Martes, Agosto 9, 2011

QUIZ 9

Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

Answer:
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability. Cybercrime is an online or Internet-based illegal act like :
    a.) Hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.
    b.)  Cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.
    c.) Script kiddies is a derogatory term used to describe those who use script or programs developed by others to attack computer systems and networks and deface websites and have their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.Such programs have included remote denial-of-service and vulnerability scanner/injector and often software intended for legitimate security auditing.
    d.) Corporate spies
    e.) Unethical employee
    f.) Cyberextorionist
    g.) Cyberterrorists

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

Ansewr:
A computer virus affects the computer negatively by altering the way the computer works, Worm copies itself repeatedly, using up resources and possibly shutting down computer or network. Trojan horse is a malicious program that hides within or looks like a legitimate program and Rootkit is a program that hides in a computer and allows someone from a remote location to take full control. A denial service attack is an assualt which disrupts computer access to an Internet service such as the Web or-email. Back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource while spoofing is a tachnique intruders use to make their networks or Internet transmission appear legitimate to a victim computer or network. There are ways to prevent the different kinds of virus in computers like firewall it is a security system consisting of hardware and or software that prevents unathorized intrusion, monitors transmissions to and from computer and informs you to attempted intrusion. intrusion detection software analyzes network traffic, assesses system vulnerabilities and identifies intrusions and suspicious behavior.

3. Discuss techniques to prevent unauthorized computer access and use

Answer:
Some ways to prevent anuathorized computer access and use by disabling the file, folder and printer sharing on internet connection. use a user name with unique combination of characters that identifies user and make a password this is a private combination of characters associated with the user name that allows access to computer resources. aside from that ypou can also use a biometric device this is to authenticates person's identity using personal characteristics like fingerprints, hand geometry, voice, signature and iris.

4. Identify safeguards against hardware theft and vandalism.

Answer:
Hardware theft  is act of stealing computer equipment and hardware vandalism is an act of defacing or destroying computer equipment to safeguard computer from hardware theft and vandalism must used cables to lock equipment, for notebooks computers use passwords, possessed objects and biometrics as security methods and also password can protect mobile devices.
5. Explain the ways software manufacturers protect against software piracy.

Answer:
Software theft is an act of stealing or illegally stealing software, copying software or intentionally erasing programs, software piracy is illegal duplication of copyrighted software and to protect the
manufacturer's software against piracy they should have a license agreement this is an agreement in which users have the right to use the software legally and single-user liscense agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. Another way is the product activation which allows user to input product identification number online by telephone and receive unique installation identification number.
6. Discuss how encryption works, and explain why it is necessary.

Answer:
Encryption is to safeguard against information theft, process of converting plaintext (readable data) into ciphertext (unreadable characters) it is necessary because it often uses more than one method the Encryption key (formula), to read the data, the recipient must decrypt, or decipher the data.

7. Discuss the types of devices available that protect computers from
system failure.

Answer:
System failure is a prolonged malfunction of computer cause by aging hardware, natural disasters, or electrical power disturbances to protect the system from the said failure devices are available to protect the computer like surge protector it protects computer and equipment from electrical power disturbances and also uninterruptible power supply (UPS) is urge protector that provides power during power loss.

8. Explain the options available for backing up computer resources.

Answer:
Backup is a duplicate of file, program or disk, there are three options available for backing up computer the full back up of all files in computer, selective back up select which files to back up and three generation back up it preseves three copies of important files. ,in case of system failure or corrupted files restore files by copying to original location.

