Wednesday, April 28, 2010

virtual realities and health issues

In the last few years virtual realities have changed dramatically. They have evolved from video games to computer simulations, and while they have their advantages, they also have their disadvantages.A number of recent reports have suggested that the use of Virtual Reality equipment may have unwanted physical, physiological and psychological side-effects. These side affects pose a great threat to the users health. The side affects in the phisical side affects include:Posture, Repetitive Strain Injuries (RSI), Headset Weight and Fit ,Hygiene Issues
Immersion Injuries. Some physiological side affects include :Visual Issues ,imulator Sickness Symptoms , emulator Sickness Symptom Theories.

Other health issues include:


Immersion Injury

In using VR systems one must consider the surroundings in which the system is used. Any physical trauma occurring during VR use is termed an immersion injury. Users may become so involved and engrossed in their virtual world that they become unaware and even possibly disoriented with their immediate surroundings. Users might attempt unsafe acts while wearing a device such as an HMD. Such acts could include running or even jumping.

Transmittable Disease


Much of the equipment used in VR are potential fomites. A fomite is an object, that is not in itself harmful, but is able to harbor pathogenic organisms and thus may serve as an agent of transmission of an infection(2). VR applications are potential fomites because the equipment is used by multiple individuals. Airborne pathogens and skin flora thrive in environments similar to those of head mounted devices (HMD) and hand controllers. Airborne agents are typically polymicrobic including: Streptococcus species, Hemophilus influenza, and multiple viruses. Specific skin flora include Group A Streptococcus and Staphylococcus aureus which are likely present on virtually all surfaces with which users have had recent contact(3). Phthirus species (pediculosis) is also of concern for VR equipment contacting body surfaces.Cybersickness

Cybersickness
has been described as a variant form of common motion sickness(4) which has adverse effects upon the visual, neural, and psychological status. Symptoms include: drowsiness, general discomfort, apathy, headache, stomach awareness, disorientation, fatigue, and incapacitation(5). The physiologic signs of cybersickness are changes in cardiovascular (increased heart rate and increased blood pressure), respiratory (increased rate), gastrointestinal ('dumping'), biochemical (mild alkalosis), and temperature regulation (hyperthermia) systems.
Research into the side effects of VR use is a However research does show that some symptoms occur whilst using VR tools and that these effects (such as nausea) can be quite debilitating in the short term. Whether or not there is a long term effect is difficult to determine, partly due to the fact that VR techniques are relatively new and are constantly evolving.

Neural Effects


The eyes are not alone at risk when using VR. The Central Nervous System (CNS) has the possibility of being affected by VR use. One such effect is the impact that an electromagnetic field (EMF) has upon the body. An EMF of intense magnitude could cause cellular damage with cellular and genetic material in the brain as well as other tissues. Although the exact levels of EMF are not known, research is ongoing and hopefully results are forthcoming. An additional problem that occurs in the CNS is "flicker vertigo." This is a condition in which individuals suffer from a seizure when a flickering light is observed(6). The resulting seizure manifests itself as nothing more than a brief loss of attention. Flicker vertigo is very uncommon and occurs usually on a flicker frequency of 8 to 12 Hz.

Research into the side effects of VR use is a complex and difficult and it is clear that concerns do remain about the effects of using these systems. Research does show that some symptoms occur whilst using VR tools, and that these effects (such as nausea) can be quite weakening in the short term. Whether or not there is a long term effect is hard to determine, because of the fsct that VR are relatively new technology and continuously evolving. That is why we need to increase public awarness so that they could understand the damages before finding out the hard way.





Tuesday, April 27, 2010

Review questions page 221 3's 2-6

2-Bitmap graphics are the most common graphic format in use on the web and, indeed, on the computer. With the exception of Flash

Advantages:
Disadvantages:

Object oriented graphics are a
Type of computer graphics that are comprised of object elements, such as a circle or a line. Once placed, these objects can then be modified or otherwise adjusted.

