Wednesday, August 10, 2011

cont. quiz 9 answer

4. Identify safeguards against hardware theft and vandalism


hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment

Safeguards Against Hardware Theft And Vandalism 
*      Restricted access (locked doors and windows)
*      Alarm systems
*      Cables
                        *      Locking devices for hard disk, other drives

5. Explain the ways software manufacturers protect against software piracy.
 
Safeguards Against Software Theft

1.  license agreement                               
 single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source

2.  product activation  = links particular computer to particular software

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to computer use.


11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
  
 Intellectual property rights
*      Ideas
*      Inventions writings
*      Art
*      Processes
*      Company and product names
*      Logos

Codes of Conduct  = guidelines for acceptable information technology behavior

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering
.

Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose 
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user. 
Spam = unsolicited email message or newsgroup posting
Privacy laws                  
          Federal laws dealing specifically with computers:
*      Electronic Communications Privacy Act (ECPA)
*      Computer Matching and Privacy Protection Act
*      Computer Fraud and Abuse Acts
*      Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.

cont. quiz 9 answer

4. Identify safeguards against hardware theft and vandalism


hardware theft = stealing computer equipment
hardware vandalism = defacing or destroying computer equipment

Safeguards Against Hardware Theft And Vandalism 
*      Restricted access (locked doors and windows)
*      Alarm systems
*      Cables
                        *      Locking devices for hard disk, other drives

5. Explain the ways software manufacturers protect against software piracy.
 
Safeguards Against Software Theft

1.  license agreement                               
 single-user license agreement end-user license agreement (EULA).
Install on one computer
Make one copy as backup
Give or sell only after removing from first source

2.  product activation  = links particular computer to particular software

6. Discuss how encryption works, and explain why it is necessary

7. Discuss the types of devices available that protect computers from
system failure

8. Explain the options available for backing up computer resources.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to computer use.


11. Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Decisions and actions are based on the accuracy of information.Just because something is on the web does not mean that it is accurate.Concerns about the ethics of using computers to alter output.
  
 Intellectual property rights
*      Ideas
*      Inventions writings
*      Art
*      Processes
*      Company and product names
*      Logos

Codes of Conduct  = guidelines for acceptable information technology behavior

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and content filtering
.

Electronic profiles - Read the privacy statements that come to you and keep a copy of what you choose 
Cookies = small text file that contains information about you or your preferences
Spyware = program placed on user’s computer without the user’s knowledge that secretly collects information about the user. 
Spam = unsolicited email message or newsgroup posting
Privacy laws                  
          Federal laws dealing specifically with computers:
*      Electronic Communications Privacy Act (ECPA)
*      Computer Matching and Privacy Protection Act
*      Computer Fraud and Abuse Acts
*      Fair Credit Reporting Act.
Content filtering = There is no censorship on the Internet.

quiz 9 - answer

1.       Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.

computer security risk.  = an event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

hacker = originally a complimentary word for a computer enthusiast.  Now it has a derogatory connotation with the same definition as cracker

cracker = person who tries to access a computer or network illegally


2. Describe various types of Internet and network attacks (computer viruses, worms, Trojan horses, rootkits, botnets, denial of service attacks, back doors, and spoofing), and identify ways to safeguard against these attacks, including firewalls, intrusion detection software, and honeypots.

Virus = alters the way the computer works, without the user’s knowledge

Worm = copies itself repeatedly, using up memory space or slowing down a network
           
Trojan horse = malicious program within a legitimate program

Safeguards against computer viruses, worms, and Trojan horses

No methods guarantee a computer or network is safe from malicious-logic programs.
Precautions that can be taken to reduce the risk of virus infection:

1.  do not boot the computer with a disk in the A: drive
2.  only open email from a trusted source
trusted source = company or person you believe will not send you a virus-infected file knowingly.
3.  turn off the message preview function for email programs
4.  set the macro security level to medium            
5. install an anti virus program and update it frequently
6.  If the anti-virus program flags an email attachment as infected, delete the email immediately
7.  scan all portable disks for viruses (floppies, zip disks, etc)
8.  Create a recovery disk and write protect it
9. Install a firewall
10.  Make backup copies of your important files



3. Discuss techniques to prevent unauthorized computer access and use

Safeguards against unauthorized access and use

1.  Companies should have an acceptable use policy (AUP).

2.      Firewalls

Monday, August 8, 2011

Quiz 8 - answer


1. Define the term, database, and explain how a database interacts with data and information.

A database is an organized collection of data for one or more purposes, usually in digital form.
 The term "database" refers both to the way its users view it, and to the logical and physical materialization of its data, content, in files, computer memory, and computer data storage

2. Describe file maintenance techniques (adding records, modifying records, deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

Character is a unit of information that roughly corresponds to a grapheme, grapheme-like unit, or symbol, such as in an alphabet or syllabary in the written form of a natural language.

The elements of records are usually called fields or members.

A record is a value that contains other values, typically in fixed number and sequence and typically indexed by names.

A computer file is a block of arbitrary information, or resource for storing information, which is available to a computer program and is usually based on some kind of durable storage.

4. Discuss the functions common to most database management systems: data dictionary, file retrieval and maintenance, data security, and backup and recovery.
The Database Library is built on a Data Dictionary, which provides a complete description of record layouts and indexes of the database, for validation and efficient data access.
The file organizer functions allow you to create folders based on information contained inside the file and outside the file system it is stored in, and move / copy the file to these folders.

5. Differentiate between a file processing approach and the database approach.
File processing approach - each department or area within an organization has its own set of data files.
Database Approach -Many programs and users share the data in a database. Reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.