9. Identify risks and safeguards associated with wireless communications.

10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

Answer:
hanging on computers in long hours is not healthy to our body infact is directly affects our vision and other parts and also our social life some of these are coputer vision syndrom (CVS) this is the eye and vision problems, the
repetitive strain injury (RSI) or the carpal tunnel syndrom (CTS) the inflammation of nerve that connects forearm to palm and tendonitis the inflammation of tendon due to repeated motion and the third one is Computer addiction it is when computer consumes entire social life. but there are some ways to prevent this health-related disorders such as spreading fingers apart for several seconds while keeping wrists straight, gently push back fingers and then thumb, dangle arms loosely at side and then shake arms and hands. To ease eyestrain while working at the computer, you must have take an eyebreak every 10-15 minutes look into the distance and focus on an object for 20-30 seconds, roll your eyes in complete circle, close your eyes and rest them at least for one minute, blink your eyes every five seconds, place your display device about an arm's lenght away from your eyes with the top of the screen at eye level or below, use large fonts, if you wear glasses, ask your doctor about computer glasses and adjust the lighting.
11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.

Answer:
Intellectual property is the right to which creators are entitled for their work, Codes od conduct is a written guidelines that helps determine whether computer action is ethical and employers can distribute to their employess in order to them to have a guide.


12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.

Answer:
Information privacy is the right of individuals and companies to deny or restrict collection and use of information about them yet today,  it is difficult because data is stotred online, employee monitoring is using computers to observe employee computer use and it is legal for employers to use monitoring software programs.  Electronic profile is a data collected when you fill out form on Web and there are merchants sell your electronic profile, often times you can specify whether you want personal information distributed. Cookies are small text file on your computer that contains data about you, some Web sites sell or trade information stored in the cookies and set browser to accept cookies promt you to accept cookies, or disable cookies. Spyware is a program placed on computer without user's knowledge while adware is a program that displays online advertisement. Spam is unsolicited e-mail messages sent to many recipients. Phishing is scam in which perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.

Huwebes, Agosto 4, 2011

QUIZ 8


Quiz 8 - Database Management

1. Define the term, database, and explain how a database interacts with data
and information.

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

5. Differentiate between a file processing approach and the database
approach.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.

7. Explain how to access Web databases.

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use
ANSWER:
1. Database -  is a collection of data organized so you can access, retrieve, and use it. Data is a raw facts while Information is a data that is organized and meaningful. Computers process data into information including a photograph, is entered and stored on the hard disk and extracts the member data from disk and lastly the receipt is created and printed.


2. File maintenance techniques - is a procedure that keep data current and add, change and delete (A,C, D), add new record when you obtain new data, change record to correct inaccurate data and update old data, records are deleted when it is no longer needed and some programs remove record immediately others flag record.

3. Field is a combination of one or more characters the smallest unit of data user accesses field name uniquely identifies each field, field size defines the maximum number of characters a field can contain and data type specifies kind of data field contains. Record are group of related fields the key field or primary key uniquely ientifies each record. And data file is collection of related records stored on disk.

4. Data dictionary contains ata about each file in database and each field within those files. Data security provides means to ensure only uathorized users can access data and access priviledges define activities that specific user or group of users can perform thus priviledges are the read-only priviledge wherein user can view data but cannot change it and full-update priviledges in which users can viewed and change data. Backup is a copy of the entire database.

5. File processing approach each department or area within organization has own set of files and records in one file may not relate to records in any other file and may have strenght as to reduced data redundancy, improved data integrity, shared data, easier access and reduced development time and its weaknesses like data redundancy same fields stored in multiple files and isolated data that are stored in a separate files so it is difficult to access. While database processing is an approach in which many programs and users can share data in database and secures data so only authorized users can access a certain data.

6. The four popular data models are the following relational database stores data in tables that consist of row and columns, each row has primary key and each columns has unique name it also stores data relationships and uses specialized terinology, object-oriented stores data in objects, can store more types of data, access data faster and programmers can refuse objects, example stores images, audio and video clips, engineering, architectural , and scientific designs, stores also documents such as schedules, calendars, manuals, menus and reports, and contains links and other documents lastly link to e-form on Webpage, and lastly multidimensional database stores data in dimensions also called hypercube, allow users to anlyze any view of data and can consolidate data much faster than relational database.

