain 3 different types of S/E issues related to online databases.
Some S/E issues related to online databases are security, control, and authenticity. Security: If security systems on the database are not adequate, then hackers can access private information such as SSNs or credit card numbers and cause harm with them. Control: if only certain people are allowed to access the information, they might use it for their own benefit, possible illegally as well. Authenticity: sometimes databases are not updated with accurate information. The address or phone number or whatever of a person can be wrong and they will miss out on products or services that should otherwise be given to them. Also, as there are many people with the same name, it can be easy to get them confused and mix their information.

6- What is something we need to protect electronic databases from? What can be used to protect them?
We need to protect databases from hackers. We can use security software and firewalls to protect the databases.

Monday, April 12, 2010

Information Privacy

Rights of individuals w respect to storage of personal data:
-problems with security of biometrics
-some say it protects against crime, some say it is a violation of our rights
-Act ensures that people's information is not being used without the consent of the person.
-gvmt was given access to private personal information under PATRIOT Act.
-protection laws in US are not that strong


Social Consequences of the release of sensitive data stored in databases
-being falsely accused of a crime
-sensitive data includes: SSN, credit card number/banking information, tax information, credit reports
-data stays on hard drive of computer, it can be easily recovered if you are not careful.

Ethical Issues related to Selling Data in Databases:
-databases are filled with information that is sold to all kinds of people
-issues of privacy and security
-personal data such as SSN, credit card numbers etc are stored. however, databases sell the information to companies.
-owners will not feel secure and fear identity theft.
-laws require protection for protection of information, and maintainance of accurate information

Paper Files vs. Electronic Files:
-electronic files are easier for searching for a file
-makes it easier to look at a file: with paper, only one person can look. with el files, many people can access them
-people can steal information from databases from anywhere.
-data is not really deleted unless you override the hard drive

Responsibility for the Security of Data Stored in Databases (from different perspectives):
-there are many many database breaches
-recognize the type of information being stolen, freeze the account
-software are bieng used to fight data theft, secure networks, safeguard database integrity
-be careful of the information you disclose to others

Social Consequences of Outdated or Incorrect Information in Databases:
-relational databases have similare field that contain all info about one perosn
-if the info is incorrect, you may not receive products or services that you should be receiving
-also, you can get the wrong services or products if it is confused with other people's information

Friday, April 9, 2010

Friday Notes

  • Databases: files -> fields -> records
  • Human basic needs and instincts haven’t changed
  • Logic is not equal to thinking
  • Thinking looks around the reality, analyzes the situation at hand. Logic is good in math, science, etc. but not in human interactions and religion
  • A query pulls specific information from a table


Tuesday, April 6, 2010

Ch. 7 Review Questions 2-6

2- What is the difference between a file manager and a database-management system? How are they similar?
A file manager is a program that enables users to work with one file at a time. A database-management system is a program or system of programs that can manipulate data in a large collection of files. Both store files and make information easier to access, however, DBMS is better for large, complex jobs.


3- Describe the structure of a simple database. use the terms "file", "record", and "field" in your description.
A database is a collection of records, information related to a person, product or event. Each separate chunk of information in a record is called a field. A file is the entire collection of data stored on the computer.

4- What is a query? Give examples of the kinds of questions that might be answered with a query?
A query is a request for specific information. The query can be for a specific record, like a recipe for banana bread, or it can be a search for all records that match a specific set of criterion, like all recipes for sweet breads.

5- What steps are involved in producing a standard multi-column business report from a database?
A business report would be composed of an ordered list of selected records and fields organized so they are easy to read and understand. They would include information as well as any calculations and numbers organized in columns and rows.

6- What are the advantages of personal information management software over paper notebook organizers? What are the disadvantages?
The advantages of using personal information management software (PIM) over notebook organizers are that PIM s are faster and easier to use for busy people. They work on portable computers and handheld devices. Also, pocket-sized devices can connect with PIM software on a PC or Mac. This way the device can stay up-to-date wherever the user is. On the downside, if the handheld device is lost or stolen, whoever has it can access all the information stored on the device. If the user is especially dependent on it, then he/she will be lost without it. Also, the information can be hacked if the user is using a Web-based PIM.

Wednesday, March 24, 2010

5 key terms

shareware: is software that is free for the trying, with a send-payment if-you-keep-it honor system.

public domain: creative work or intellectual property that is freely usable by anyone, either because the copyright has expired or because the creator obtained a Creative Commons license for the work.

freeware: software that is free for public use.

commercial software: software that is designed and developed for sale to the general public, or that serves commercial purposes

integrated software: software that combines several most commonly used applications into one package

Review Questions:
2- Compilers and other translator programs compile a complete translation of the program in a high-level computer language before the program runs for the first time. Software applications allow users to control computers and perform certain actions without being a programmer. System software is software that handles details such as which parts of the computer's memory hold a document. It includes the operating system and utility programs.

