Wednesday, August 10, 2011

QUIZ 9 # 8-12

8.A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.

9.Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.

10.A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.
11.Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. 
  • electronic profile combines data about an individual's Web use with data from public sources, which then is sold. 
  • cookie is a file that a Web server stores on a computer to collect data about the user. 
  • Spyware is a program placed on a computer that secretly collects information about the user.
  • Adware is a program that displays an online advertisement in a banner or pop-up window. 
  • Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
  • Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. 
    The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 

QUIZ 9 # 1-7

1.
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 
Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 
Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism .
2.
  • computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 
  • worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
  • Trojan horse is a program that hides within or looks like a legitimate program. 
  • root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
To take precautions against this malware:1. Do not start a computer with removable media in the drives or ports.
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source.
4. Install an antivirus program and a personal firewall.
5. Stay informed about any new virus alert or virus hoax.
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.

3. Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.

4. Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.
5. Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.

6. Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.

7.A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.

Tuesday, August 9, 2011

QUIZ 8

1. A database is an organized collection of data for one or more purposes, usually in digital form. database implies that the data is managed to some level of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn often implies the use of a general-purpose Database management system (DBMS).
2. File maintenance technique refers to the procedures that keep data current. Validation technique is the process of comparing data with a set of rules or values to find out if the data is correct.
3.
  • Character it can be a number, letter,punctuation mark and other symbols.
  • Field it is a combination of related character or bytes.
  • Record is a group of files.
  • File is a collection of related records stored in a storage medium.
4.A data dictionary, as defined in the IBM Dictionary of Computing, is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.". A File maintenance is a data-processing operation in which a master file is updated on the basis of one or more transaction files. A Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. A backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
5. In File processing approach each department or area within an organization has its own set of data files.Two major weaknesses of file processing systems are redundant data and isolated data while in Database approach many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.
6.
  • Relational database, stores data in tables that consists of rows and columns. Each row has a primary key and each column has a unique name.
  • Object-oriented database (OODB) stores data in objects;often use an object query language to manipulate and retrieve data.
  • Multidimensional database stores data in dimensions;allows users to access and analyze any view of the database data and no standard query language exists.
7. A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.
8.Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
Cybercrime Perpetrators

  • Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed.
  • Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
  • Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 
  • Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
  • Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
  • Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
  • Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
9. Database Analysts and Database Administrators are responsible for managing and coordinating all database activities.
Database Analysts (DA) - focuses on the meaning and usage of data. The DA decides on the placement of fields, defines the relationships among data, and identifies user's access privilege.
Database Administrators (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages data security, monitors database performance, and checks backup and recovery procedures. 

Monday, July 25, 2011

Quiz 6

1.
System software is computer software designed to operate the computer hardware and to provide a platform for running application software.
2.
NetWare is a network operating system developed by Novell, Inc . It initially used cooperative multitasking to run various services on a personal computer, with network protocols based on the archetypal Xerox Network Systems stack.
3.
  • Microsoft Windows CE (now officially known as Windows Embedded Compact and previously also known as Windows Embedded CE , and sometimes abbreviated WinCE) is an operating system developed by Microsoft for embedded systems. Windows CE is a distinct operating system and kernel, rather than a trimmed-down version of desktop Windows. It is not to be confused with Windows Embedded Standard which is an NT-based componentized version of desktop Microsoft Windows.Microsoft licenses Windows CE to OEMs and device makers. The OEMs and device makers can modify and create their own user interfaces and experiences, while Windows CE provides the technical foundation to do so.
  • Window Mobile the file system similar to that of Windows 9x/Windows NT, with support for many of the same file types.Office Mobile, a suite of Mobile versions of Microsoft Office applications, including Outlook Mobile.Internet Explorer Mobile, an Internet browser developed by Microsoft for Pocket PC and Handheld PC that comes loaded by default with Windows Mobile and Windows CE for Handheld PC.Windows Media Player for Windows Mobile.
  • Palm OS defined standard data format for personal information management applications to store calendar, address, task and note entries, accessible by third-party applications.Simple security model: Device can be locked by password, arbitrary application records can be made private.TCP/IP network access.HotSync technology for data synchronization with desktop computers.
4.

Friday, July 22, 2011

Quiz 7

1.
Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network
2.
sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
Microcomputers, minicomputers, and mainframes all can serve as sending and receiving devices.
3.
Today most computers are capable (through either a phone line or a cable connection) of exchanging information over the Internet. Your child can send a message from his or her computer to the computer of a neighbor or a friend on the other side of the planet. Students might use computers to communicate with their classmates about homework assignments, group projects, or other school-related activities. They may also use them to submit homework assignments and presentations to their teachers.
4.
  • A user can logon to a computer anywhere on the network and access their work files from the file server.
  • Computers can be managed centrally - with the same software installed on each one.
  • Time - it is much faster to install an application once on a network - and copy it across the network to every workstation.
  • Sharing printers, plotters, modems etc saves money and time.
  • Security - the Network Manager can allocate usernames and passwords to all users to try to prevent unauthorised access.
  • It is easy and convenient to monitor users - for example websites visited or documents printed - this can be done using software running on the server.
5.
A server a computer program running to serve the needs or requests of other programs (referred to in this context as "clients") which may or may not be running on the same computer. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application.
6.
A network standard defines guidelines that specify the way computers access the medium to which they are attached the speeds used on different types of networks, and the types of physical cable and/or wireless technology used.
Ethernet: network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted; that is, each node attempts to transmit data when it determines the network is available to receive communications. Also based on a bus topology but can be wired in a star pattern.

