Wednesday, March 30, 2011

LATE: Pg 237-245 4 Reading Questions

7. What does it mean to sort a data file?
To sort data means to arrange records in an alphabetic or numeric order based on value in one or more fields.
8. How can a database be designed to reduce the likelihood of data entry errors?
Using relational databases and key fields can help reduce the likelihood of data entry errors. The data scrubbing can be done through a database and remove dirty data.
10. Do we have a legal right to privacy? On what ground?
I believe we do have a legal right to privacy on the ground to being American where we are protected by our constitution. Though the times may lead to the stripping of our privacy, we still have a legal right to it.
11. Why are computers important in discussions of invasion of privacy?
Computers are so important in this discussion because with use of computers many privacy problems arise such as identity theft, data mining, and our personal data can be sold to companies. It is sad to see that our privacy is being sold for a price.

Wednesday, March 23, 2011

3/23/11 Review Questions

6. An email address has a username, a hostname, a domain, and in some cases a sub domain whereas URLS have protocols for web pages, a domain name, a path, and a resource file. URLs and emails both use top level domains.
7. File transfer protocol allows users to transfer files. File compression saves storage space on disk and saves transmission time when files are transferred through networks.
11. Push technology is when information is delivered automatically to the client computer. Usually web pages are delivered in packets and reassembled when they reach their destination.
12. As the internet becomes more commercialized there is a whole new surge of information, bad news is that there are some consequences to this discovery such as combatting inappropriate content, credit card/identity theft, email forgery and the list goes on that is why proper protection is needed.
















Chapter 9

Batch Processing: computers doing one process at a time
1957: remote connection so developers could work directly on the computers.
Arpanet lead to RAND, NPL, and CYCLADES which are the foundation for Internet
Protocol: Rules
Chapter 9: The Evolving Internet
ARPANET (Advanced Research Projects Agency Network) is predecessor to the Internet.
The Internet is an interconnected network of thousands of networks which links academic, research, governemnt, and commerical institutions
TCP/IP allows cross network comunication and breaks messages into packets, which is both flexible and robust
IP is the address for the packets.
The host is named using the Domain Name System which translates a string of IP address.
An email address includes: username@hostname.sub.dom.
Direct Connection: computer has its own IP address and is attached to a LAN
Dial Up Connection: limited connection in contrast to modem
Broadband Connections: DSL and Cable Modem Connection
Satellite Connection: using sattelite dishes
Email Server: post office for a particular host
File Server: like LANs
FTP allows users to transfer files.
Application server stores applications-PC office applications, databases, or other applications
HTTP (Hypertext Transfer Protocol

Top Level Domains

A defintion of a top level domain from Wikipedia is "A top-level domain (TLD) is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. The top-level domain names are installed in the root zone of the name space." For this assignment I will describe 10 top level domains.
1. .com: This involves commercial entities. Initially created for profit websites it eventually turned into a top level domain that is most used because anyone can register.
2. .gov: This involves government entities. Only US government people are allowed to use it.
3. .edu: This involves education entities
4. .net: network
5. .org: organization
6. .mil: military
7. .job: companies
8. .pro: professional
9. .biz: businesses
10. .info: an open top level domain that anyone can register to but is mostly used for webstites that convey information

Monday, March 21, 2011

Review Questions 3/21/11

1. Key Terms
-Internet: an interconnected network of thousands of networks
-TCP/IP: Transmission Control Protocol/Internet Protocol
-Routers: Host system
-IP: address for packers
-DNS: (Domain Name System) the host uses this and it translates IP addresses into a string of names.
-username: person's mailbox
-hostnames: name of the host computer and is followed by one or more domains seperated by period like host.domain
-Direct (dedicated) connection: computer has its own IP address and is attached to a LAN
-Dialup Connection: limited connection using a modem
-satellite connection provides connection using direcTV satellite dishes.
-Internet Service Providers: provide connections through local telephone lines
2. It links academic, research, government, and commerical institutions. On top of that it connects computer to about every country in the world. It is growing too fast to measure its growth, it is decentralized, and does not have boundaries.
3. TCP IP or the transmission Control Protocol/Interner Protocol is the heart of the internet. It allows cross network communication. It also breaks messages into packets ( each packet has all the information needed to travel from network to network)
4. This is a very important question because lets say that the network is not secure then you can't order anything online or else your data would be vulnerable.



Friday, March 18, 2011

Chapter 8

Global Positioning System
--> CPS is a specialized network developed by US Department of Defense
--> 24 satellites that revolve around the Earth
ATM: a specialized terminal linked to a bank's main computer through a commercial banking network
Network Interfere Card permits direct network connection adds an additional serial port to the computer and controls the flow of data between the computer's RAM and the network cable.
Modem: a hardware that connects a computer's serial port to a telephone line (for remote access)
-Computers send digital signals
-the modem converts the digital signals to analog so that the message can be transmitted through telephone lines.
Broadband Connection: a connection with much greater bandwidth than modems
Fiber Optic Cables: DSL and cable modems have nowhere near the bandwidth of it that replace copper wires.
Bluetooth: another type of wireless technology
Asynchronous communication is when mailing lists and newsgroups are delayed
Voice mail: messaging system with the ability to store, organize, and forward messages

Wednesday, March 16, 2011

1/16/11 Discussion Questions: 280-287

6. They would come from a TCP/IP Novell and Windows. These type of communications systems help us interact with other softwares.
8. Instant Messaging is a technolog that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and files with those who are whereas email allows internet users to send mail messages, data files, and software programs to other Internet users and to users of most commercial networks and online services.
10. Some negatives and consequences would include email issues, cookies access, security, privacy, perils of posting too much information, internet addiction. In regards to privacy, it can lead to a lot of cyber bullying and risk of communicating with someone you do not know.
13. Netiquette is Internet and Messaging Etiquette. The Internet is like a society, and with a society comes rules and without rules there is chaos. Some of their rules are behavior rules and guidelines. Some examples would be say what you mean, and say it with care, Keep it Short, Proofread your message, son't assume you're anonymous, and so on.