Wednesday, April 14, 2010

Database Review 4/14/10

1. Define RDBMS.
-Relational Database Management System: This way, the same database can be viewed in many different ways and can be spread or opened/seen in different places.

2. Identify 3 tables that could be part of a doctor’s office patient relational database.
-The patient's history/background/records
-The patient's updates/improvements
-The patient's "plan" for the future and what's to be done

3. Searching the database to find specific information is called a
query.

4. Why are we concerned about electronic databases?
-Because we use them more and more nowadays.

5. Explain 3 different types of S/E issues related to online databases.
-Security: Maybe it isn't safe to have your info where people can have access to it.
-Control: Other people control these databases.
-Equality of Access: Not just anyone can have access to these databases, but if certain people do, it can affect you negatively.

6. What is something we need to protect electronic databases from? What can be used to protect them?
-I have no idea.

Monday, April 12, 2010

presentations/essays notes

Privacy of info in diff cultures
Information you put of yourself on the internet isn't always "safe"
It can harm us. In China, the information of someone who uses the internet is kept for 60 days (information like: address, phone number, ID, etc.)

Rights of Indivdual w/respect to storage of personal data

Social consequences of release of sensitive data stored in databases
you can be mistaken for another person, and be accused/assaulted. All anyone has to do is take ur hard drive to steal your data.

Ethical Issues related to selling data

Paper Files vs Electronic Files
Elec. files are used more in businesses. Electronic files are easier to use for searching files. All you have to do is query info wanted instead of going one-by-one to find it. It allows more than one person to look at one copy of a database, unlike paper, because there would be only one copy. People can be across the globe and still see the same thing as someone somewhere else. Nothing can be deleted unless you take it off the hard drive itself, whereas with paper, you just need to burn or shred it to get rid of it completely.

Responsibilities for security of data


Social Consequences of outdated or incorrect info on databases
If a database has incorrect info about you, if they want to send you something, someone else would get it. If they have the wrong info, and they get someone else's identity, you will get information and spam, ads from those people that have nothing to do with you. It all belongs to someone else. You won't get the services that you need. Other people might get it instead.

Thursday, April 8, 2010

Review Questions ch. 7 #'s 7-11

7) Sorting a data file means to put them in order alphabetically.

8)

9) By combining different information from different databases, there are connections everywhere, and your information is combined. One example of this can be a Social Security Number.

10)

11)

Tuesday, April 6, 2010

Review Questions ch. 7 #'s 2-6

2) A file manager enables users to work with one file at a time while a Database Management System (DBMS)manipulates data in a large collection of files, cross-referencing between files as needed.

3) A simple database is a file that has a table with records in it, each piece of information in that record is a field.

4) Query: find records that match specific criteria.

5)

6) Advantages:
Disadvantages:

Thursday, March 25, 2010

Wednesday, March 3, 2010

RESULTS for multiple choice quiz online.

76%
I got 5 wrong (numbers 6,7,13,15,17)

Wednesday, February 24, 2010

Questions (warm ups)

-Explain why computer based translators often perform translation badly.
Computer based translations don't really "understand" the context of the words that are being used and how they're being used. What the computer based translation does is take each word and "translate" it literally to the other language. It might make sense in one language but not another, or the verb can come first instead of the subject and noun in one language, but in another language it's set up differently. It depends on the kind of translation errors it makes, but that is usually the case.

-How Markup Language works.
Markup Language is a "language" used that the computer can identify, for example http, html, etc.

Wednesday, February 17, 2010

Questions/Review

a) Is e-commerce possible without the Internet? Explain.
- No. It's all based on internet to make business easier and better. It's all about online businesses.

b) Describe the 3 forms of e-commerce
- Business to Business (B2B)
- Business to Consumer (B2C)
- Consumer to Business (C2B)

c) What are the purposes of an intranet? What are the main characteristics of an intranet?
- Communication, collaboration, content, and activity
- they are easy to use, very flexible, scalable and extendable.

Tuesday, February 16, 2010

ib practice test

describe two im[ut devices that would be used in a pilot training computer simulation.
- headphones
- joystick

describe one advantage and one disadvantage of schools provisding their students with USB drives.
ADVANTAGE- it's easier to carry around the USB drive, not having to worry about internet connection and whether or not the file is too large to send by e-mail.
DISADVANTAGE- if the student loses it or if it crashes...tough.

Key Terms

Intranet: A privately maintained computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.

