Martes, Agosto 9, 2011

Quiz 9

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.

Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism


2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots. 


A computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 
A worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate program. 
A root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. 
To take precautions against this malware:
1. Do not start a computer with removable media in the drives or ports. 
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source. 
4. Install an antivirus program and a personal firewall. 
5. Stay informed about any new virus alert or virus hoax. 
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.

3. Discuss techniques to prevent unauthorized computer access and use

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.

4. Identify safeguards against hardware theft and vandalism 

Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.


5. Explain the ways software manufacturers protect against software piracy. 


Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explain why it is necessary 


Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.


7. Discuss the types of devices available that protect computers from
system failure
A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.


8. Explain the options available for backing up computer resources. 


A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.


9. Identify risks and safeguards associated with wireless communications. 

Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.


10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 


Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering. 

Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. An electronic profile combines data about an individual's Web use with data from public sources, which then is sold. A cookie is a file that a Web server stores on a computer to collect data about the user. Spyware is a program placed on a computer that secretly collects information about the user. Adware is a program that displays an online advertisement in a banner or pop-up window. Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 

Lunes, Agosto 1, 2011

Quiz 7

1. Discuss the components required for successful communications.


- Successful communications requires a sending device that initiates a transmission instruction, a communications device that connects the sending device to a communications channel, a communications channel on which the data travels, a communications device that connects the communications channel to a receiving device, and a receiving device that accepts the transmission of data, instructions, or information.

2. Identify various sending and receiving devices.

- A sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.

- All types of computers and mobile devices serve as sending and receiving devices in a communications system. This includes mainframe computers, servers, desktop computers, notebook computers, Tablet PCs, smart phones, portable media players, and GPS receivers.
3. Describe uses of computer communications.

- Communications technologies include the Internet, Web, e-mail, instant messaging, chat rooms, newsgroups, blogs, wikis, RSS, VoIP, FTP, Web folders, video conferencing, and fax machine or computer fax/modem.

4. List advantages of using a network.

Speed

Cost

Security

Centralized Software Management

Resource Sharing

E-mail

Work group computing

5. Differentiate among client/server, peer-to-peer, and P2P networks.

- A client server setup has servers, which are dedicated machines that perform specific functions in the network. A server can be used to manage a network's email (mail server), database (database server), files (file server), printers (print server), or access an anti-virus (security server). This division of labor between components make a client server setup more efficient than a peer-to-peer network.

- A peer-to-peer network setup Simple network that connects fewer than 10 computers. Each computer, or peer, has equal capabilities.

- P2P is an Internet peer-to-peer network Enables users to connect to each other’s hard disks and exchange files directly.


6. Describe the various network communications standards.

- Ethernet technology allows computers to contend for access to network

-Token Ring technology controls access to network by requiring devices to pass a special signal called token.

-TCP/IP (Transmission Control Protocol/Internet Protocol) technology transmits data by breaking it up into small pieces, or packets

-802.11 (WiFi) is family of standards for wireless LANs

-Bluetooth Short-range radio waves transmit data between Bluetooth devices

-UWB specification allows data to be transferred wirelessly via short-range radio waves

-IrDA specification allows data to be transferred wirelessly via infrared light waves

-WiMax/802.16 standard that specifies how wireless devices communicate over the air in a wide area

-RFID uses radio signals to communicate with a tag placed in an object

-WAP allow wireless mobile devices to access Internet

7. Explain the purpose of communications software.

-Programs that help users establish connection to Internet, other network, or another computer

-Programs that help users manage transmission of data, instructions, and information

-Programs that provide an interface for users to communicate with one another

8. Describe various types of lines for communications over the telephone network.

- PSTN Worldwide telephone system that handles voice-oriented telephone calls

-Dial Up Line Temporary connection using telephone line for communications

-Dedicated Line Always-on connection between two communications devices

9. Describe commonly used communications devices.

- Dial Up Modems A dial-up modem converts digital signals to analog signals and vice versa

-ISDN/DSL Modems Usually external devices in which one end connects to a telephone line and the other end connects to a port on the system unit

-Cable Modem Sends and receives data over cable television network.Broadband modem.

-Wireless Modem Allows access to the Web wirelessly from a notebook computer, a PDA, a smart phone, or other mobile device.

