Wednesday, August 10, 2011

QUIZ 9 # 8-12

8.A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.

9.Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.

10.A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.
11.Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. 
  • electronic profile combines data about an individual's Web use with data from public sources, which then is sold. 
  • cookie is a file that a Web server stores on a computer to collect data about the user. 
  • Spyware is a program placed on a computer that secretly collects information about the user.
  • Adware is a program that displays an online advertisement in a banner or pop-up window. 
  • Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
  • Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. 
    The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 

QUIZ 9 # 1-7

1.
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 
Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 
Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism .
2.
  • computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 
  • worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
  • Trojan horse is a program that hides within or looks like a legitimate program. 
  • root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
To take precautions against this malware:1. Do not start a computer with removable media in the drives or ports.
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source.
4. Install an antivirus program and a personal firewall.
5. Stay informed about any new virus alert or virus hoax.
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.

3. Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.

4. Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.
5. Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.

6. Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.

7.A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.

Tuesday, August 9, 2011

QUIZ 8

1. A database is an organized collection of data for one or more purposes, usually in digital form. database implies that the data is managed to some level of quality (measured in terms of accuracy, availability, usability, and resilience) and this in turn often implies the use of a general-purpose Database management system (DBMS).
2. File maintenance technique refers to the procedures that keep data current. Validation technique is the process of comparing data with a set of rules or values to find out if the data is correct.
3.
  • Character it can be a number, letter,punctuation mark and other symbols.
  • Field it is a combination of related character or bytes.
  • Record is a group of files.
  • File is a collection of related records stored in a storage medium.
4.A data dictionary, as defined in the IBM Dictionary of Computing, is a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.". A File maintenance is a data-processing operation in which a master file is updated on the basis of one or more transaction files. A Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. A backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
5. In File processing approach each department or area within an organization has its own set of data files.Two major weaknesses of file processing systems are redundant data and isolated data while in Database approach many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.
6.
  • Relational database, stores data in tables that consists of rows and columns. Each row has a primary key and each column has a unique name.
  • Object-oriented database (OODB) stores data in objects;often use an object query language to manipulate and retrieve data.
  • Multidimensional database stores data in dimensions;allows users to access and analyze any view of the database data and no standard query language exists.
7. A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.
8.Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.
Cybercrime Perpetrators

  • Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed.
  • Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.
  • Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 
  • Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.
  • Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
  • Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.
  • Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
9. Database Analysts and Database Administrators are responsible for managing and coordinating all database activities.
Database Analysts (DA) - focuses on the meaning and usage of data. The DA decides on the placement of fields, defines the relationships among data, and identifies user's access privilege.
Database Administrators (DBA) requires a more technical inside view of the data. The DBA creates and maintains the data dictionary, manages data security, monitors database performance, and checks backup and recovery procedures. 

Monday, July 25, 2011

Quiz 6

1.
System software is computer software designed to operate the computer hardware and to provide a platform for running application software.
2.
NetWare is a network operating system developed by Novell, Inc . It initially used cooperative multitasking to run various services on a personal computer, with network protocols based on the archetypal Xerox Network Systems stack.
3.
  • Microsoft Windows CE (now officially known as Windows Embedded Compact and previously also known as Windows Embedded CE , and sometimes abbreviated WinCE) is an operating system developed by Microsoft for embedded systems. Windows CE is a distinct operating system and kernel, rather than a trimmed-down version of desktop Windows. It is not to be confused with Windows Embedded Standard which is an NT-based componentized version of desktop Microsoft Windows.Microsoft licenses Windows CE to OEMs and device makers. The OEMs and device makers can modify and create their own user interfaces and experiences, while Windows CE provides the technical foundation to do so.
  • Window Mobile the file system similar to that of Windows 9x/Windows NT, with support for many of the same file types.Office Mobile, a suite of Mobile versions of Microsoft Office applications, including Outlook Mobile.Internet Explorer Mobile, an Internet browser developed by Microsoft for Pocket PC and Handheld PC that comes loaded by default with Windows Mobile and Windows CE for Handheld PC.Windows Media Player for Windows Mobile.
  • Palm OS defined standard data format for personal information management applications to store calendar, address, task and note entries, accessible by third-party applications.Simple security model: Device can be locked by password, arbitrary application records can be made private.TCP/IP network access.HotSync technology for data synchronization with desktop computers.
4.