Token Ring: specifies that computers and devices on the network share or pass a special signal in an unidirectional manner and in a preset order. A token is a special series of bits that function like a ticket. The device with the token can transmit data over network only one token exist per network. This ensures that only one computer transmits data at a time.
TCP/IP: Short for Transmission Control Protocol/Internet Protocol; a network standard that defines how messages or data are routed from one end of the network to the other, ensuring the data arrives correctly.
(Wi-Fi): Wi-Fi is a series of network standards that specifies how two wireless devices communicate over the air with each other. Wi-Fi certifies products are guaranteed to be able to communicate with each other. Wi-Fi also supports much faster data transfer rates, allows a network many computers and devices together.
7.

  • It helps us to control the computer hardwares and use them in useful way.
  • OfficeIntercom lets you use your computer to speak to others over the internet or your local office computer network. It works as a virtual intercom and feels a little like using a CB radio. To talk to anyone else who has installed OfficeIntercom anywhere in the world, just hold down a key on the keyboard. Speak into your computer's microphone and you will be heard through the other computer's speakers. You can assign system-wide 'hot' keys, or use hardwired buttons or a SpeechMike handset to connect directly without opening OfficeIntercom.

Wednesday, July 20, 2011

1.
A storage device is a hardware device capable of storing information while a storage medium is any technology (including devices and materials) used to place, keep, and retrieve data.
2.
A tape drive is a data storage device that reads and writes data on a magnetic tape. It is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and long archival stability.
A tape drive provides sequential acces storage, unlike a disk drive, which provides random access storage.The magnetic stripe is read by physical contact and swiping past a magnetic reading head. A Smart cards can provide identification, authentication, data storage and application processing. A microfilm and microfiche allow us to keep newspapers and other bulky publications in a compact, stable form.
3.
A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive. SSDs are distinguished from traditional hard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read/write heads.A memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players, and video game consoles. They are small, re-recordable, and able to retain data without power.A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy dis ExpressCard is an interface to allow peripheral devices to be connected to a computer, usually a laptop computer. Formerly called NEWCARD, the ExpressCard standard specifies the design of slots built into the computer and of cards which can be inserted into ExpressCard slots. The cards contain electronic circuitry and connectors to which external devices can be connected. The ExpressCard standard replaces the PC Card (also known as PCMCIA) standards.
4.
The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio CD players have been commercially available since October 1982.Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression. The product is aimed at consumers. Software to view and perform simple edits to images is included on the CD.DVD is an optical disc storage media format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than compact discs while having the same dimensions.Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format. The disc diameter is 120 mm and disc thickness 1.2 mm plastic optical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB (23.31 GiB) per layer, with dual layer discs (50 GB), the norm for feature-length video discs. Triple layer discs (100 GB) and quadruple layers (128 GB) are available for BD-XL Blu-ray re-writer drives. Currently movie production companies have not utilized the triple or quadruple layer discs, most consumers owned Blu-ray players will not be able to read the additional layers, while newer Blu-ray players may require a firmware update to play the triple and quadruple sized discs.
5.

 An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer and range from small inexpensive consumer models to very large professional machines that can cost up to thousands of dollars.A laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process, but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.An MFP (Multi Function Product/ Printer/ Peripheral), multifunctional, all-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting (the SOHO market segment), or to provide centralized document management/distribution/production in a large-office setting.A thermal printer (or direct thermal printer) produces a printed image by selectively heating coated thermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image. Two-color direct thermal printers can print both black and an additional color (often red) by applying heat at two different temperatures.

Tuesday, July 19, 2011

QUIZ 3 7-10

7.
The Key Features in Business programs in terms of software is editting and typing and other stuff knowing what letters to use like formating.
8.
  •  No special configuration or changes are need on user's PCs
  • Lower costs.
  • Centralised data is secure and easy to backup
  • Updates can be made quickly and easily
  • Information is accessible to a wide audience anywhere in the world
  • Everybody has a browser - familiar interface encourages use
  • Online training can be completed at user's own time and pace.
  • Always up-to-date
9.
The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.
In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.
Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) and Internet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.
10.
  • Hard drive(Internal)
  • External Hard Drive
  • Network attached Storage
  • Optical Media Storage
  • Flash Drives