-Network Card Ø

Adapter card, PC Card, ExpressCard module, USB network adapter, or flash card that enables computer or device to access network .
-Wireless Access Point
Central communications device that allows computers and devices to transfer data wirelessly among themselves or wirelessly to a wired network .

-Router Connects computers and transmits data to correct destination on network.
-Hub or Switch Device that provides central point for cables in network.

              

Biyernes, Hulyo 22, 2011

Quiz 6

1.Define system software and identify the two types of system software.

System software is computer software designed to operate the computer hardware and to provide a platform for running application software.
Two basic types of system software are:

An operating system is software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common services for execution of various application software. in a computer system. Without an operating system, a user cannot run an application program on their computer, unless the application program is self booting. The operating system is the most important type of system software
Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. A single piece of utility software is usually called a utility or tool.

      

2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.

Unix (officially trademarked as UNIX, sometimes also written as Unix) is a multitasking, multi-useroperating system originally developed in 1969 by a group of AT&T employees at Bell Labs, including Ken Thompson, Dennis Ritchie, Brian Kernighan, Douglas McIlroy, and Joe Ossanna. computer

Unix was designed to be portable, multi-tasking and multi-user in a time-sharing configuration. Unix systems are characterized by various concepts: the use of plain text for storing data; a hierarchical file system; treating devices and certain types of inter-process communication (IPC) as files; and the use of a large number of software tools, small programs that can be strung together through a command line interpreter using pipes, as opposed to using a single monolithic program that includes all of the same functionality. These concepts are collectively known as the Unix philosophy.


Under Unix, the "operating system" consists of many utilities along with the master control program, the kernel. The kernel provides services to start and stop programs, handles the file system and other common "low level" tasks that most programs share, and, perhaps most importantly, schedules access to hardware to avoid conflicts if two programs try to access the same resource or device simultaneously. To mediate such access, the kernel was given special rights on the system, leading to the division between user-space and kernel-space.

A Linux-based system is a modular Unix-like operating system. It derives much of its basic design from principles established in Unix during the 1970s and 1980s. Such a system uses a monolithic kernel, the Linux kernel, which handles process control, networking, and peripheral and file system access. Device drivers are either integrated directly with the kernel or added as modules loaded while the system is running.

Solaris is a Unix operating system originally developed by Sun Microsystems. It superseded their earlier SunOS in 1993. Oracle Solaris, as it is now known, has been owned by Oracle Corporation since Oracle's acquisition of Sun in January 2010.


3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS,

iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
Windows CE is optimized for devices that have minimal storage—a Windows CE kernel may run in under a megabyte of memory. Devices are often configured without disk storage, and may be configured as a “closed” system that does not allow for end-user extension (for instance, it can be burned into ROM). Windows CE conforms to the definition of a real-time operating system, with a deterministic interrupt latency. From version 3 and onward, the system supports 256 priority levels and uses priority inheritance for dealing with priority inversion. The fundamental unit of execution is the thread. This helps to simplify the interface and improve execution time.
Most versions of Windows Mobile for Pocket PC have these standard features:
Today screen shows the current date, owner information, upcoming appointments, e-mail messages, and tasks. (Home screen in later WM6.5 builds)

The taskbar shows the current time and the audio volume.

Office Mobile, a suite of Mobile versions of Microsoft Office applications, including Outlook Mobile.
Internet Explorer Mobile, an Internet browser developed by Microsoft for Pocket PC and Handheld PC that comes loaded by default with Windows Mobile and Windows CE for Handheld PC.


 4.File system similar to that of Windows 9x/Windows NT, with support for many of the same file types.
Ability to multitask.

The key features of the current Palm OS Garnet are:
Simple, single-tasking environment to allow launching of full screen applications with a basic, common GUI set
Monochrome or color screens with resolutions up to 480x320 pixel

Handwriting recognition input system called Graffiti 2

HotSync technology for data synchronization with desktop computers

Sound playback and record capabilities

Simple security model: Device can be locked by password, arbitrary application records can be made private

TCP/IP network access

Serial port/USB, infrared, Bluetooth and Wi-Fi connections
5.Expansion memory card support
Defined standard data format for personal information management applications to store calendar, address, task and note entries, accessible by third-party applications.



