Tuesday, January 19, 2010

DQ's 4-6 page 380

4-i think he way email messaging now is fine because if everything is encrypted, the government cant protect us from criminals, who wouild take adavantage of this encrtption to commit more crimesm without ever being found. Today our email addresses are somewhat secure.

5- It wont really matter, if it was for securtity reason, because no dowbt these badges hekp to protect hidden and secure data, or things from the outside world, and criminals.

6- these missile s are run after all with software programming,and go off without the help of humans. I think that it is increasing out safty, but it also has a negative side, and that in the reliability section. Hopw can we trust lazer powered machines, that are their to protect us. What if by any chance they missfire, or what if the missiles lose control and fly to some other location. This would cause great devestation and concern.

Review Questions page 379 10-11

10- Computers can help protect our privacy, because on paper, things tend to get lost and are open to stealing and more, but when it is on computer our privacy settings are a little more protected.
However their are still negative parts to it. Internet monitoring programs and software snooping track our web exploration and read our electronic mail.

11- Smart weapons are weapons/ missiles that use computerized guidance to locate their target, enabling a human to fully control the missile through eye view.The advantage is the accuracy will be increased, but the cons will is that these hight ec weapons reduce the amount of time for people to make life or death choices, as chance goes down, the chances o error increase.










Monday, January 18, 2010

Discussion Questions Page 375-376

1-Most likely Yes, if the a great number of industries produce RFID reading tools, then the consumer will eventually be forced to use these tools if it is begening to take great affect in this age of tecnology.

2- Yes, why not. This can make a persons job of finding many of his things around the house easier.

3- Yes, how many cats and dogs get lost every day, and are evntually transferred to the pound. Lots and Lots are lost daily, imagine waht RIFD's could do for these owners and their dogs. It would allow people to know excatly where their dog is chilin, but also it would reduce the amounts of strayy dogs.

Review Questions

1- Its so hard, because the computer network is so vast. and second because their are thousands of things to do on the computer that even if officials wanted to track them it would be too hard.

2-Their are anti virus programs are designed to search for viruses and protect your computer. The second is security patches, a software programs that plug security breaches in the operators of OS

Thursday, January 14, 2010

Words

smart weapons: Missiles/weapons that use computer guidance to locate targets, controlled by humans.
-relibality,security
Health, polocies and governemnet
Autonemous sytem: Complex system that assumes command for a task without human input, or decision making and without human help.
-reliabilty,authenticity,control
-health, Science and environment, policies and government.


Wednesday, January 13, 2010

Computer security technique proposal

Today, in the 21st century, many people have access to the internet, which allows malicious hackers to infect and ruin your personal files, and often the files of your friends when you send files form your computer to the next. Although there are many Anti-virus programs protecting your computer, they often don’t detect or get rid of all the viruses. The stronger these anti- virus companies become the smarter and dangerous they and their viruses become.

Review questions pg 397

2- because the internet is 1a wide and vast place, it is ery difficult to find hackers or their computers on such a large data base. Its even harder to estimate thme because they are happening daily by diffeent people. Good or bad. A 4th grade kid download a movie illegally, can he be prosectuted, etc. All kinds of people are commiting these crime, young and old. Does a child doing a project about the satetes who copy and pastes an essay responsuibele and mature enough to be trialed and sent to juvinial hall with murders.

4- The most common computer crime isd plagerizing and downloading imovies and songs from bootleg websites. Unfortunetley nothing is being done to stop these things. Although there are threats and violations for doing this, because there are people doing it all the time and it is hard to track the amount of people doing it, nothing is being done.

Sunday, January 10, 2010

Criterion H

To allow the art produced by many of the students to be viewed on a more wide scale, a website or a computer viewed magazine could be made. These two IT solutions will definitely allow more people to view and appreciate the Art at our school.

Making a website will allow a larger number of people t view the Art at Al-Arqam, plus the website would be linked to the Al-Arqam website itself, causing people researching about the school to also view the page and appreciate what happens at Al-Arqam. However not many people visit the Al-Arqam page, and some people might not have computers, this would limit the people being able to view the Art.

The other IT solution is making a flash magazine. This could allow for both printing and or can be converted to be a video, which can thus be posted onto video hosting websites. However making this flash magazine requires very complex complicated software. And because I am not familiar with it this is going to cause a problem of time for me to learn how to use that software.

The most suitable It solution for this problem is making the magazine on Adobe in Design Cs4. This software will help me create a magazine with the best or the top ten artworks. It will also help in making the magazine look like a representable piece of work for the students and the public.

Tuesday, January 5, 2010

Monday, January 4, 2010

questions

1-blogger: Post your own news an oppinions about things, and having people comment on what you post
twitter: New instantly flies with twitter, when you twite its like a public bulletin board in which everyone can participate, and new fly
Face book: It allows for users to befriend one another, and comment on each others page which allows people to now one another better, and etc.
2- Education: Students are attracted to them greatly wich allows them to become distracted from more important things
Entertainment:
Business: People can get things done faster with large coarparations when they all have an idea of what to do.