7. To access Web database by simply by filling in a form on a Web page usually resides on a database server, a computer that stores and provides access to a database.

8.

9. Guidelines for developing for developing database first you have to determine the purpose of the database, design the tables, in designing the tables fint on paper and each table should contain data about one subject, design the records and fields for each tables and be sure every record has a unique primary key, use separate fields for logically distinct items, do not create fields for information that can be derived from entries in other fields, allow enough space for each field and set default values for frequently entered data, and lastly determine the relationships among the tables or filesDatabase analyst focuses on meaning and usage of data, decides proper placement of fields, defines relationships, and identifies users' access privileges while Database administrator create and maintains data dictionary, manages database security, monitors database performance, and checks backup and recovery procedures.

10. Guidelines for developing a database first you have etermine the purpose of the database, second design the tables by fint on paper and each table should contain data about one subject, third, design the records and fields for each table and be sure every record has a unique primary key, use separate fields for logically distinct items, do not create fileds for information that can be derived from entries in other fields, allow enough space for each field and set default values for frequently entered data and the fourth one is to determine the relationships among the tables or files.

Lunes, Hulyo 25, 2011

QUIZ 7

1. Discuss the components required for successful communications.

2. Identify various sending and receiving devices.

3. Describe uses of computer communications.

4. List advantages of using a network.

5. Differentiate among client/server, peer-to-peer, and P2P networks.

6. Describe the various network communications standards.

7. Explain the purpose of communications software.

8. Describe various types of lines for communications over the telephone network.

9. Describe commonly used communications devices.

10. Discuss different ways to set up a home network.

11. Identify various physical and wireless transmission media.

ANSWERS:

1. Components for successful communications:
       Communication is a process wherein two or more computers or devices transfer data, instructions and information throught the use of  Sending device which initiates an instruction to transmit data, instructions or information, a Communication device which converts or formats the data, instructions or information from the sending device into signals carried by a Communication channel or path on which the signals travel. Also required are a communications device that receives signals from the Communications channel that connects the communication channel to the receiving device and converts or formats them so the Receiving device can understand the signals and that accepts transmission of data, instructions or information  

2. Sending Devices and Receiving Devices:

3.) Uses of Computer Communications:

     1. Voicemail - is voice message converted to digital form it allows callers to leave a voice message for the called party    

     2. Collaboration - is working with other users connected to a server

     3. Groupware - is software that allows people work together and share information

     4. Global positioning system,(GPS) a navigation system that consists of one or more earth-based
receivers that accept and analyze signals sent by satellites in order to determine receiver’s geographic location 

     5. Fax - is a document transmitted and received over telephone lines it contain handwritten or typed text, illustrations, photographs, or other graphics and can send or receive a fax using a stand-alone fax machine or a computer fax modem

     6. Email - is the exchange of text messages and computer files transmitted via a communications network
     7. Instant Messaging (IM) - is a real-time Internet communications service that notifies you when one or more people are online and then allows you to exchange messages or files with them or join a private chat room.
     8. Chat rooms - permits users to converse in real time with each other via the computer while connected to the Internet wherein you can experience a live conversation.

     9. Newsgroup - is an area on the Web where users conduct written discussions about a particular subject.
     10. Internet telephony - enables you to talk to other people over the Internet of one or more called parties
     11. Videoconferencing - it involves using video and computer technology to conduct a meeting between participants at two or more geographically separate locations with microphones, speakers, video cameras, and communications devices and software
     12. Other Conferencing systems -
          1.) Web conference - is conferencing system that uses the Internet, Web browsers, and Web servers to deliver this service
          2.) Video telephone call - used by home users to see each other as they talk on the Internet
4.) Advantages in using a network 
  • share software
  • share information with others on networks
  • share peripherals
  • speed of sharing software and information files
  • cheaper than buying individual software and hardware for each standalone especially if for a school, network software often offers deals for amount being purchased
  • security, files can be copy inhibit mode
  • centralized software management- software being loaded onto one computer but also this loads software to entire network at one time
  • electronic mail(e-mail) between network users, ideal for office memos
  • flexible access- access you files from any computer on the network unlike standalone which would mean only being able to access your data from the one computer you uploaded data onto