3- The operating system must be first installed because it is what communicates with the hardware and makes using software possible.

5-A single-user operating system allows the user to run multiple applications at the same time by creating tasks. Since the CPU can only perform one process at a time, the OS does task scheduling. It also manages virtual memory. Multi-user OSs are responsible for authentication (user names and passwords) and authorization (allowing only those with adminstrative priviliges to install or uninstall application programs).

Review Discussion questions p 134

Review and Discussion Question #1:
What is the relationship between a program and an algorithm?
1- An algorithm is a set of step-by-step procedures for accomplishing a task. A program starts out as an algorithm.

In what way is writing instructions for acomputer more difficult than writing instructions for a person? In what way is it easier?
1-Writing instructions for a computer is more difficult than writing instructions for a person, because for the computer, one has to be extremely specific and detailed with the instructions. Everything has to be clarified to ensure that no mistakes are made. No vague or ambiguous language can be used. It is easier because with this level of clarity, it is unlikely that mistakes will be made, and misunderstandings will be decreased.

Wednesday, March 3, 2010

E-commerce questions

Score: 95%

Wednesday, February 24, 2010

IB practice

1- Computer-based translators often perform translations rather badly because they are programmed to translate words, not paragraphs. The translator does not know the proper grammar and sentence structure, and cannot translate a full paragraph properly. It translates word for word instead. If the person using this translator were to translate the words they did not know, and put them in the proper sentence structure, the translation would probably turn out better.

Language use can be variable so translation is not precise. word by word translation, no context, synonyms, colloquial use of language. Different word order,

2- Markup language is the language of the internet. It writes the webpage to be published.

is a text-based languge in web pages. tags are inserted in text of page to tell a web browser how to display the text on a user's screen. the coding is then interpreted by a computer program. the info is presented so it is accessible across a wide variety of hardware and other applications

Wednesday, February 17, 2010

Electronic commerce and business Questions

a) Is e-commerce possible without the Internet? Explain.
No. E-commerce is, by definition, the conduction of business through telecommunication systems. These days, it is almost completely done by Internet. Without the internet, it would be very hard to conduct business. There would be no website to visit, no emails to send.

b) Describe the 3 forms of e-commerce
Business to business: B2B- where a company handles transactions with other businesses and organizations such as its suppliers.
Business to consumer: B2C- retail transactions between an company and individual customers. Examples are amazon.com and other websites that sell to customers through a website
Consumer to Consumer: C2C- individuals, organizations and companies that buy and sell directly with each other over the internet. Example: Ebay

c) What are the purposes of an intranet? What are the main characteristics of an intranet?
The intranet serves to improve communications within an organization, and provide easy access to information. Characteristics include at least one computer with server software installed, and other computers with client software installed, both with TCP/IP. A LAN or WAN is also needed. Middleware handles the communication connections between computers, printers and other devices on the networks. TCP/IP handles communication between client and server computers. Firewalls are used to secure the system.

Tuesday, February 16, 2010

IB Test Practice

1- Two input devices that would be used in a pilot training computer simulation are a joystick or a wheel to control the machine and a keyboard or mouse to navigate around the screen and select the simulation to be used.


2- An advantage of schools providing students with USB drives is that students who might otherwise not be able to purchase them will be able to have access to one, and all the students will have equal access to this device. A disadvantage is that students may lose the drives, requiring replacement, or misuse them, saving non-school related material on them.


Key terms

Intranet: an intraorganizational network that is designed using the same technology as the internet S/E: Equality of Access: only certain people can access this network, Reliability: if the network goes down, the entire organization is unable to communicate with each otehr

Middleware: Connectivity software linking the client and server machines, providing easy access to information. S/E: Security: Hackers can access the software and steal information

e-business: Though sometimes used interchangeably with the broader term e-commerce, here used to refer to the e-commerce activities of a particular company or organization. S/E: Globalization & Cultural diversity: People all over the world can conduct business with eachoter over the internet, without having to travel

e-commerce: business transactions through electronic networks S/E: Policies and Standards: One group or corporation can try to control all the business

Dot-coms: Internet-based companies S/E: Equality of Access: those without internet service will not be able to access these companies, or do business with them.

Mobile commerce: the ability to commerce/business using a mobile device S/E: Security: Information may be easily stolen if the device is stolen

Thursday, February 11, 2010

Practice test questions

1- Computer simulation is the use of computers to imitate an environment that students can explore and learn in, without facing the dangers that they would face in real-life.

Answer: Computer simulations are those programs based on models (descriptions of reality) in order to imitate a certain scenario. Simulations can be used in a wide sprectrum of areas, including business (stock markets), traffic, training (especially for military purposes), communalistic matters, and the weather.