Middleware: a general term for any programming that serves to "glue together" or mediate between two separate and often already existing programs. A common application of middleware is to allow programs written for access to a particular database to access other databases.

e-business: Ebusiness is a term used to describe businesses run on the Internet, or utilizing Internet technologies to improve the productivity or profitability of a business. In a more general sense, the term may be used to describe any form of electronic business

e-commerce: E-commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet. In practice, this term and e-business are often used interchangeably. For online retail selling, the term e-tailing is sometimes used.


dot-coms: Of or relating to business conducted on the Internet: dot-com advertising.

mobile commerce: M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as cellular telephone and personal digital assistants (PDAs). Known as next-generation e-commerce, m-commerce enables users to access the Internet without needing to find a place to plug in.

Thursday, February 11, 2010

Practice Test Questions

1) Give a clear and precise meaning of a given word, term or concept.
- Computer simulation: Programs based on models in order to imitate a certain scenario. They can be used in business, traffic, training, the weather and other things.
- Bandwidth: Speed and capability of internet connection to transfer a certain amount of data per unit of time. Usually in seconds, and data is classified into KB (KBPS). It also refers to the physical measurements of the band through which connection cable passes.

Tuesday, January 26, 2010

Criterion I

For my project, I'll be making a cook book filled with recipes by the "Fattouh-e's" and other family friends that we use daily. These recipes are unique and would be good for others who are still learning how to cook or just want to try something new.
I will be going around adding recipes of my own and from other family members. I'll actually be cooking/making these recipes and take pictures of them to add in my cook book. Every time I make one of the recipes, I'll add the ingredients and instructions as I go. Finally, I'll put it all together in a certain format so that it will be easily put together as a "book". Then, I'll print it out at Kinko's in book form, and I might even be able to distribute/sell them to others. Also, this was a project my sister and I had been wanting to work on for a while (for the family at least), and now others can benefit from it as well.

Tuesday, January 19, 2010

Discussion Questions (4-6) HOMEWORK

4) I think that it can work both ways. It secures the user's privacy and at the same time it can help computer criminals do their job a lot easier with that extra help.

5) I wouldn't mind it as long as it's not something that, in a way, "controls" me or "monitors" me. But if I had to choose between two jobs, one with it and one without it (and I liked the jobs both the same), I would probably go with the one without the active badges.

6)

page 379 Review Questions 10 & 11

10) In what ways can computer security protect the privacy of individuals? In what ways can computer security threaten the privacy of individuals?
- It protects the privacy of an individual because it allows them to keep things to themselves and not let things get out to others.
-It can threaten the privacy of individuals because there are computer thieves, hackers, software pirates, viruses, spy bots, wiretaps, and so forth that come with the computer securities. With all of the information that we give about ourselves to a machine that sends information to who knows where, we are then under the government's control. They can tap our calls and read our e-mails, monitor what we're doing, and data transmissions.

11) What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
- Smart weapons are missiles that use computerized guidance systems to locate their targets.
- Advantage: If everything works properly, smart weapons can reduce the amount of civilian destruction.
- Risk: They reduce the amount of time people have to make life-and-death decisions. Decision time decreases, and error increases.

Monday, January 18, 2010

page 379 #s 7 and 8

7) What are the two inherent characteristics of computers that make security so difficult?
- Bugs and Breakdowns. Computers are just one long chain of technologies and we rely on them a lot. If one BIG power fails, then it affects so many others.

8) Describe several different computer security techniques and explain the purpose of each.
- Passwords/eye and fingerprint scanning keeps people from stealing user's information.
- Firewall keeps the programs inside a computer secured.

Thursday, January 14, 2010

Key Terms

smart weapons: A missile that uses computerized guidance systems to locate its target.

autonomous system: The unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).

notes on 366-368 (HW)

There have been so many computer crimes happening lately and the federal and state gov'ts needed to do something about it. People got away with so much, and finally the gov't decided to take action by creating laws against hackers and other people who commit crimes using technology (i.e. identity theft). Some have had their computers confiscated while others have been arrested and jailed.
Telecommunications Act of 1996 attempted to deal with things like "what kind of communications are legal online?" More laws came up because the questions were endless. So, other laws came up to try to put a stop to these offenses and criminal acts because so many innocent people are paying for it. There are still more problems that are to be solved by future lawmakers. This is just one of the many things that lawmakers have to face to be able to protect us and our rights, especially with all of these technological advances that have gotten people to commit such crimes.