5.) Client/ Server - One or more computers act as a host computer and other computers access the host computer.
     Peer-to-Peer - is a simple network that connects fewer than 10 computers each computers has equal                                    capabilities.
     P2P Network - enables users to connect to each other's hard disks and exchange files directly, and                                         sometimes called a file sharing networks.
6.) Various Network Communications Standards:
        1. Ethernet - is a technology that allows computers to contend for access to network
        2. Token ring -  is a technology that controls access to network by requiring devices to pass a special signal called Token
        3. TCP/IP -  (Transmission  Control Protocol/ Internet Protocol)  -  is a technology that transmits data by breaking it up into small pieces or packets.
        4. 802.11 - is a family of standards for Wireless LAN's
        5. Bluetooth  - is a short -range radio waves transmit data between Bluetooth devices and it contains a small chip to communicate with each other
       6. WAB - is a specification allows data to be transferred wirelessly via short-range radio waves.
       7. IrDA - specification that allows data to be transferred wirelessly via infrared light waves.
       8. RFID (Radio Frequency Identification) - users radio signals to communicate with tag placed in an object.
       9. WiMAX - is a standard that specifies how wireless devices communicate over the air in a wide area
7. Explain the purpose of communications software.
            a. Programs that help users manage transmission of data, instructions, and information
            b. Programs that help users establish connection to Internet, other network,
or another computer
            c. Programs that help users establish connection to Internet, other network,
or another computer
8. Describe various types of lines for communications over the telephone network:
  •  Public Switched Telephone Network (PSTN) - Worldwide telephone system that handles voice-oriented telephone calls
  • Dial-up line – is a temporary connection using telephone line for communications
ü  Costs no more than making regular call
ü  Computers at any two locations can establish a connection using modems and telephone network
  • Dedicated line - Always-on connection between two communications devices Five types are ISDN line, DSL, FTTH and FTTB, T-carrier line, and ATM
9. Describe commonly used communications devices.   
              A dial-up modem - converts digital signals to analog signals and vice versa and usually in the form of an adapter card

             ISDN and DSL modems - Communications devices that send and
receive digital ISDN and DSL signal.

             Cable modems - Sends and receives data over cable television network much faster than dial-up modem or ISDN sometimes called a broadband modem

             Wireless modems - Allows access to the Web wirelessly from a notebook computer, a PDA, a smart phone, or other mobile device Typically use the same waves used by cellular telephones
            Router - device that connects computers and transmits data to correct destination on network and internet using fastest available path some have a built-in hardware firewall.
           Hub or Switch - device that provides central point for cables in network

10. Ways to set up home networks:
          To set up a home network that is wired, you will need to have a network card in each computer, a router, and enough cables to connect them all. You will also need the documentation that came with your router. 
         Step 1 - Connect the cable from your internet modem to the port on the router labeled either uplink, or internet in most cases.
          Step 2 - Connect the first computer to anyone of the other ports.
         Step 3 - Log into your router refer to the information that came with your router. This is usually done by entering 192.168.0.1 or 192.168.1.1 into your address bar. Your documentation will tell you which one.
          Step 4 - Enter the username and password that is instructed by your router documentation.
         Step 5 - You should now be in the router setup. Enter all the information for internet, you will need the protocol, PPPoE in this case, the username and password from your internet service provider. Click on Save when done.

