- 2. It is hard to determine the extent of computer crimes because many crimes go undetected, and those detected go unreported because buisnesses will go into fear.
- 3. The typical computer criminal is a trusted employee with no criminal record. they are usually tempted by loopholes in the system. They are different then the normal steryotypes in which the criminal is outside the system and tries to break in.
- 4. Theft is the most common form of computer crime. People steal money, goods, passwords, information and resources.
- 5. Intellectual property laws give us the right to protect what is rightfully ours. They apply to software by allowing us to have log in passwords to protect our computers and laptops to protect information from being stolen.
- 6. Some sabotage software includes trojan horses, viruses, and worms. A trojan horse performs a useful task while also being secretly distructive. Viruses spread by making copies of itself from program to program.A worm is a program that travels over computer networks seeking uninfected sites.
- 7. Two inherent characteristics of computers that make security so difficult is the fact that first its impossible to remove all the bugs from the computers. Theres to many to count or even find. Second, the bigger the system is the bigger the problem. With larger computers its harder to tract the problems within it.
- 9. The First Taxpayer coppies the days worth of transactions from disk to tape to keep record, also to prevent theft. That way if anyhting has been stolen the bank has record of how much money has been taken and such details.
- 11. Smart weapons are missiles that use computered guidance to locate their targets. These are different then normal missiles that have to be aimed by the person manually. Smart weapons are a step up from what was previously used can call for better accuracy.
Tuesday, March 29, 2011
Ch 10 Review Questions
Saturday, March 26, 2011
Wednesday, March 23, 2011
Chapter 9 Internet
Internet: interconnected network of a thousand of networks
-impossible to measure its growth
-has no boundaries
Transmission Control Protocol/Internet Protocol
- allows cross networking communication
-at the heart of the internet
-Each internet has its own IP address
-Doman name system, such as:
-.com
-.org
-.edu
Email address:
username@hostname.sub.dom
-a username is the person's mailbox
- a hostname is the name of the host
2 types of connection
-Direct connection has a fast system and stores files on the computer
-Dial up connection is a limited connection.
Top level domains
Describe 10 different top-level domains.
- .edu
-This is used for educational sites such as colleges and schools. edu itself stands for education.
- .com
-This is sued for commercial sites which are used for advertisements. com stands for commercial.
- .gov
-This is used for the government such as data websites like th world fact book. gov stands for government.
- .mil
-This is used for the military such as websites used for advertising the army. mil stands for military.
- .net
-This is used for network administrating sites. net stand for network.
- .org
-This is used for nonprofit organizations. Org stands for organizations.
- .aero
-This is used for air transport organizations, which is also what it stand for.
- .biz
-This stands for business which is exactly what it is used for.
- .coop
-This is used for cooperative business, such as credit unions. Coop stands for cooperation.
- .info
-This are used as informative services. info stands for information.
Monday, March 21, 2011
Chapter 9 Review Questions
2. It is hard to determine how big the internet is because it is growing so quickly by the minute to measure its growth. Also, the internet doesn't have boundaries and is decentralized. It's inability to have limits make it hard for us to measure exactly how big it can be.
3. TCP/IP's are very important for the functioning of the internet because it allows cross-network communication. Without this, the TCP/IP wouldn't be able to do its job.
4. The type of internet connection you have influences the things you do with the internet becasue depening on the connectio, you can either do more or less things. With a direct connection, computers give quick responces, and have all the files stored on the computer. Where as with dialup connection, the connection is limited.
5. With the client/server model, people can share information and files, but its mainly the server who distributes the files while the client can only look at them. The server has more power in this and both users see the information differently.
6. Email addresses and URL's are similiar becuase they both have, in a way, a domain name. email addresses and URL's both take you to the main website. Email addresses follow the host name while URL's follow the domain name (such as .edu and .com).
9. File compression is important on the internet because you want to be able to send your files easily. By compressing the files, it takes up less space and travels faster.
11. Push technology is used to have information delivered automatically to the clients computer. This is better then standard web page delivery systems, becasue the stadnard system would have to ask a request to send information, where as push technology sends it automatically.