Wednesday, January 13, 2010

Review Questions pg 379 #s 2 &4

2) Why is it hard to estimate the extent of computer crime?
- We can't really estimate how many people commit computer crimes or even how far the computer crimes go because some people commit computer crimes without even knowing it. Some do it intentionally, but even then not all crimes are recorded or dectected. Therefore, we don't know for sure, nor can we estimate.

4) What is the most common computer crime?
- Software Piracy. It is a violation of intellectual property laws.

Who commits it?
- The crime itself is committed by millions of people, even if they don't realize they're doing it, but it can also be committed by young people who are smart with computers (hackers). But even then, hackers are responsible for only a small fraction of computer crimes. The computer criminal is usually someone who is trusted with personal things and has knowledge of the computer system.

What is being done to stop it?
- Because of all the computer crimes, many organizations developed a new security techniques to protect their system. (i.e. keys, scanners, badges, etc.)

Monday, January 11, 2010

Key Terms

sabotage: A malicious attack on work, tools, or business.

malware: Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.


virus: Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.
macro virus: Viruses that attach to and are transmitted through macros embedded in documents; usually spread via email.
email virus: Viruses spread via e-mail.

worms: Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.


trojan horse: A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.
logic bomb: A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.
time bomb: A logic bomb that is triggered by a time-related event.

spyware: Technology that collects information from computer users without their knowledge or consent.
tracking software: A spyware application program, also called a spybot, that gathers user information and communicates it to an outsider via the Internet.
spybot: A spyware application program, also called tracking software, that gathers user information and communicates it to an outsider via the Internet.
drive-by download: A spyware download onto your computer that occurs simply by visiting certain Web sites.

hackers: Someone who uses computer skills to gain unauthorized access to computer systems. Also sometimes used to refer to a particularly talented, dedicated programmer.
cracking: Unauthorized access and/or vandalism of computer systems; short for criminal hacking.
phreaking:

DoS attacks: (Denial of Service attacks)--> A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they’re effectively shut down, denying service to legitimate customers and clients.
DDos: (Distributed Denial of Service)--> A denial of service attack in which the flood of messages comes from many compromised systems distributed across the Net.

Monday, January 4, 2010

FLASHCARDS (words)

network: A computer system that links two or more computers.
wireless network: A network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and receive data through the air rather than through cables.

Ethernet: A popular networking architecture developed in 1976 at Xerox.

Wi-Fi: A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.
wireless access point: A communication device, typically connected to a wired network that is used to create a wireless network.

LAN: Local Area Network--anything in one home, really small area.
MAN: Metropolitan Area Network--less than 30 miles range.
WAN: Wide Area Network--biggest network, any network over 30 miles.

node: Each computer and shared peripheral on a local-area network.
routers: Programs or devices that decide how to route Internet transmissions.

fiber-optic cable: High-capacity cable that uses light waves to carry information at blinding speeds.

client: any part of the network that receives data.
host: any part of the network that sends data.

server: Offers many users access to the same information.
access: Physical proximity to a person, or knowledge about that person, a common theme in privacy discussions.
access permissions:

spam: Internet junk mail.
phishing: The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.

login: A one-word name that you type to identify yourself when connecting—logging in—to a secure computer system, network, or email account. Sometimes called login name or alias.
password: The most common security tools used to restrict access to computer systems.

firewall:
VPN:

sysadmin:
work station: A high-end desktop computer with massive computing power, though less expensive than a minicomputer. Workstations are the most powerful of the desktop computers.

UPS:

EDI:

blogs: Short for Web log, a personal Web page that often carries diary-like entries or political commentaries. Blogs are fast proliferating as new software allows users to create Web pages without having to learn the technical details of HTML and Web authoring.
wiki: A Web site that lets anyone with access to a Web browser to modify its pages. The best-known example is Wikipedia.

asynchronous communication: Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time.
real-time communication: Internet communication that enables you to communicate with other users who are logged on at the same time.
chat room: Public real-time teleconference.
IM: Instant Messaging

bps: (bits per second) The standard unit of measure for modem speed.

GPS: A device that can use Global Positioning System signals to determine its location and communicate that information to a person or a computer.

Internet telephony: A combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages.
VoIP: (voice over IP) A protocol that allows the Internet to be used to make voice telephone calls.
video teleconference: Face-to-face communication over long distances using video and computer technology.
voice mail: A telephone-based messaging system with many of the features of an email system.

NOS: (Network Operating System) Server operating system software for a local-area network.