6. Describe characteristics of relational, object-oriented, and multidimensional databases.

Relational Database - is a database that stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
Object - oriented database (OODB) - stores data in objects. An object is an item that contains data, as well as the actions that read or process the data.
Multidimensional database - stores data in dimensions and can store more than two dimensions of data.

7. Explain how to access Web databases.

You can use Access 2010 and Access Services, a new component of SharePoint, to build web database applications. This helps you:
  • Secure and manage access to your data
  • Share data throughout an organization, or over the Internet
 Note    A user account is required to use a web database. Anonymous access is not supported.
  • Create database applications that don't require Access to use
8. Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use


Wednesday, July 27, 2011


Blackberry

Embedded Linux is the use of Linux in embedded computer systems such as mobile phones, personal digital assistants, media players, set-top boxes, and other consumer electronics devices, networking equipment, machine control, industrial automation, navigation equipment and medical instruments.

Symbian is a mobile operating system (OS) and computing platform designed for smartphones and currently maintained by Nokia. The Symbian platform is the successor to Symbian OS and Nokia Series 60

4. Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.

A file manager or file browser is a computer program that provides a user interface to work with file systems.

Image List control is used to place images onto your forms and to use these images in toolbars, menubars, we use the image list control.

Disk Cleanup (cleanmgr.exe) is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive.

Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.

The Backup utility in Windows XP and in Windows Vista helps you protect your data if your hard disk stops working or your files are accidentally erased.

System Restore can then allow you to undo (or "roll back") a change that caused instability in your system.

original function for the screen saver was to protect the monitor from damage when a single data or picture screen was left pulled up for an extended period of time.

personal firewall will usually protect only the computer on which it is installed.

Antivirus software is your last line of defense against the many harmful programs out there that can destroy your computer.

Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.

Adware also can gather information about user’s habits and interests and send it out through a background Internet connection.

Tuesday, July 26, 2011

quiz 6 - answer

1.Define system software and identify the two types of system software.

System software is computer software designed to operate the computer hardware and to provide a platform for running application software.

Basic types of system software are:

·  Computer BIOS and device firmware
·  Operating system
·  Utility software

2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.
Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation

Unix (officially trademarked as UNIX, sometimes also written as Unix) is a multitasking, multi-user computer operating system

Linux refers to the family of Unix-like computer operating systems using the Linux kernel.

Solaris is a Unix operating system. Solaris is known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider.

NetWare is a network operating system

3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.

Windows Embedded CE 6.0 R3 is a real-time operating system for a wide range of small-footprint consumer and enterprise devices.

Windows Mobile is a mobile operating system developed by Microsoft that was used in smartphones and mobile devices,

Palm OS (also known as Garnet OS) is a mobile operating system. Palm OS is designed for ease of use with a touchscreen-based graphical user interface.
iOS (known as iPhone OS before June 2010) is Apple's mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple devices such as the iPod touch, iPad and Apple TV.

 

Monday, July 25, 2011

1. Discuss the components required for successful communications.

Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network.

2. Identify various sending and receiving devices.

A sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.

*      Microcomputers 
*    minicomputers 
*    mainframes
        *    cellular telephones 
      *    pagers
3. Describe uses of computer communications.

4. List advantages of using a network.

*       share software
*       share information with others on networks
*       share peripherals
*       speed of sharing software and information files
*       cheaper than buying individual software and hardware for each standalone especially if for a school, network software often offers deals for amount being purchased
*       security, files can be copy inhibit mode
*       centralized software management- software being loaded onto one computer but also this loads software to entire network at one time
*       electronic mail(e-mail) between network users, ideal for office memos
*       flexible access- access you files from any computer on the network unlike standalone which would mean only being able to access your data from the one computer you uploaded data onto


5. Differentiate among client/server, peer-to-peer, and P2P networks.

Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

Peer-to-peer is a communications model in which each party has the same capabilities and either party can initiate a communication session.

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers.


6. Describe the various network communications standards.

7. Explain the purpose of communications software.

Communication software is used to provide remote access to systems and is also used to exchange messages in text, audio and video format for the purpose of communication. These software send and receive data over telephone lines through modems. The communication software allows computers in different geographical regions to communicate with each other through terminal emulators, file transfer programs, chat and instant messaging programs.

8. Describe various types of lines for communications over the telephone network.

9. Describe commonly used communications devices.
*      Radio
*      Telephone systems
*      Pagers
*      Navigation systems
*      PDA's (Personal Digital Assistant)
*      Computer


10. Discuss different ways to set up a home network.

Wired Network

To set up a home network that is wired, you will need to have a network card in each computer, a router, and enough cables to connect them all.  You will also need the documentation that came with your router.  
  • Step 1 - Connect the cable from your internet modem to the port on the router labeled either uplink, or internet in most cases.  
  • Step 2 - Connect the first computer to anyone of the other ports.  
  • Step 3 - Log into your router refer to the information that came with your router.  This is usually done by entering 192.168.0.1 or 192.168.1.1 into your address bar.  Your documentation will tell you which one.  
  • Step 4 - Enter the username and password that is instructed by your router documentation.  
  • Step 5 - You should now be in the router setup.  Enter all the information for internet, you will need the protocol, PPPoE in this case, the username and password from your internet service provider.  Click on Save when done.

11. Identify various physical and wireless transmission media.

For physical transmission Media there are:
*      Twisted-Pair Cable
*      Coaxial Cable
*      Fiber-Optic Cable
For wireless trasmission media there are:
*      Broadcast Radio
*      Cellular Radio
*      Microwaves