Miyerkules, Hulyo 20, 2011

Quiz 5

1. Differentiate between storage devices and storage media.

A storage medium (media is the plural) is the physical material on which items are kept. A storage device is the computer hardware that records and retrieves items to and from a storage medium. Storage devices can function as sources of input and output. When storage devices transfer items from a storage medium into memory – a process called reading – they function as sources of input. When storage devices transfer items from memory to a storage medium – a process called writing – they function as sources of output.

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.
Tape, one of the first storage media used with mainframe computers, is a magnetically-coated ribbon of plastic capable of storing large amounts of data and information at low cost. Because it requires sequential access, or consecutive reading and writing of data, tape is used for long-term storage and backup. (Floppy disks, hard disks, and compact discs all use direct access, which means you can locate a data item immediately, without having to move through all the items stored in front of it.

A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or mag stripe, is read by physical contact and swiping past a magnetic reading head.

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits. A smart card or microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile butadiene styrene or polycarbonate . Smart cards may also provide strong security authentication for single sign-on (SSO) within large organizations.

Microfilm and microfiche images are so small that they can be read only with a microfilm and microfiche reader. Large organizations use microfilm and microfiche to archive inactive files.
Microfilm and microfiche are used to store microscopic images of documents on roll of sheet film.
enterprise storage is the computer storage designed for large-scale, high-technology environments of the modern enterprises. When comparing to the consumer storage, it has higher scalability, higher reliability, better fault tolerance, and much higher initial price.

3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.

A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive. SSDs are distinguished from traditional hard disk drives (HDDs), which are electromechanical devices containing spinning disks and movable read/write heads. SSDs, in contrast, use microchips which retain data in non-volatile memory chips[1] and contain no moving parts.[1] Compared to electromechanical HDDs, SSDs are typically less susceptible to physical shock, are silent, and have lower access time and latency, but are more expensive per gigabyte (GB) and typically support a limited number of writes over the life of the device. SSDs use the same interface as hard disk drives, thus easily replacing them in most applications.

A memory card or flash card is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players, and video game consoles. They are small, re-recordable, and able to retain data without power.

A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g (1 oz).[1] Storage capacities in 2010 can be as large as 256 GB[2][citation needed] and offer a 10-year[citation needed]shelf storage time with steady improvements in size and price per capacity expected. Some allow 1 million write or erase cycles

The Expresscard module is a new technology that slots into a computer system to allow the addition of hardware capabilities. The Expresscard was introduced by the Personal Computer Memory CardPCMCIA) in 2003 and is a thinner, lighter and faster modular expansion for users of desktop and notebook computers. Hardware capabilities such as extra memory, wired and wireless communication tools and security devices can be added by inserting these modules into the system. International Association

4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.
Compact Disc

Released in 1982, the CD (compact disc) revolutionized the music industry by offering digital sound to home consumers in replacement of analog formats. The CD was eventually transitioned from a music source to a form of storage for data. In 1990, the CD-R was introduced and allowed for the creation of optical discs at home with a personal computer. The average CD allows for up to 700 MB of data storage. Digital bits are stored as pits on the reflective material in the disc. A red wavelength laser detects these pits and converts them to a digital signal.
Digital Versatile/Video Disktop

Released in the late 1990s, DVDs offered a widely accepted digital movie format. Allowing 4.7 GB for a single-layer disc and up to 8.5 GB for a dual-layer disc, DVD was an excellent choice for personal backups of data on a DVD-R or movie media. DVD is not only used for data and video. DVD-Audio discs are uncompressed studio master recordings that offer much higher bit-rate than a standard CD. DVDs used a red wavelength laser, much like CDs.
High Definition DVD

HD-DVD was released by Toshiba as a competing format to Sony's Blu-ray disc. HD-DVD offered enough storage space for full-length, high-definition movies on a single disc. HD-DVD discs were capable of holding 15 GB per layer with a maximum of two layers. Toshiba had planned on eventually releasing three-layer discs; however, with shifts of movie production studios, support for HD-DVD dwindled until Toshiba announced it would no longer continue the format. HD-DVD drives use a blue wavelength laser that is able to read smaller pits on the optical media.