11. Physical and wireless transmission media.
           1. Twisted-pair cable - is used for telephone systems and network cabling.
           2. Coxial cable - is often used for cable television wiring.
           3. Fiber-optic cable - capable of carrying significantly more data at faster speeds than wire cables, it is less susceptible to intertference noise and therefore more secure it is also smaller, thinner and lighter in size
           4. Radio broadcast - distributes radio signals over long and short distances.
           5. Cellular radio - is a form of broadcast radio used for mobile communications
                    





Martes, Hulyo 19, 2011

QUIZ 5

1. Differentiate between storage devices and storage media.

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.

3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and Express Card modules.

4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.

5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers

ANSWERS: 

1. Storage device refers to the apparatus for recording computer data. Examples are the RAM, floppy drives, ZIP drives, and other disks drives.While, storage media are the materials on which data are written and stored. Examples are the floppy disks, optical discs, hard disks, etc.

2. Tape is a magnetically coated ribbon of plastic capable of storing large amount of data of information at a low cost. It is no longer used as a primary method of storage. Instead business users utilized tape most often for long term storage and backup. Magnetic Stripe cards is a credit card, entertainment card, bank card or other similar card with stripe that  contains information identifying you and the card. Information  stored in the stripe includes your name, account number and card expiration date. Smart cards which is similar in size to  a credit card or ATM card stores data on a thin microprocessor embedded in the card. Smart card contain a processor and have input process, output and storage capabilities. When you insert the smart card in a specialized card reader, the information on the smart card is read and if necessary updated. Microfilm and microfiche film store microscopic images on a roll or sheet film. Enterprise storage store huge volume of data and information for large business. Uses special hardware for heavy used, maximum availability and maximum efficiency.

3. Types of Flash memory storage:
     a.) flash memory chips are a type of solid state media contains electronic components and contains no moving parts.
     b.) Solid state drives have several advantages over magnetic hard disk
     c.) Memory card is a memorable flash memory device that you insert and remove from the slot in a computer, mobile device, or card reader/writer
    d.) USB flash drive plug into a USB port on a computer or mobile device
    e.) Express card module is a removable device that fits in an Express card slot

4. Types of Optical Disc:
     a.) CD's previously compact discs (abbreviated as CD) were used only for recording and storing audio files. Subsequently along with audio, video and other data is also stored on them. These discs can store data for long time. The data is stored on the CDs in optical format. Backup can be stored on the CDs.
     b.) Archive disc stores photos from an online photo center, resolution is usually 7200 pixels per photo, cost are determined by the number of photos being stored.
    c.) Picture CD single session CD-Rom that stores digital version of film, typically uses a 1024x1536 resolution
   d.) DVD's   The format of storing data in the digital versatile discs (DVD) is similar to that of a compact disc. The difference lies in the storage capacity. There is six times more storage space in the DVD’s as compared to the CD’s. Like the CD’s, DVD’s are also used as backup device.
  e.) Blu-ray are abbreviated as BD, are used for high definition video storage. It is often used by gamers. Blu-ray discs are similar to the CD’s and DVD’s in their looks. It is the memory space which makes all the difference between the CD’s, DVD’s and BD’s. Blu-ray disc is an optical storage device.