2-Bandwidth is the frequency at which information travels over a network or the Internet.

Answer: Bandwidth refers to the speed and capability of a connection (internet) to transfer a certain amount of data per unit of time. Most of the time, the unit of time are seconds and data is classified into kb. It also refers to the physical measurements of the band through which connection cables pass.

Tuesday, January 26, 2010

Criterion I

Week of 1/25- 1/31: Download Dreamweaver, look up tutorials, practice using it. Scan clothing designs and make descriptions
Week of 2/1- 2/7: Design web page, diagram process
Week of 2/8- 2/14: Design web page, diagram process
Week of 2/15- 2/21: Design web page, diagram process
Week of 2/22- 2/28: Edit/test web page, diagram process
Week of 3/1- 3/7- Finalize edits and make sure final product works

Tuesday, January 19, 2010

Discussion Questions 4-6

4- I think that email messages should be encrypted when they are sent. This way it will be harder to decode them, and those who are not willing to work too hard to get the information they want (illegally) will be discouraged. However, people bent on evil will find a way to commit it one way or another, so it doesn't make much difference whether the messages are encrypted or not.

5- No, I would not like to work in a business where I was required to wear an active badge. I like to have my privacy and I would not like my location being tracked and recorded at all times. I might as well be a cow or some other livestock or merchandise that needs to be kept track of.

6- Like missile defense systems, other large software systems would have to be completely reliable, without the chance of making a mistakes. There is also the worry that these large systems would take humans out of the equation and result in the loss of jobs.

Review Questions 10, 11

10- In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?
Computer security can protect the privacy of individuals when it blocks unauthorized users from gaining access to private information. It prevents those intent on harming others from hacking into private accounts and stealing money or information. Computer security can threaten privacy of individuals when it becomes too invasive. Companies are allowed to read through the email records of employees who use their computers, and the FBI is allowed to wiretap, go through personal conversations and emails, and do other electronic surveillance.

11- What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
Smart weapons are weapons that use computerized guidance systems to locate their targets. They are extremely accurate, but reduce time people have to make life and death decisions. If used properly, they can greatly decrease the amount of civilian damage done. If the user does not use accurate data or make a correct decision, many innocent lives can be lost, as with the example of an American guided missile cruiser using a computerized defense system to shoot down and Iranian Airbus with 290 civilians.

Monday, January 18, 2010

CrossCurrents: Risky Business

1- The author suggest that the widespread deployment of RIFID tags will be accepted by consumers if the industry makes handy RFID-reading tools available to them. Do you agree with his assessment?
At this point in technologic advancement, I think consumers will accept anything that will, or appear to, make their lives easier. People want their lives to be fast and easy, these tags will make locating things a lot easier.

2- Suppose every object costing more than $10 contained an RFID tag. Would you be interested in purchasing a hand-held RFID reader capable of helping you find lost items around your house?
No, I would not want one. The RFID reader may get confused between items. Also, if it costs more than $10, there is not MUCH likelyhood that you will easily lose it.


3- Would you embed an RFID tag in your dog or cat if that would increase your lost pet's chance of being returned to you?
No, I would not. Even if the pet gets lost, it may either come back or find a better home. I would rather not have a device that tracks and records the movements of my pet and possibly me embedded in it.

Ch 10. Review Questions

7- What are the two inherent characteristics of computers that make security so difficult?
Two inherent characteristics that make computer security so difficult are software errors and hardware glitches.

8- Describe several different computer security techniques and explain the purpose of each.
Different computer security techniques include passwords, which make the user type in a special code to gain access to a computer; firewalls, which guard agains unauthorized access to an internal network; encryption, which scrambles transmissions by apply a secret numerical code to the message; and audits, or audit-control software which monitors and records computer transactions as they happen so auditors can trace suspicious computer activity.

Wednesday, January 13, 2010

Review Questions 2, 4

2- Why is it hard to estimate the extent of computer crime?
Many computer crimes go undetected. Among those that are detected, many go unreported because businesses fear that they will lose more money from the negative publicity generated, than from the actual crime. The crime might also be covered up.

4- What is the most common computer crime? Who commits it? What is being done to stop it?
Theft is the most common computer crime. Computers are used to steal money, informations, goods, and computer resources. Criminals may steal the actual computer, or the identity of the person who owns it. The people who commit these crimes are usually trusted employees who discover a loophole and get tempted and have problems that motivate them to act on these temptations.