Blu-ray

Blu-ray is the newest

Lunes, Hulyo 18, 2011

MUSIC IS ENDLESS



Music is life

Music is colorful

Music is passion

Music is soothing.

Music makes one romantic

Music evades loneliness

Music makes to forget worries

Music gives hope.


Music can take you ages back

Music can tell you stories

Music can control emotions

Music is always endless….

...good evening...

^_^

Biyernes, Hulyo 15, 2011

Quiz 3

Answers
1. Describe the four categories of output.

Answer

Monitors

Flat-screen monitors are more energy efficient than cathode ray-tube monitors. There are two major categories of monitors:

· -Cathode ray-tube or CRT

· -Liquid crystal display also known as flat-screen or LCD.

Both measure screen size diagonally and connect to the computer via USB port or a conventional printer cord. The flat-screen monitor uses less power and causes less eye strain.

Speakers and Headphones

Headphones are used to turn your computer into a telephone, stereo, or video game. Part of the sound card system that produces multimedia, speakers and headphones produce audio output. The range of audio equipment available to the average computer user is tailored to Messenger users, gamers, movie and video enthusiasts, and musicians. Most headphones also include a microphone for input as well.

Printers

Modern printers are advanced enough to publish detailed graphic arts and photos. Printers are used to make hard copies of computer output. There are three different kinds of printers.

· -Dot matrix is the oldest and since it is slow and rather noisy compared to laser and ink-jet printers it is no longer widely used.

· -Laser printers are the most expensive, but are fast and quiet

· -Ink jet printers are inexpensive to buy, but the paper and toner consumption makes up for the cheap retail price.


Disks and External Drives

Portable memory sticks may have rendered CDs obsolete as output devices. CDs (which include rewritable CDs, DVDs), floppy disks and external hard drives are used as storage devices for data output. Data can be text, video, audio or graphics files. External memory drives are often portable depending on the size. Both disk drives and CDs can also be used as input devices.

2. Characteristics of:
LCD Monitor- ultra-slim, stylish, full color display devices for the PC that fit in any part of the home or office.

LCD Screens- lightweight, aesthetically appealing, energy efficient and long-term cost effective.

Plasma Monitors- produce rich colors along with very deep blacks, wide viewing

TV’s are lit individually so the pixels can be completely turned off to display truck black colors.

HDTV’s- black level, brightness, contrast, color saturation, image processing, screen composition, tuners and cable card.


3. Components Inside the System Unit:
Processor
memory
adapter cards
ports

drive bays

power supply

motherboard

chip

Central Processing Unit

Machine Cycle


4. Components of a Processor:

Control Unit

Arithmetic/ Logic Unit (ALU)

Register

The machine cycle is the name of the four operations of the CPU. The first step is to 'fetch' the program instructions/data from the memory. The second step is to 'decode', which means translate the instruction into instructions. Step three is to 'execute', carry out the instruction. Finally step four is to 'store', write the result back to memory.


5. Define a BIT and Describe how a series of Bits Represents a Data


When the user press any letter using the keyboard the electronic signal from that letter is sent to the system unit then the system unit convert it to its binary code and stored in memory for processing. After processing the binary code for that particular letter is converted to an image and displayed on the output device.

6. Categories of Application Software:

Personal productivity Applications

Multimedia and Graphics applications

Communications applications

Home and Educational


7. The Key Features in Business programs in terms of software is editing and typing and other stuff knowing what letters to use like formatting.
8. Using web authoring software can help build web pages faster, an advantage if you are facing a deadline or a large project. There are several different types of web authoring software you can use to make great web pages without having to know all of the ins and outs of web page creation.


9. History Of Internet


The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.

In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science NetworkNSFNET provided access to supercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic. (CSNET) and again in 1986 when

Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) and Internet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.

 
10. Different storage devices:

Hard drive

External Hard Drives

network Attached Storage

Optical Media Storage

Flash Drives







Huwebes, Hulyo 14, 2011

"Never Understand"



Everyone insists on telling me
We're not meant to be together
How can I make them realise
This love will last forever

Ever since I first saw you
I knew we were meant to be
Nobody seems to understand
And they still all disagree

They say that they're telling me this
Simply because thay care
I long for a place that we're along
Away from accusing stares

They don't know about this love we have
But they still think they know best
I'm sick of everyone making trouble
And causing all this stress

They'll be frowning on us all the time
Even when we wear our wedding bands
But untill they see inside our hearts
They'll never understand



....Good Evening....