3-Integrity: the posting of uneithical things on their pages
Security: People can hack others pages and their identity can be at risk.
Policies and standards: Some people might no t folow some of the policies of those networking sites.
1-network
A group of interconnected computers, including the hardware and software used to connect them.
-Reliabilty,equality of access
-health,education,business

2-
Local Area Wireless Network
(LAWN). A technology from O'Neill Communications, Inc., for wireless networking using a radio transmitter/receiver.
-reliability, control, equality of access
-health,education, business,intertainment

3-
Ethernet
The most popular type of local area network (LAN), which sends its communications through radio frequency signals carried by a coaxial cable or twisted pair wiring, at 1 or 10 Mbps. Within the OSI model, Ethernet is defined at layer one (physical) and layer two (data link). Based on Carrier Sense Multiple Access/Collision Detection (CSMA/CD), Ethernet works by simply checking the wire before sending data. Each computer checks to see if another computer is transmitting and waits its turn to transmit. If two computers accidentally transmit at the same time and their messages collide, they wait and send again in turn. Software protocols used by Ethernet systems vary, but include Novell Netware and TCP/IP.
-reliability, security,people and machine
-health, eduation, business, ientrtainment

4-
Wi-Fi
Wireless Fidelity -- refers to any type of 802.11 network.
-security,authenticity,reliability
-education, health,business,entertainment

5-
LAN
Local Area Network - A computer communications system limited to no more than a few miles, commonly in the same building, and using high-speed connections (2 to 100 megabits per second). A computer network linking workstations, file servers, printers, and other devices within a local area, such as an office. LANs allow the sharing of resources. A short-haul communications system that connects ADP devices in a building or group of buildings within a few square kilometers, including workstations, front-end processors, controllers, switches, and gateways. Common LAN protocols are Ethernet and Token Ring. A home network is a LAN in the home.
- Reliability,security,people and machines
-health, education, business

6-
MAN
Metropolitan Area Network. A network that serves a metropolitan area.
-reliability,security,people and machines
-health,entertainement, business

7-
WAN - Wide Area Network
Wide Area Network. A physical or logical network that provides capabilities for a number of independent devices to communicate with each other over a common transmission-interconnected topology in geographic areas larger than those served by local area networks. A WAN typically uses common-carrier lines. A LAN doesn't. WANs typically run over leased phone lines--from an analog phone line to T-1 (1.544 Mbps). The jump between a local area network and a WAN is made through a device called a bridge or a router.
-reliability,security,authenticity
-health,education,business,entertainment

8-
Node
A concentration point in a network where numerous trunks come together at the same switch.
-reliability,security,authenticity,people and machines
health,business,education

9-
fiber-optic cable
A cable that carries laser light, encoded with digital signals, rather than electrical energy. Made of thin fibers of glass, fiber-optic cables can transmit large amounts of data per second. Fiber-optic cables cannot be tapped by remote sensing equipment because they do not emit electromagnetic radiation.
-reliability,security,people nd machines
-health,entertinment,business

10-
client
The computer in a client/server architecture that requests files or services. The computer that provides services is called the server. The client may request file transfer, remote logins, printing, or other available services often across a network or the Internet.
-reliability,security
education,business
11-
server
A system that provides network service such as disk storage and file transfer, or a program that provides such a service. A kind of daemon which performs a service for the requester, which often runs on a computer other than the one which the server runs. A single server machine could have several
-reliability,control,people and machines
-Education, Politics abd government, health,education
12- access permissions : permition granted to access a sucure sight by the owner. These sites are usually protected by pas codes and by some antivirus softwares
-Reliability, securtiy, authenticity
-Politics and gorvernement, Business and emplyment
13-
spam, mail spam, e-mail spam
The electronic equivalent of junk mail often in the form of commercial announcements. The act of sending a spam is called, naturally, "spamming." To crash a program by overrunning a fixed-site buffer with excessively large input data. Also, to cause a person or newsgroup to be flooded with irrelevant or inappropriate messages.
-reliability,people and machine,privacy
-education,entertainemt,authenticity
10.) Password: The most common security tools used to restrict access to computer systems.

S/E: Privacy: You only have access to your password

Security

14“tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.

S/E: Private and Security

AOI: Business

15.) Sysadmin: A system administrator, s a person employed to maintain and operate a computer system and/or network.

S/E: People & machines

AOI: Business

16.) Nodes: Each computer and shared peripheral on a local-area network.

S/E: Equality of access

AOI: Business and Education

17.) UPS (uninterruptible power supply): A hardware device that protects computers from data loss during power failures.

S/E: Reliability

AOI: Business and Education

18.) EDI: (electronic data interchange): A set of specifications for conducting basic business transactions over private networks.

S/E: Privacy and Security

AOI: Business and Education