5. Characteristics of Printers:

    a.) Ink-printers  is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer and range from small inexpensive consumer models to very large professional machines.
    b.) Photo printers are printers specially created to print photos. Presently all of these are inkjet printers. They are of a smaller size and use special photo paper in the usual photo sizes like 4 X 6 etc. They allow printing without connecting through the PC by using PictBridge. They also have interfaces to connect digital camera or memory cards, and a screen to preview the photo. Some also allows rudimentary editing of the photo before printing.
    c.) Laser printers apidly produces high quality text and graphics. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor. This is the most often purchased printer today. Its high quality print output outfoxes prints from other printer types. The text and graphics are printed with quality result. The reason why there are lots of people who choose lasers despite is comparatively higher price is that it is economical. Its LED technology helps reduce the use of toner from a cartridge. It takes small particles in minimal amount to give out quality prints..
    d.) Multifunction peripherals is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting (the SOHO market segment), or to provide centralized document management/distribution/production in a large-office setting. A typical MFP may act as a combination of some or all of the following devices:
    e.) Thermal printers  work by selectively heating regions of special heat-sensitive paper. Monochrome thermal printers are used in cash registers, ATMs, gasoline dispensers and some older inexpensive fax machines. Colours can be achieved with special papers and different temperatures and heating rates for different colours; these coloured sheets are not required in black-and-white output. One example is the ZINK technology. This is very common among department stores and malls. Thermal printer are convenient to be used by cashiers because it allows the calculations and giving the print out at the same time in fast manner. Fax machines also have this kind of technology. This, however, works only on papers that are heat sensitive. It operates by having the heated pins pushed against the medium.
    f.) Mobile printers
    g.) Label and postage printers
    h.) Plotters and large format printers is a vector graphics printing device which operates by moving a pen over the surface of paper. Plotters have been used in applications such as computer-aided design, though they are rarely used now and are being replaced with wide-format conventional printers, which nowadays have sufficient resolution to render high-quality vector graphics using a rasterized print engine. It is commonplace to refer to such wide-format printers as "plotters", even though such usage is technically incorrect. There are two types of plotters, flat bed and drum.This type of printer is ideal for printing larger drawings. High quality print out is made out of having the pen plotters pen move across the surface of the medium. This is the most unique printer so far invented and available in the market.

Lunes, Hulyo 18, 2011

QUIZ 3

1. Describe the four categories of output.
2. The characteristics of LCD monitors, LCD screens, plasma monitors, and HDTVs.
3. What are the components inside the systems units.
4. The components of a processor and how they complete a machine cycle.
5. Define a bit and describe how a series of bits represents data.
6. Identify the categories of application software.
7. Identify the key features of widely used business programs.
8. What are the advantages of using application software on the Web.
9. History of the Internet.
10. What are diferent storage devices.


ANSWERS:

1. Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. Graphics are digital representations of non-text information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). Audio is music, speech, or any other sound. Video consists of images played back at speeds to provide the appearance of full motion.

2. Uses liquid crystal display, have a small footprint,  Mobile devices that contain, LCD displays includes Notebook computer, Tablet, PC, PDA, and Smart Phone. Plasma monitor displays image by applying voltage to layer of gas. Larger screen size and higher display quality than LCD, but are more expensive

3. The System Unit - Box-like case that contains computer’s electronic components, sometimes called the chassis the components are: Processor, Memory module, Expansion card, Sound card Modem card,Video card, Network interface card, Ports and Connectors Drive bays and Power supply.

4. The components of processor are the Control unit which direct and coordinates operations in computer and Arithmetic Logic unit which performs arithmetic, comparisons and logical operations. The four operations of the CPU that comprise a machine cycle: First, Fetch - obtain program instruction or data item from memory. Second, Decode - translate instruction into command. Third, Execute - carry out command and Fourth, Store - write result to memory.


5. A Bit is a short for Binary Digits. Most computers are digital, recognize only two discrete states: ON and OFF. Use Number system with two unique digits: 0 and 1. Eight bits grouped together as a unit. Provides enough different combinations of 0s and 1s to represent 256 individual characters. There are three popular coding system to represent data the ASCII, EBCDIC and Unicode and this how a letter converted to binary from and back. Step 1, The user presses the capital letter "D" on the keyboard. Step 2, an electronic signal for the capital letter "D" is sent to the system unit. Step 3, the signal for the capital letter "D" is converted to its ASCII binary code (01000100) and is stored in memory for processing. Step 4, after processing, the binary code for the capital letter "D" is converted to an image, and displayed on the output device.