Advantages:
Disadvantages:

3-color depth,and resolution, they both use pixels that depend on the the screen on a computer, and are reflected by the images that are pre stored on a computer


4-because they are both created with tools using similar high-resolution paint program


5-It allows users to create 3 dimentional solid models with phisical charactaristics such as wight, volume, and center of gravity. these models can also be visually rotated to view from any angle.
6-image compressing is part of digital video technology because it is crucial for saving files and making them as small as possible for storing purposes.

Tuesday, April 20, 2010

presentations

Word processing
- are applicationbs people use to manipulate tools and numbers.
Many functiuonts from entering text to printing to proof reaing
-Character formatting allows you to control the format of documnts character,
  • All modern processors use what you see what you get
  • outliers are idea processor, they have three functions
  • Arrange info
  • REARRANGE IDEAS
  • they replace note cards
  • Digital references are like dictionaries etc
  • They make things easier to look up things
  • Spelling checker checks spelling with words used int he dictionary database
  • The problem is limitations of these databases.

______________________
  • Digital media forms are likely to eclipse
  • Communication medium easy and inexpensiveness to reach.
  • Problems vary from copyright protection
  • Posting on the web is open to all people.
  • Solutions: Eventually their will be some kind of tecnlogy that takes money from you that goes towards artist
  • The devises are commercial fail for many reasons____________________________________
_________


-

Wednesday, April 14, 2010

1- RAtional databse mangment system
2- Name,identification number,Next appointment
3-query
4-Because data bases contain private information, so anyone who access your personal information can use for the bad reason.Like identity theft
5- Security,Authenticity,Reliability
6-From hackers, The govenmrnt can improve the securit on these databases.

Tuesday, April 13, 2010

News buble

Gangs
http://www.greenbaypressgazette.com/article/20100412/GPG0101/4120447/1207/gpg01

Monday, April 12, 2010

Notes of essay presentation:

Culture:
  • Very little info is private
  • it can be used to steal identity
  • Info is all over the internet
  • Their are laws to keep info private
  • Europe is stricter than the US in matters of privacy
Rights OF individual
  • Some problem are in biometrics in the case of privacy
  • Some argue that it is evasion of privacy
  • Undemocratic
  • Other regulation regarding data collection with the government
  • US has loose privacy laws
  • Many sites to dig in about people.
  • Not illegal to stalk people
SOCIAL CONSEQUENCES

_Ethical issues
  • Most laws require databases to perform tasks to collect data.
  • Data base must inform owner that his data is being collected, and also.
  • They must also give access to owner to change and edit info about himself.
Responsibility for the security of Data
  • Database is updated as recent as twice a day
  • Many Hackers today steal information from companies that you trust with your information
  • People must try to check to see if their are any threats and if so one must freeze the account as soon as possible.

Thursday, April 8, 2010

Discussion questions

2- During the spring break i created a spreadsheet for what i needed to complete these remaining months. Since i created my planner on excel spread sheet i organized it and saved it on a computer. A database is a comprehensive collection of related data organized for convenient access, generally in a computer.
3-It is very important for me to constantly check on my balance, because if i dont keep track of my spending i can sometimes go wild. I like to keep myself in check so that i dont spend money on useless items.I check my balance inquiry around every week.
5- I think you pay the 100 dollars first then sue the company. The reason behind this is that if you refuse to wait you will damage your credit over a mere 100 dollars. if you sue and refuse to pay you will spend more than a 100 dollars on the lawyer and in the end you dont gain anything because you keep your 100. So paying you 100 dollars insures that they wont damage you credit, then suing them comes later when you can demand the you money back plus reinbursment.
7- I would be upset that the FBI is suspicious of me, but not that they are checking on educational medical,and library records.I would scare and make me mad if they followed me daily,and tracked my purchases.