Friday, July 22, 2011

Quiz 7

1.
Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network
2.
sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
Microcomputers, minicomputers, and mainframes all can serve as sending and receiving devices.
3.
Today most computers are capable (through either a phone line or a cable connection) of exchanging information over the Internet. Your child can send a message from his or her computer to the computer of a neighbor or a friend on the other side of the planet. Students might use computers to communicate with their classmates about homework assignments, group projects, or other school-related activities. They may also use them to submit homework assignments and presentations to their teachers.
4.
  • A user can logon to a computer anywhere on the network and access their work files from the file server.
  • Computers can be managed centrally - with the same software installed on each one.
  • Time - it is much faster to install an application once on a network - and copy it across the network to every workstation.
  • Sharing printers, plotters, modems etc saves money and time.
  • Security - the Network Manager can allocate usernames and passwords to all users to try to prevent unauthorised access.
  • It is easy and convenient to monitor users - for example websites visited or documents printed - this can be done using software running on the server.
5.
A server a computer program running to serve the needs or requests of other programs (referred to in this context as "clients") which may or may not be running on the same computer. Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application.
6.
A network standard defines guidelines that specify the way computers access the medium to which they are attached the speeds used on different types of networks, and the types of physical cable and/or wireless technology used.
Ethernet: network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted; that is, each node attempts to transmit data when it determines the network is available to receive communications. Also based on a bus topology but can be wired in a star pattern.

Token Ring: specifies that computers and devices on the network share or pass a special signal in an unidirectional manner and in a preset order. A token is a special series of bits that function like a ticket. The device with the token can transmit data over network only one token exist per network. This ensures that only one computer transmits data at a time.
TCP/IP: Short for Transmission Control Protocol/Internet Protocol; a network standard that defines how messages or data are routed from one end of the network to the other, ensuring the data arrives correctly.
(Wi-Fi): Wi-Fi is a series of network standards that specifies how two wireless devices communicate over the air with each other. Wi-Fi certifies products are guaranteed to be able to communicate with each other. Wi-Fi also supports much faster data transfer rates, allows a network many computers and devices together.
7.

  • It helps us to control the computer hardwares and use them in useful way.
  • OfficeIntercom lets you use your computer to speak to others over the internet or your local office computer network. It works as a virtual intercom and feels a little like using a CB radio. To talk to anyone else who has installed OfficeIntercom anywhere in the world, just hold down a key on the keyboard. Speak into your computer's microphone and you will be heard through the other computer's speakers. You can assign system-wide 'hot' keys, or use hardwired buttons or a SpeechMike handset to connect directly without opening OfficeIntercom.

Wednesday, July 20, 2011

1.
A storage device is a hardware device capable of storing information while a storage medium is any technology (including devices and materials) used to place, keep, and retrieve data.
2.
A tape drive is a data storage device that reads and writes data on a magnetic tape. It is typically used for offline, archival data storage. Tape media generally has a favorable unit cost and long archival stability.
A tape drive provides sequential acces storage, unlike a disk drive, which provides random access storage.The magnetic stripe is read by physical contact and swiping past a magnetic reading head. A Smart cards can provide identification, authentication, data storage and application processing. A microfilm and microfiche allow us to keep newspapers and other bulky publications in a compact, stable form.
3.
A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive. SSDs are distinguished from traditional hard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read/write heads.A memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players, and video game consoles. They are small, re-recordable, and able to retain data without power.A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy dis ExpressCard is an interface to allow peripheral devices to be connected to a computer, usually a laptop computer. Formerly called NEWCARD, the ExpressCard standard specifies the design of slots built into the computer and of cards which can be inserted into ExpressCard slots. The cards contain electronic circuitry and connectors to which external devices can be connected. The ExpressCard standard replaces the PC Card (also known as PCMCIA) standards.
4.
The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio CD players have been commercially available since October 1982.Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression. The product is aimed at consumers. Software to view and perform simple edits to images is included on the CD.DVD is an optical disc storage media format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than compact discs while having the same dimensions.Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format. The disc diameter is 120 mm and disc thickness 1.2 mm plastic optical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB (23.31 GiB) per layer, with dual layer discs (50 GB), the norm for feature-length video discs. Triple layer discs (100 GB) and quadruple layers (128 GB) are available for BD-XL Blu-ray re-writer drives. Currently movie production companies have not utilized the triple or quadruple layer discs, most consumers owned Blu-ray players will not be able to read the additional layers, while newer Blu-ray players may require a firmware update to play the triple and quadruple sized discs.
5.

 An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer and range from small inexpensive consumer models to very large professional machines that can cost up to thousands of dollars.A laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process, but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.An MFP (Multi Function Product/ Printer/ Peripheral), multifunctional, all-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting (the SOHO market segment), or to provide centralized document management/distribution/production in a large-office setting.A thermal printer (or direct thermal printer) produces a printed image by selectively heating coated thermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image. Two-color direct thermal printers can print both black and an additional color (often red) by applying heat at two different temperatures.