12. By the commercialization of the internet, we are able to do better things like digital chas transactions online and search whatever we like online. There are problems with these methods though. When searching on the internet, inappropriate content might pop up, or hackers can access your bank code. These problems must be put down with passwords and filtering software.
3. TCP/IP's are very important for the functioning of the internet because it allows cross-network communication. Without this, the TCP/IP wouldn't be able to do its job.
4. The type of internet connection you have influences the things you do with the internet becasue depening on the connectio, you can either do more or less things. With a direct connection, computers give quick responces, and have all the files stored on the computer. Where as with dialup connection, the connection is limited.
5. With the client/server model, people can share information and files, but its mainly the server who distributes the files while the client can only look at them. The server has more power in this and both users see the information differently.
6. Email addresses and URL's are similiar becuase they both have, in a way, a domain name. email addresses and URL's both take you to the main website. Email addresses follow the host name while URL's follow the domain name (such as .edu and .com).
9. File compression is important on the internet because you want to be able to send your files easily. By compressing the files, it takes up less space and travels faster.
11. Push technology is used to have information delivered automatically to the clients computer. This is better then standard web page delivery systems, becasue the stadnard system would have to ask a request to send information, where as push technology sends it automatically.
12. By the commercialization of the internet, we are able to do better things like digital chas transactions online and search whatever we like online. There are problems with these methods though. When searching on the internet, inappropriate content might pop up, or hackers can access your bank code. These problems must be put down with passwords and filtering software.
Wednesday, March 16, 2011
DB #2
Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.
1. Phone calling. The advantage for this would be that you can get responces from your friend at that very moment. The disadvantage would be that maybe your friend might not pick up.
2. email. The advantage would be that you can write a message as long as you want when ever you have time. The disadvantage would be waiting for the reply.
3.realtime conferencing. This would be good for relaying the message and being able to talk, the disadvantage would be that if your friend doesnt have video conference then it won't work.
4. Fax: advantage: you can send the message easily but not every one has fax and the message might get lost along the way.
5. mail. advantage: you know that your friend will receive your message and it will be saftly carried. disadvantage: you would have to wait for your mail to reach the person
Each of these option are good but some might be more reliable then others. Not everyone has money to buy real time conferencing or fax machines. This leaves phones, email, and mail. Mail would take to long, while email and phone calls would be wayu easier. With ohone calls you can talk to the person directly, and with emails you can send as big of a message as you want. Emails are better because you can send emails when ever you and your friend have time and they are more convenient.
Wednesday, March 9, 2011
Chapter 7 Databases
-Google is a large database by Sergy Brin and Larry Page
-Database is a collection of information stored on a computer
-makes it easier to store information
-information can be organized
-Database program: a software tool for organizing the storage and retrievable info
-Data can be viewed through forms or lists
-input: retrieve data
browse: navigate through info
sort: rearrange records
-SQL structured query language: a standard language for programming
-specialized database: software preprogrammed for specific purposes
-PIM personal informational manager: electric organizer
-file manager: enables users to manipulate one file at a time
- database management system: allows you to edit more then one file a time
-relational database: a program is one that allows tables related to each other to be used
-networks make it possible for personal data to be shared
3/9/11
1. DQ: What have you done this week that directly or indirectly involved a database? How would your week have been different in a world without databases?
This week i used Google to help find ideas for my Theory Of Knowledge essay. Google is a database that i use almost on a daily basis. It has a bunch of data you can find by simple searches in the search box. You can also find a wide arrangement of data from 'how to plant flowers' to 'where to buy a new computer'.
If we did not have databases then the world would be different because there would be no main source to go to for information. There would not be anywhere to store large amounts of information either. We would have to find out a new way to store information easily that would be accessible to.