Review questions 7-11

7-Database programs enable users to store, organize, retrieve, communicate, and manage large amounts of information quickly and efficiently. Each database is made up of tables, which are, in turn, collections of records, and each record is made up of fields containing text strings, numbers, and other chunks of information. Database programs enable users to view data in a variety of ways, sort records in any order, and print reports, mailing labels, and other custom printouts
8-their isn't a clear way to reduce errors in a system but scientist are working to find a way to solve this problem and increase the reliability if their products to their consumers.
9- Record matching works when companies gather little bits of information and compile them to make an assumption about you.
10- This topic has been debated by many scholars some say it is not present in the constitution, and others say that some amendment just further imply this meaning. But here in the US we do have the right to privacy in some ways, but even that has changed because of the Patriot act.
11- Computers are the easiest way to invade privacy, often because it is very hard to track people.

Tuesday, April 6, 2010

page 259 #2-6

2-A file manager or file browser is a computer progran that provides a user interface to work with file sytems, A Database Management System is a set of computer programs that controls the creation, maintenance. They are similar in that they are both programs.
3-The structure of a relational database is based on the relational modela mathematical model that combines data in tables.
4-Query is finding records that match specific criteria, they could help questions about anything because they are like a text searching device.
5-
6-
Advantages:privacy
Disadvantages:too costly


Wednesday, March 24, 2010

RQ and DQ pg 134 # 1

RQ:
1-Most programs, with the exception of some artificial intelligence applications, consist of algorithms
2-a) compilers:
A compiler is a computer program (or set of programs) that transforms source code written in a computer language (the source language) into another computer (google translator)
b)
Application software, also known as software application, application or app, is computer software designed to help the user to perform a singular or multiple related specific tasks. Typical examples are word processors, spreadsheets, media players and database applications.
c)

System software is computer software designed to operate the computer hardware and to provide and maintain a platform for running application software.[1][2]

The most important types of system software are: linix,macOX

3-The computers memory

4-

5-

DQ questions

1- For people their is figure of speeches, and people tend to think and analyse what they read, for a computer you need to type intructions for the figure of speech if you wan to use a figure of speech, and the computer will only respond in the way it was programmed to. Humans can surpeise you with emotions and feelings, but the computer does the same thing over and over again. Making it dull and unreliable at times for certain software like translating or probability tests.

Wednesday, March 3, 2010

test online

95% Correct of 21 Scored items:
20 Correct:
95%
1 Incorrect:
5%

Tuesday, March 2, 2010

Questions page 490 1,3,6

1- E- commerce is buying and selling through the internet. In today's business economy, their is no such thing as business without the internet. So an essential part of the busibess is done through e-commerce. E-commerce is having and will continue to have a great impact on how consumers buy their products, because electronic shopping allows for more comfort and easier ways to shop for needs.

3- An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information. The opportunities are great because this would allow easy access for students and staff members and to the internet. This would maximize the amount of mess in the libraries and other places at schools.In schools students would be able to compete for answers and challenge themselves to do the best possible , because they have all the necessary equipment to do so.

6- Privacy is an issue when it becomes dangerous to the citizen himself, and invades his space.If invading a persons privacy woth reliable information that he really is going to be a danger to society then invading it would be just like entering a drug dealers home with a warrant. otherwise this is against the law. Yous shouldnt pay for the company to secure you personal informatrion. It should she be a primary aspect of a company's business. NO i wouldnt because that wont garutee what the compnay might do with my information.

Wednesday, February 24, 2010

IB questions

1- What makes computer translation unreliable is the fact that their is not standard of style that corresponds with each language. The expressions used in English often cant make sense in Arabic unless translates differently. Unfortunately the web translators aren't sophisticated enough to actually do such a thing,or to rephrase, they are programmed to translate this word for this word, meaning that they totally disregard grammar, and style.

2-markup language: markup language is a program that enables for better translation
(is a text based language-particularly web pages like HTMl's, it is a type of language accessible across a wide variety of hardware and sofltware platofrms)

Thursday, February 18, 2010

Wednesday, February 17, 2010

461-468 quesions

a) No E-commerce is not possible without the internet, because the whole point of e commerce is using the Internet to do business better.
b)they are regular Electronic Commerce, Traditional Commerce, and last but least there is International Electronic Commerce.
c)The purpose of an intranet is to facilitate the storage and communication of data, information, knowledge, wisdom, and ideas throughout an organization,the charactaristics of intranet is communication, security,and information transformation.