Tuesday, July 19, 2011

QUIZ 3 7-10

7.
The Key Features in Business programs in terms of software is editting and typing and other stuff knowing what letters to use like formating.
8.
  •  No special configuration or changes are need on user's PCs
  • Lower costs.
  • Centralised data is secure and easy to backup
  • Updates can be made quickly and easily
  • Information is accessible to a wide audience anywhere in the world
  • Everybody has a browser - familiar interface encourages use
  • Online training can be completed at user's own time and pace.
  • Always up-to-date
9.
The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.
In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.
Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) and Internet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.
10.
  • Hard drive(Internal)
  • External Hard Drive
  • Network attached Storage
  • Optical Media Storage
  • Flash Drives

QUIZ 3 1-6

1.
  •  Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. 
  •  Graphics are digital representations of nontext information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). 
  • Audio is music, speech, or any other sound. 
  • Video consists of images played back at speeds to provide the appearance of full motion.
2.
LCD stands for Liquid Crystal Display, referring to the technology behind these popular flat panel monitors.
An LCD monitor is distinguishable from a traditional CRT monitor as the latter has a bulky footprint with a depth of several inches and a weight of 30 - 50 pounds (13 - 23 kilograms) or more, while LCDs are commonly 1 - 3 inches (2.5 - 7.5 cm) thick and weigh less than 10 pounds (4.5 k).
Plasma Monitor. A type of flat-panel display that works by sandwiching a neon/xenon gas mixture between two sealed glass plates with parallel electrodes deposited on their surfaces. The plates are sealed so that the electrodes form right angles, creating pixels.
High-definition television (or HDTV) is video that has resolution substantially higher than that of traditional television systems (standard-definition TV, or SDTV, or SD). HDTV has one or two million pixels per frame, roughly five times that of SD. Early HDTV broadcasting used analog techniques, but today HDTV is digitally broadcast using video compression.

3.
   System unit components include the processor, memory module, cards, ports, and connectors. Many of the system unit’s components reside on a circuit board called the motherboard. The motherboard contains many different types of chips, or small pieces of semiconducting material, on which one or more integrated circuits (IC) are etched. An integrated circuit is a microscopic pathway capable of carrying electronic current. Each IC can contain millions of transistors, which act as switches for electronic signals.
4.
A machine cycle consists of a sequence of three steps that is performed continuously and at a rate of millions per second while a computer is in operation. They are fetch, decode and execute. There also is a fourth step, store, in which input and output from the other three phases is stored in memory for later use; however, no actual processing is performed during this step.
5.
bit (a contraction of binary digit) is the basic unit of information in computing and telecommunications; it is the amount of information stored by a digital device or other physical system that exists in one of two possible distinct states. These may be the two stable states of a flip-flop, two positions of an electrical switch, two distinct voltage or current levels allowed by a circuit, two distinct levels of light intensity, two directions of magnetization or polarization, etc.
6.
1. Personal productivity applications
2. Multimedia and Graphics applications
3. Communications applications
4. Home and educational

Thursday, July 14, 2011

QUIZ 2 1-4

1. Light Pen - is one more pointing input gadget. This will pick up on existence of light. It's a hand held pen fashioned gadget having a photocell installed in it's front-end.

Digitizer - is also called a graphic tablet and uses a pen input device. It's a flat, rectangle-shaped digital plastic material pad. Every position to the digitizer points to matching video display. It's primarily useful for producing road maps and also engineering blueprints.

Stylus and Cursor - is actually like a ballpoint pen. It's utilized to compose textual content or make lines (or generate drawings and also pictures) on the exclusively developed graphics display or digitizer.

Types of Input of smartphones:

Location of the Mirror Server
    In the proposed architecture, the mirror server monitors all network traffic of smartphones.

Mirror Design
    Compared with using PCs, creating mirrors for smartphones has many advantages. First, same model smartphones have the same hardware specifications, default factory settings, OS, and many software applications.

Synchronization Mechanisms
    To keep a smartphone and its mirror synchronized through the telecom network, the mirror needs to be updated when the state of the smartphone changes. In this paper, one option is presented for loose synchronization, which requires identical hardware specification, storage (e.g. SD card), OS, and installed application software.

Network Design    The mirror server resides in a 3G network as an application server and supports services such as security, storage, and computation delegation. It is easy to configure the nodes of a 3G network to route all incoming/outgoing smartphone messages (such as session control messages, data packets, and other 3G signaling protocols) to traverse the mirror server without any interaction with the smartphone.
2. GAMEPAD also known as a joypad, is the most common kind of game controller. They are held in both hands with thumbs and fingers used to provide input. Gamepads can have a number of action buttons combined with one or more omnidirectional control sticks or buttons.