6. Four categories of application software; Business software,assist people in becoming more effective and efficient while performing their daily business activities example word processors, accounting, note taking, spreadsheet, database, presentation graphics. Multimedia and Graphics applications, sophisticated software that allows users to work with graphics and multimedia includes computer-aided design (CAD), desktop publishing, paint/image editing, video and audio editing, animation, multimedia authoring and web page authoring. Communication applications this includes E-mail, Web browser, Newsgroup/Message board, Chat room, Instant messaging and Video Conferencing and telephone calls. Home, Personal and Educational application, software designed specifically for home, personal and education use, relatively inexpensive maybe scalded down versions of business software.


7. Word processor program that provides special capabilities beyond that of a text editor such as Wordpad, screen the user from structural or printer formatting mark-up, uses typing documents and letters, simple desktop publishing, etc example Microsoft word, Corel and Word perfect. Spreadsheet program that stimulates a physical spreadsheet by capturing, displaying, and manipulating data arranged in rows and columns. Ability to portray data relationships graphically and most are multidimensional-one spreadsheet can be linked to another; a change in one spreadsheet automatically affects the others. Allows users to perform calculations on data uses includes balancing accounts, inventory, grade record keeping, etc example Lotus 1-2-3 and Microsoft Excel. Presentation graphics, program used to create sequences o text and images that tell a story or help support a speech or public presentation of information. Can be divided into business presentation software and more general multimedia authoring tools, with some products having characteristics of both example o this are Microsoft powerpoint, Lotus and Freelance Graphics. Database Management is a collection of data organized in a manner that allows access, retrieval and use of the data. Database software allows users to create, access and manage a database, able to sort, delete, edit, insert and retrieve data stored in a database also able to create reports and forms.Users run queries to retrieve data it includes storing customer information, inventory examples are Microsoft Access, Oracle, MySQL, Corel Paradox. Note taking enables users to entry typed text, handwritten comments, drawings or sketches anywhere on a page, and then save the page as part of a notebook. Can also include audio recordings, notes can be then organized, shared, reused-allows searching for specific text. Desktop/laptop users enter via keyboard or microphone, Tablets PC users enters via digital pen incorporates many features in word processing-spell check; inserting audio and video clips; changing font colours, sizes and types examples are Microsoft Office OneNote 2003.

Biyernes, Hulyo 8, 2011

QUIZ 2

Quiz 2: July 08, 2011

1. Describe various types of pen input, and identify other types of input for smart phones.
2. The purpose of various game controllers: game pads, joysticks and wheels, light guns, dance pads,
and motion-sensing game controllers.
3. Explain how resolution affects the quality of a picture captured on a
digital camera.
4. Describe the uses of voice recognition, Web cams, and video conferencing.
5. Discuss how various scanners and reading devices work: optical scanners,
optical readers, bar code readers, RFID readers, magnetic stripe card
readers, MICR readers, and data collection devices.
6. Summarize the various biometric devices: fingerprint reader, face
recognition system, hand geometry system, voice verification system,
signature verification system, and iris recognition system

ANSWERS:

1.
2.Game controller is a device used with games or entertainment systems used to control a payable character or object, or otherwise provide input in a computer game. Game pad is a pointing device that controls the movement and actions of players or objects in games. Joystick is a vertical lever mounted on a base. Wheel is a steering-wheel-type input device.  Light gun is a peripheral used to "shoot" targets on a screen, they usually roughly resemble firearms or ray guns.Their use is normally limited to rail shooters, or shooting gallery games like those that came with the Shooting Gallery light gun. A rare example is Taito's 1992 arcade game Gun Buster, a first-person shooter that used a joystick to move and a light gun to aim. Dance pads, Motion-sensing game controllers

Ø3. Sharpness and clarity of image The higher the resolution, the better the image quality, but the more expensive the camera. . Pixel (picture element) is single point in electronic image. Greater the number of
pixels, the better the image quality.
4.

Friendship thoughts..............



 "Even though we've changed and we're all finding our own place in the world, 
we all know that when the tears fall or the smile spreads our face, 
we'll come to each other because no matter where this crazy world takes us, 
nothing will ever change so much to the point where we're not all still friends.".......
by: Brandy Snyder