Tuesday, February 16, 2010

Ib questions

1- the first device likely to be used in a pilot training computer simulation would be the gps, or navigation system. This would help track the airplane navigate through tough winds, etc the second would be the communication headphones that pilots wear so that thgey are able to communicxate with to headquarters.

2- An advantage of schools providing students with USB drives would help students be more prepared for school life, it would reduce the amount of paper being printed, this way teachers don't need to collect notebooks, it would be usb drives. The disadvantage is that you are districting the equality of access, because some students might not have a computer, so some students might feel left out or deprived

key trerms

  1. intranet: is the generic term for a collection of private computer networks within an organization (privacy,security,peopleand machines)/ (Business and employment
  2. middleware: software that connects software compinenents or applications. The software consists of a set of services that allows multiple processes running on one or more machines to interact. (business and employment)/Polocies and governement)
  3. e-business: Though sometimes used interchangeably with the broader term e-commerce, here used to refer to the e-commerce activities of a particular company or organization. (people and machines, privacy,authenticity)/ Science and environment)
  4. e-commerce: Programs on a Web server that provide the commercial services to consumers and business partners on the Web site.((business,people and machines)/education, politics and government)
  5. dot-coms: Internet-based companies.(policies and standard, security)/business,polotics and government)
  6. mobile commerce: Mobile commerce, in which workers use laptops and wireless handheld devices to take their offices with them wherever they travel (people and ,machines,security, authenticity)/ (business,health,education,politics)

Thursday, February 11, 2010

IB practice test Questions

1- computer simmulation are those prgrams based on models, based on reality in order to imitate a certain scenario. Simulation can be used in a wide spectrum of areas, in business,traffic,training, etc

2-Bandwidth is the speed and capability of a connection to transfer a certainb amount of data per unit of time. Are classified in Kb, KPBS. It also reffers to the he band through which connection cabels pass.

Tuesday, January 19, 2010

DQ's 4-6 page 380

4-i think he way email messaging now is fine because if everything is encrypted, the government cant protect us from criminals, who wouild take adavantage of this encrtption to commit more crimesm without ever being found. Today our email addresses are somewhat secure.

5- It wont really matter, if it was for securtity reason, because no dowbt these badges hekp to protect hidden and secure data, or things from the outside world, and criminals.

6- these missile s are run after all with software programming,and go off without the help of humans. I think that it is increasing out safty, but it also has a negative side, and that in the reliability section. Hopw can we trust lazer powered machines, that are their to protect us. What if by any chance they missfire, or what if the missiles lose control and fly to some other location. This would cause great devestation and concern.

Review Questions page 379 10-11

10- Computers can help protect our privacy, because on paper, things tend to get lost and are open to stealing and more, but when it is on computer our privacy settings are a little more protected.
However their are still negative parts to it. Internet monitoring programs and software snooping track our web exploration and read our electronic mail.

11- Smart weapons are weapons/ missiles that use computerized guidance to locate their target, enabling a human to fully control the missile through eye view.The advantage is the accuracy will be increased, but the cons will is that these hight ec weapons reduce the amount of time for people to make life or death choices, as chance goes down, the chances o error increase.










Monday, January 18, 2010

Discussion Questions Page 375-376

1-Most likely Yes, if the a great number of industries produce RFID reading tools, then the consumer will eventually be forced to use these tools if it is begening to take great affect in this age of tecnology.

2- Yes, why not. This can make a persons job of finding many of his things around the house easier.

3- Yes, how many cats and dogs get lost every day, and are evntually transferred to the pound. Lots and Lots are lost daily, imagine waht RIFD's could do for these owners and their dogs. It would allow people to know excatly where their dog is chilin, but also it would reduce the amounts of strayy dogs.