This joystick is a peripheral that consists of a handheld stick that can be tilted around either of two axes and twisted around a third. The joystick is often used for flight stimulator.

A light gun is a peripheral used to "shoot" targets on a screen. They usually roughly resemble firearms or ray guns. Their use is normally limited to rail shooters, or shooting gallery games like those that came with the Shooting Gallery light gun.

A dance pad, also known as a dance mat, dance platform, or jitter deck is a flat electronic game controller used for input in dance games. Most dance pads are divided into a 3×3 matrix of square panels for the player to stand on, with some or all of the panels corresponding to directions or actions within the game.
 
3. Sharpness and clarity of image. The higher the resolution, the better the image quality, but the more expensive the camera.

4. Web cam - video camera whose output displays on a Web page. The web cam is a video camera which feeds its images in real time to a computer or computer network, often via USB, ethernet or Wi-fi.



  A videoconference or video conference (also known as a videoteleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously. It has also been called 'visual collaboration' and is a type of groupware.

Thursday, July 7, 2011

BEFORE I LET YOU GO

I can still remember yesterday
We were so in love in a special way
And knowing that your love
Made me feel... Oh... So right

But now I feel lost
Don't know what to do
Each and everyday I think of you
Holdin' back the tears
I'm trying with all my might

Refrain:
Because you've gone and left me
Standin' all alone
And I know I've got to face
Tomorrow on my own
But baby

Chorus:
Before I let you go
I want to say I love you...
I hope that you're listenin'
'Coz it's true, baby...
You'll be forever in my heart
And I know that no one else will doohh... yeah...
So before I let you go
I want to say I love you...

I wish that it could be
Just like before
I know I could've given you
So much more
Even though you know
I've given you all my love
I miss your smile, I miss your kiss
Each and everyday I reminisce
'Coz baby it's you
That I'm always dreamin' of

Refrain:
Because you've gone and left me
Standin' all alone
And I know I've got to face
Tomorrow on my own
But baby

Chorus:
Before I let you go
I want to say I love you...
I hope that you're listenin'
'Coz it's true, baby...
You'll be forever in my heart
And I know that no one else will doohh... yeah...
So before I let you go
I want to say

Bridge:
Cause letting love go is never easy
But I love you so
That's why I set you free
I know someday, somehow
I'll find a way
To leave it all behind me
Guess it wasn't meant to be my baby

[Chorus:]
Before I let you go
I want to say I love you
I hope that you're listenin'
'Coz it's true, baby
You'll be forever in my heart
And I know that no one else will do
So before I let you go
I want to say...
So before I let you go
I want to say...

[Instrumental]

I love you...

Tuesday, July 5, 2011

1. INPUT-  Whatever goes into the computer. Input can take a variety of forms, from commands you enter from the keyboard to data from another computer or device. A device that feeds data into a computer, such as a keyboard or mouse, is called an input device. The act of entering data into a computer.
     A program  an organized list of instructions that, when executed, causes the computer to behave in a predetermined manner. Without programs, computers are useless. A command an instruction to a computer or device to perform a specific task. Commands come in different forms. They can be special words (keywords) that a program understands, function keys , choices in a menu, buttons or other graphical objects on your screen. A response a common authentication technique whereby an individual is prompted (the challenge) to provide some private information (the response).

2.
alphanumeric keys - letters and numbers
punctuation keys - comma, period, semicolon, and so on.
special keys - function keys, control keys, arrow keys, Caps Lock key, and so on.
  A keyboards for mobile computer

3.
mechanical - has a rubber or metal ball on its underside that can roll in all directions. Mechanical sensors within the mouse detect the direction the ball is rolling and move the screen pointer accordingly.
optomechanical - same as a mechanical mouse, but uses optical sensors to detect motion of the ball.
optical - uses a laser to detect the mouse's movement. You must move the mouse along a special mat with a grid so that the optical mechanism has a frame of reference. Optical mice have no mechanical moving parts. They respond more quickly and precisely than mechanical and optomechanical mice, but they are also more expensive.

4.  types of touch screen
  • conductive
  • resistive
  • protective layer
Touch-sensitive pad used as a pointing device on some portable computers. By moving a finger or other object along the pad, you can move the pointer on the display screen. And you click by tapping the pad.

Wednesday, June 29, 2011

BOB ONG

Hiwalayan mo kung hindi kana masaya...
walang gamot sa tanga kundi pagkukusa.. :)

Tuesday, June 28, 2011

:)

When a girl has no make up on, her hair is a mess, she is dressed in rags and you look her into the eyes and say your beautiful, thats love.
When a guy does something embarrasing for you, its love.
When you have no words for what you are feeling, its love