...alice jean 25... 

Martes, Hulyo 12, 2011

"M U S I C"

 
MUSIC doth uplift me like a sea
Towards my planet pale,
Then through dark fogs or heaven's infinity
I lift my wandering sail.

With breast advanced, drinking the winds that flee,
And through the cordage wail,
I mount the hurrying waves night hides from me
Beneath her sombre veil.

I feel the tremblings of all passions known
To ships before the breeze;
Cradled by gentle winds, or tempest-blown

I pass the abysmal seas
That are, when calm, the mirror level and fair
Of my despair!

Friends





A FRIEND is someone who knows your song
and sings it to you when you have forgotten it...

FRIENDS are those who are not fooled
by mistakes you have made or dark images you
hold about yourself..

They remember your beauty when
you are ugly...

Your wholeness
when you feel
BROKEN...

Your innocence
when you feel
GUILTY...

And your purpose
when you are
confused...

FRIENDS are gift from God..


...G o o d   E v e n i n g....


^_^
Nice eve'z to all :)

Biyernes, Hulyo 8, 2011

Quiz 2

1. Describe various types of pen input, and identify other types of input for smart phones.

Light Pen - Light pen is actually one more pointing input gadget. This will pick up on existence of light. It's a hand held pen fashioned gadget having a photocell installed in it's front-end. Once the front-end on the pen is actually touched on the display screen, the actual photocell registers a position associated with display. This kind of instrument also offers a button. An individual points to the actual object that will end up being chosen on the display screen using the light pen after which clicks the button in the pen. Light pen gadgets are utilized by technical engineers, visual creative designers and so on. These types of gadgets call for unique displays. Light pen can be used on PDA's and also other kinds of portable computers.
The electrical light pen input instrument is usually combined with creating computer software. Designed screen data files are usually joined using a light pen simply by directing it to display positions. A new place shows up on the screen in the area exactly where pen is placed which is sensed through the photocell. The pc software operated the feedback transmission of the instrument.
Digitizer - A Digitizer is also called a graphic tablet and uses a pen input device. It's a flat, rectangle-shaped digital plastic material pad. Every position to the digitizer points to matching video display. It's primarily useful for producing road maps and also engineering blueprints. The actual input gadgets stylus pen and also cursor can be used to trace sketches and also drawings to the digitizer.
Whenever you sketch upon the digitizer with the aid of the stylus pen or cursor, this converts the actual actions associated with stylus or cursor straight into electronic signals which are afterwards routed to the laptop or computer. Therefore a digitizer makes it simple to key in free-hand sketching in to a laptop or computer.
Stylus and Cursor - Stylus pen is actually like a ballpoint pen. It's utilized to compose textual content or make lines (or generate drawings and also pictures) on the exclusively developed graphics display or digitizer. Pen input devices found in several sophisticated graphic devices is called Digital Pen. Generally electronic digital pen supplies much more performance compared to stylus pen.
Stylus pen can be used in graphic programs for instance Computer Aided Design (CAD) and also engineering blueprints and so forth. It's got the convenience of removing textual content as well as lines.
Several portable personal computers make use of touch screens which permit someone to enter any data and even to enable selections in the monitor utilizing a stylus pen or a digital pen. PDA's utilize pen input devices along with tablet Computers quite often use a digital pen. These laptop or computer operates one-of-a-kind platforms also known as optical character recognition. Such a program converts written characters along with symbols to a mode which the computer systems may use and also process all of them.
The actual cursor is surely an input product. It's also used to trace sketches and also drawings with a graphic tablet or perhaps digitizer. This appears like some sort of computer mouse, with the exception of it's got a window using crosshairs, therefore the end user is able to see through to the actual digitizer. Cursor is generally known as Puck.



2. The purpose of various game controllers: gamepads, joysticksand wheels, light guns, dance pads,
and motion-sensing game controllers.