Tuesday, March 8, 2011
Monday, March 7, 2011
Ch 7 Review questions
1.Definitions
batch processing: accumalating transactions and feeding them into a computer in large batches
browse: to look around
centeralized database: a database housed in a mainframe computer accesible to only certian people
client: a end user
computered fields: a database containing formulas
data minning: the discovery and extraction of hidden information from large databases.
database: a collection of information stored in a computer
database management system: a program or system of programs which can manipulate data in large collections of files
dirty data: data record with spelling mistakes
distributed data: data sewen out across networks
export data:transmiting records from a dtatabase from one program to another
field:a chunk of information in a database
file manager: a program which enables useres to manipulate data
geographical information system: a specilaized database that combines tables of data with information and displays geographical data on maps
identity theft: when soemone steal your identity online
important data: data which has a sufficeint play
object oeriented data: data stored in software objects that contain certian procudures.
privacy: not having others go through what is rightfully yours.
query: an information request
real time: when a computer preforms a task imediatly
record: informatiuon relating to ones self
record machine: a machine which records data
report: a databsae printout that is an ordered list of selected records.
right to privacy: to have your own privacy and being able to maintain it
search: to look for soemthing through databases
sort: to have your information in your database in proper folders
SQL:structured query language
XML: its advantage is its backward compatibility with HTML
2. A file manager is a program which enables a user to manipulate data while database management system is a program which manipulated data in large quantaties. The pros of using a file manager is that you can do it yourself. Where as using a database management system also has its pos because you can edit a large amount of data all at once.
3. A database is a collection of files on your computer. The computer can access these files easliy and the database is usually used as abackup for all information. This way your information never gets lost.
4. A query is a request for information. a query can be a simple search for information. As in when was Abraham Lincoln born, or when was the earths revolvation around the sun discovered?
8. In order to avoid data-entry errors, it is good to make files to sort the information in. Also it is good to link those files together so you dont accidentally have multiple files or confuse data.
10. We do have certian legal privacy rights when it comes to escaping identity theft and having privacy in our online photoalbums or emails. In what we make public, that shouldnt have much privacy rights, but what you make private should remain private.
batch processing: accumalating transactions and feeding them into a computer in large batches
browse: to look around
centeralized database: a database housed in a mainframe computer accesible to only certian people
client: a end user
computered fields: a database containing formulas
data minning: the discovery and extraction of hidden information from large databases.
database: a collection of information stored in a computer
database management system: a program or system of programs which can manipulate data in large collections of files
dirty data: data record with spelling mistakes
distributed data: data sewen out across networks
export data:transmiting records from a dtatabase from one program to another
field:a chunk of information in a database
file manager: a program which enables useres to manipulate data
geographical information system: a specilaized database that combines tables of data with information and displays geographical data on maps
identity theft: when soemone steal your identity online
important data: data which has a sufficeint play
object oeriented data: data stored in software objects that contain certian procudures.
privacy: not having others go through what is rightfully yours.
query: an information request
real time: when a computer preforms a task imediatly
record: informatiuon relating to ones self
record machine: a machine which records data
report: a databsae printout that is an ordered list of selected records.
right to privacy: to have your own privacy and being able to maintain it
search: to look for soemthing through databases
sort: to have your information in your database in proper folders
SQL:structured query language
XML: its advantage is its backward compatibility with HTML
2. A file manager is a program which enables a user to manipulate data while database management system is a program which manipulated data in large quantaties. The pros of using a file manager is that you can do it yourself. Where as using a database management system also has its pos because you can edit a large amount of data all at once.
3. A database is a collection of files on your computer. The computer can access these files easliy and the database is usually used as abackup for all information. This way your information never gets lost.
4. A query is a request for information. a query can be a simple search for information. As in when was Abraham Lincoln born, or when was the earths revolvation around the sun discovered?
6. It is better to use a personal information manager because you can edit the files all by yourself. Also, you can have all your information on there such as adress books and calanders. Its easier to use then paper notebook organizers because its more sufficient.
8. In order to avoid data-entry errors, it is good to make files to sort the information in. Also it is good to link those files together so you dont accidentally have multiple files or confuse data.
10. We do have certian legal privacy rights when it comes to escaping identity theft and having privacy in our online photoalbums or emails. In what we make public, that shouldnt have much privacy rights, but what you make private should remain private.
Subscribe to:
Posts (Atom)