Tuesday, January 12, 2010

Key Terms:

computer crime: any crime accomplished through knowledge or use of computer technology


identity theft: the crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards

spoofing: a process used to steal passwords online

social engineering: slang for the use of deception to get individuals to reveal sensitive information


sabotage: a malicious attack on work, tools or business


malware: malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs


virus: software that spreads from program to program or from disk to disk, and uses each infected program of disk to make copies of itself. a form of software sabotage macro virus: viruses that attach to and are transmitted through macros embedded in documents; usually spread via email email virus:viruses spread via email


worms: programs that use computer hosts to reproduce themselves, Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy, a form of software sabotage


trojan horse: a program that performs a useful task while at the same time carrying out some secret destructive act. a form of software sabotage. logic bomb: a program designed to attack in respnse to a particular logical event or sequence of events time bomb: a logic bomb that is triggered by a time-related event


spyware: technology that collects information from computer users without their knowledge or consent tracking software -> spybot: a spyware application, also called tracking software, that gathers user information and communicates it to an outsider via the Internet drive-by download: a spyware download onto your computer that occurs simply by visiting certain websites

hackers: someone who uses computer skills to gain unauthorized access to computer systems cracking: unauthorized access and/or vandalism of computer systems, shore for criminal hacking phreaking: the hacking of telecommunications systems

DoS attacks: Denial-of-service attacks: bombard servers and web sites with so much bogus traffic that they are shut down, DDos: distributed denial-of-service attacks: a denial of service attack in which the flood of messages comes from many compromised systems distributed across the Net


antivirus: a program designed to search for viruses, notify users when they're found, and remove them from infected files

computer security: protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction

passwords: the most common security tools used to restrict access to computer systems firewalls: a gateway with a lock, encryption: codes protect transmitted information and a recipient needs a special key to intercept it, SSL: badges: A microprocessor-controlled ID badge that broadcasts infrared identification codes to a network receiver that updates a badge-location database.

verification and validation: the process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose

UPS: uninterruptible power supply: protect computers from data loss during power failures

virus scans: when a software scans the computer for files infected by viruses

backups: a data recovery insurance

RAID: redundant array of independent disk: a storage technology that enables multiple hard disks to operate as a single logical unit

authentication mechanisms: guarantee that users have permission to perform particular actions

user identifier: information about the user's privileges associated with every user

smart weapons: a missile that uses computerized guidance systems to locate its target

autonomous system: complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making

Monday, January 4, 2010

Key Terms: Ch. 8

network: a computer system that links two or more computers wireless network: a network in which a node has a tiny radio of infrared transmitter connected to its network port so it can send and recieve data through the air rather than through cables

Ethernet: a popular networking architecture developedin 1976 at Xerox

Wi-Fi: a popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away wireless access point: a communication device, typically connected to a wired network, that is used to create a wireless network

LAN: Local area network: multiple personal comuters connected on a network MAN: metropolitan area network: a service that links two or more LANs within a city WAN: wide area network: a network that extends over a long distance. each network site is a node on the network

node: anything connected to the network routers: programs or devices that decide how to route Internet transmissions

fiber-optic cable: high-capacity cable that uses light waves to carry information at blinding speeds

client-host: client: part of network that requests information, recieves data. host: part that gives data out

server: a computer especially designed to provide software and other resources to other computers over a network access: physical proximity to a person, or knowledge about that person, a common theme in privacy discussions access permissions

spam: Internet junk mail phishing: the use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information

login: a one-word name that you type to identify yourself when connecting to a secure computer system, network, or email account password: the most common securtiy tools used to restrice access to computer systems

firewall: internet security system for computers VPN: Virtual Private Network: a network that uses encryption software to create secure "tunnels" through the public internet or between intranets, a method an organization can use to set up and extranet.

sysadmin: system administrator: person employed to maintain and operate a computer system and/or network

nodes: anything connected to a network work station: personal home computer

UPS: uninterruptible power supply: a hardwar device that protects computers from data loss during power failures

EDI: electronic data exchange: a set of specifications for conducting basic business transactions over private networks

blogs: short for web log, a personal web page that carries diary-like entires or political commentaries wiki: a web site that lets anyone iwth access to a web browser to modifiy its pages

asynchronous communication: Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time. real-time communication: Internet communication that enables you to communicate with other users who are logged on at the same time. chat room: public real-time teleconference IM: instant messaging: a technorlogy that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and files with those who are

bps: bits per second

GPS: global positioning system: a defense department system with 24 satellites that can pinpoint any location on the Earth

Internet telephony: A combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages. VoIP: voice over IP: a protocol that allows the Internet to be used to mave voice telephone calls video teleconference: Face-to-face communication over long distances using video and computer technology. voice mail: a telephone-based messaging system with many of the features of an email system

NOS: network operating system: server operating system software fo a LAN




workstation: personal home computer
client-host: client, part of network that recieves data. host: part that gives data out
server: allows many users access to same information ex. websites stored on servers
Network interface card: allows you to connect an Ethernet or other internet using this card
protocol: how data is formatted, transmitted, and received.