Review Questions

1- Its so hard, because the computer network is so vast. and second because their are thousands of things to do on the computer that even if officials wanted to track them it would be too hard.

2-Their are anti virus programs are designed to search for viruses and protect your computer. The second is security patches, a software programs that plug security breaches in the operators of OS

Thursday, January 14, 2010

Words

smart weapons: Missiles/weapons that use computer guidance to locate targets, controlled by humans.
-relibality,security
Health, polocies and governemnet
Autonemous sytem: Complex system that assumes command for a task without human input, or decision making and without human help.
-reliabilty,authenticity,control
-health, Science and environment, policies and government.


Wednesday, January 13, 2010

Computer security technique proposal

Today, in the 21st century, many people have access to the internet, which allows malicious hackers to infect and ruin your personal files, and often the files of your friends when you send files form your computer to the next. Although there are many Anti-virus programs protecting your computer, they often don’t detect or get rid of all the viruses. The stronger these anti- virus companies become the smarter and dangerous they and their viruses become.

Review questions pg 397

2- because the internet is 1a wide and vast place, it is ery difficult to find hackers or their computers on such a large data base. Its even harder to estimate thme because they are happening daily by diffeent people. Good or bad. A 4th grade kid download a movie illegally, can he be prosectuted, etc. All kinds of people are commiting these crime, young and old. Does a child doing a project about the satetes who copy and pastes an essay responsuibele and mature enough to be trialed and sent to juvinial hall with murders.

4- The most common computer crime isd plagerizing and downloading imovies and songs from bootleg websites. Unfortunetley nothing is being done to stop these things. Although there are threats and violations for doing this, because there are people doing it all the time and it is hard to track the amount of people doing it, nothing is being done.

Sunday, January 10, 2010

Criterion H

To allow the art produced by many of the students to be viewed on a more wide scale, a website or a computer viewed magazine could be made. These two IT solutions will definitely allow more people to view and appreciate the Art at our school.

Making a website will allow a larger number of people t view the Art at Al-Arqam, plus the website would be linked to the Al-Arqam website itself, causing people researching about the school to also view the page and appreciate what happens at Al-Arqam. However not many people visit the Al-Arqam page, and some people might not have computers, this would limit the people being able to view the Art.

The other IT solution is making a flash magazine. This could allow for both printing and or can be converted to be a video, which can thus be posted onto video hosting websites. However making this flash magazine requires very complex complicated software. And because I am not familiar with it this is going to cause a problem of time for me to learn how to use that software.

The most suitable It solution for this problem is making the magazine on Adobe in Design Cs4. This software will help me create a magazine with the best or the top ten artworks. It will also help in making the magazine look like a representable piece of work for the students and the public.

Tuesday, January 5, 2010

Monday, January 4, 2010

questions

1-blogger: Post your own news an oppinions about things, and having people comment on what you post
twitter: New instantly flies with twitter, when you twite its like a public bulletin board in which everyone can participate, and new fly
Face book: It allows for users to befriend one another, and comment on each others page which allows people to now one another better, and etc.
2- Education: Students are attracted to them greatly wich allows them to become distracted from more important things
Entertainment:
Business: People can get things done faster with large coarparations when they all have an idea of what to do.

3-Integrity: the posting of uneithical things on their pages
Security: People can hack others pages and their identity can be at risk.
Policies and standards: Some people might no t folow some of the policies of those networking sites.
1-network
A group of interconnected computers, including the hardware and software used to connect them.
-Reliabilty,equality of access
-health,education,business

2-
Local Area Wireless Network
(LAWN). A technology from O'Neill Communications, Inc., for wireless networking using a radio transmitter/receiver.
-reliability, control, equality of access
-health,education, business,intertainment