A gamepad, also known as a joypad, is the most common kind of game controller. They are held in both hands with thumbs and fingers used to provide input. Gamepads can have a number of action buttons combined with one or more omnidirectional control sticks or buttons. Action buttons are generally handled with the digits on the right hand, and the directional input handled with the left. Gamepads are the primary means of input on nearly all modern video game consoles. Due to the ease of use and precision of gamepads, they have spread from their origin on traditional consoles to computers, where a variety of games and emulators support their input.
Most modern game controllers are a variation of a standard gamepad. Common additions include shoulder buttons placed along the edges of the pad, centrally placed buttons labeled start, select, and mode, and an internal motor to provide haptic feedback.

This joystick is a peripheral that consists of a handheld stick that can be tilted around either of two axes and (sometimes) twisted around a third. The joystick is often used for flight simulators. HOTAS controllers, composed of a joystick and throttle quadrant (see below) are a popular combination for flight simulation among its most fanatic devotees. Most joysticks are designed to be operated with the user's primary hand (e.g. with the right hand of a right-handed person), with the base either held in the opposite hand or mounted on a desk.

The steering wheel, essentially a larger version of a paddle, is used in most racing arcade games as well as more recent racing simulators such as Live for Speed, Grand Prix Legends, GTR2, and Richard Burns Rally. While most arcade racing games have been using steering wheels since Speed Race in 1974,[1] the first steering wheels for home systems appeared on fifth-generation consoles such as the PlayStation and Nintendo 64.[citation needed]
Many are force feedback (see Force Feedback Wheel), designed to give the same feedback as would be experienced when driving a real car, but the realism of this depends on the game. They usually come with pedals to control the gas and brake. Shifting is taken care of with in various different ways including paddle shifting systems, simple stick shifters which are moved forward or back to change gears or more complex shifters which mimic those of real vehicles, which may also use a clutch. Most wheels turn only 200 to 270 degrees lock-to-lock but some models, such as the Logitech Driving Force Pro, Logitech G25 and Logitech G27 can turn 900 degrees, or 2.5 turns, lock-to-lock.
The Namco Jogcon paddle was available for the PlayStation game R4: Ridge Racer Type 4. Unlike "real" video game steering wheels, the Jogcon was designed to fit in the player's hand. Its much smaller wheel (diameter roughly similar to a soda can's) resembles the jog-and-shuttle control wheel used on some VCRs.

A light gun is a peripheral used to "shoot" targets on a screen. They usually roughly resemble firearms or ray guns. Their use is normally limited to rail shooters, or shooting gallery games like those that came with the Shooting Gallery light gun. A rare example is Taito's 1992 arcade game Gun Buster, a first-person shooter that used a joystick to move and a light gun to aim.[6]
Though light guns have been used in earlier arcade games such as Sega's Periscope in 1966[7] and Missile in 1969,[8] the first home console light gun was released for the Magnavox Odyssey in 1972; later on, Nintendo would include one standard on their Famicom and NES, called the NES Zapper. Nintendo has also released a "shell" in the style of a light gun for the more recent Wii Remote called the Wii Zapper which comes bundled with Link's Crossbow Training.

A dance pad, also known as a dance mat, dance platform, or jitter deck is a flat electronic game controller used for input in dance games. Most dance pads are divided into a 3×3 matrix of square panels for the player to stand on, with some or all of the panels corresponding to directions or actions within the game. Some dance pads also have extra buttons outside of the main stepping area, such as "Start" and "Select". Pairs of dance pads are often joined side-by-side for certain gameplay modes.



3. Explain how resolution affects the quality of a picture captured on a
digital camera.


4. Describe the uses of voice recognition, Web cams, and video conferencing.
5. Discuss how various scanners and reading devices work: optical scanners,
optical readers, bar code readers, RFID readers, magnetic stripe card
readers, MICR readers, and data collection devices.
6. Summarize the various biometric devices: fingerprint reader, face
recognition system, hand geometry system, voice verification system,
signature verification system, and iris recognition system

Huwebes, Hulyo 7, 2011

"Alice Jean 25"

What am I in the eyes of most people--a nonentity, an eccentric, or an unpleasant person--somebody who has no position in society and will never have; in short, the lowest of the low. All right, then--even if that were absolutely true, then I should one day like to show by my work what such an eccentric, such a nobody, has in his heart. That is my ambition, based less on resentment than on love in spite of everything, based more on a feeling of serenity than on passion. Though I am often in the depths of misery, there is still calmness, pure harmony and music inside me. I see paintings or drawings in the poorest cottages, in the dirtiest corners. And my mind is driven towards these things with an irresistible momentum. 