3-
Ethernet
The most popular type of local area network (LAN), which sends its communications through radio frequency signals carried by a coaxial cable or twisted pair wiring, at 1 or 10 Mbps. Within the OSI model, Ethernet is defined at layer one (physical) and layer two (data link). Based on Carrier Sense Multiple Access/Collision Detection (CSMA/CD), Ethernet works by simply checking the wire before sending data. Each computer checks to see if another computer is transmitting and waits its turn to transmit. If two computers accidentally transmit at the same time and their messages collide, they wait and send again in turn. Software protocols used by Ethernet systems vary, but include Novell Netware and TCP/IP.
-reliability, security,people and machine
-health, eduation, business, ientrtainment

4-
Wi-Fi
Wireless Fidelity -- refers to any type of 802.11 network.
-security,authenticity,reliability
-education, health,business,entertainment

5-
LAN
Local Area Network - A computer communications system limited to no more than a few miles, commonly in the same building, and using high-speed connections (2 to 100 megabits per second). A computer network linking workstations, file servers, printers, and other devices within a local area, such as an office. LANs allow the sharing of resources. A short-haul communications system that connects ADP devices in a building or group of buildings within a few square kilometers, including workstations, front-end processors, controllers, switches, and gateways. Common LAN protocols are Ethernet and Token Ring. A home network is a LAN in the home.
- Reliability,security,people and machines
-health, education, business

6-
MAN
Metropolitan Area Network. A network that serves a metropolitan area.
-reliability,security,people and machines
-health,entertainement, business

7-
WAN - Wide Area Network
Wide Area Network. A physical or logical network that provides capabilities for a number of independent devices to communicate with each other over a common transmission-interconnected topology in geographic areas larger than those served by local area networks. A WAN typically uses common-carrier lines. A LAN doesn't. WANs typically run over leased phone lines--from an analog phone line to T-1 (1.544 Mbps). The jump between a local area network and a WAN is made through a device called a bridge or a router.
-reliability,security,authenticity
-health,education,business,entertainment

8-
Node
A concentration point in a network where numerous trunks come together at the same switch.
-reliability,security,authenticity,people and machines
health,business,education

9-
fiber-optic cable
A cable that carries laser light, encoded with digital signals, rather than electrical energy. Made of thin fibers of glass, fiber-optic cables can transmit large amounts of data per second. Fiber-optic cables cannot be tapped by remote sensing equipment because they do not emit electromagnetic radiation.
-reliability,security,people nd machines
-health,entertinment,business

10-
client
The computer in a client/server architecture that requests files or services. The computer that provides services is called the server. The client may request file transfer, remote logins, printing, or other available services often across a network or the Internet.
-reliability,security
education,business
11-
server
A system that provides network service such as disk storage and file transfer, or a program that provides such a service. A kind of daemon which performs a service for the requester, which often runs on a computer other than the one which the server runs. A single server machine could have several
-reliability,control,people and machines
-Education, Politics abd government, health,education
12- access permissions : permition granted to access a sucure sight by the owner. These sites are usually protected by pas codes and by some antivirus softwares
-Reliability, securtiy, authenticity
-Politics and gorvernement, Business and emplyment
13-
spam, mail spam, e-mail spam
The electronic equivalent of junk mail often in the form of commercial announcements. The act of sending a spam is called, naturally, "spamming." To crash a program by overrunning a fixed-site buffer with excessively large input data. Also, to cause a person or newsgroup to be flooded with irrelevant or inappropriate messages.
-reliability,people and machine,privacy
-education,entertainemt,authenticity
10.) Password: The most common security tools used to restrict access to computer systems.

S/E: Privacy: You only have access to your password

Security

14“tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.

S/E: Private and Security

AOI: Business

15.) Sysadmin: A system administrator, s a person employed to maintain and operate a computer system and/or network.

S/E: People & machines

AOI: Business

16.) Nodes: Each computer and shared peripheral on a local-area network.

S/E: Equality of access

AOI: Business and Education

17.) UPS (uninterruptible power supply): A hardware device that protects computers from data loss during power failures.

S/E: Reliability

AOI: Business and Education

18.) EDI: (electronic data interchange): A set of specifications for conducting basic business transactions over private networks.

S/E: Privacy and Security

AOI: Business and Education