 
.....Good Evening.......




Miyerkules, Hulyo 6, 2011

Quiz1

 1.Define input and differentiate among a program, command, and user response.

Ans.

Input is the term denoting either an entrance or changes which are inserted into a system and which activate/modify a process. It is an abstract concept, used in the modeling, system(s) design and system(s) exploitation. It is usually connected with other terms, e.g., input field, input variable, input parameter, input value, input signal, input port, input device and input file (file format).

Command is a directive to a computer program acting as an interpreter of some kind, in order to perform a specific task. Most commonly a command is a directive to some kind of command line interface, such as a shell.
Specifically, the term command is used in imperative computer languages. These languages are called this, because statements in these languages are usually written in a manner similar to the imperative mood used in many natural languages. If one views a statement in an imperative language as being like a sentence in a natural language, then a command is generally like a verb in such a language.

A computer program (also a software program, or just a program) is a sequence of instructions written to perform a specified task for a computer.A computer requires programs to function, typically executing the program's instructions in a central processor. The program has an executable form that the computer can use directly to execute the instructions. The same program in its human-readable source code form, from which executable programs are derived (e.g., compiled), enables a programmer to study and develop its algorithms.

2. Identify the keys and buttons commonly found on desktop computer keyboards, and described how keyboards for mobile computers and devices differ from desktop computer keyboards.

Ans.

A desktop computer is a personal computer (PC) in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer.
Desktop and tower computers are two different styles of computer case that use desk space in varying ways. Desktop computers are designed to lay flat on the desk, while towers stand upright.
Prior to the widespread use of microprocessors, a computer that could fit on a desk was considered remarkably small. "Desktop" indicates a horizontally-oriented computer case usually intended to have the display screen placed on top to save space on the desktop. Most modern desktop computers have separate screens and keyboards.

3. Describe the different mouse types and explain how to use a mouse.

Ans.

There are various computer mice types based on technology and working principle : ball mouse, optical (LED) mouse, laser mouse. Also they can be categorized based on DPI resolution. Also there are general purpose mouse types and special gaming mouse with lots of customizable buttons and high and variable resolution and faster sampling. Also they can be classified in terms of connectivity to the computer like wired (PS2, USB) and wireless (RF, IR, Bluetooth).

         

4. Describe various types of touch screen and explain how a touch-sensitive pad works.

Ans.

There are essentially two types of mobile touch screen computers. The first type is the convertible laptop which is popular among the typical computer users and the second type is the slate PC. The slate PC is geared toward a specified function making it particularly useful for professions that require what the device offers over the other type of touch screen computer. The slate PC is a much simpler tablet style PC while the convertible laptop can take the form of a standard laptop or a tablet. The versatility of a convertible laptop makes it useful for typical computing purposes with the addition of having touch recognition.

The slate PC is a single piece where the screen makes up most of one of the large surfaces. This is in contrast to the convertible laptop with looks and functions much more like a standard laptop that opens and shuts. The slate PC is essentially a tablet with no keyboard or mouse pad but the option to use those peripherals is made possible through the USB connection. Otherwise the all user interface and command inputs are communicated to the computer entirely through the touch screen.

The light weight and improved portability of the slate PC over the convertible laptop is made possible by eliminating the keyboard and touch pad. They usually offer larger screen sizes as well so that it is more effective for creating hand written notes. The larger screen minimizes the distance between the margins of the screen which slows down note taking. For people who need to carry the tablet around and take notes while on their feet this is the perfect device for that job function.

The convertible touch screen laptops offer their own advantages and it is quite obvious what they are. These devices can transform from a standard laptop into a tablet. This is made possible by the design of the hinge which holds the screen and the rest of the computer together on a swivel allowing it to rotate 180 degrees and fold back over the keyboard screen side up. This makes it more effective when writing or drawing on the screen like a traditional notepad.

Miyerkules, Hunyo 22, 2011

"They say that happiness is a choice..."

I guess it's not.

We all want to be happy but sometimes the
situation won't allow us to be