Lunes, Agosto 8, 2011

Quiz 9

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist. 
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker, with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

A computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
A worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate program.
A root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
To take precautions against this malware,
1.Do not start a computer with removable media in the drives or ports.
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source.
4. Install an antivirus program and a personal firewall.
5. Stay informed about any new virus alert or virus hoax.
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.


3. Discuss techniques to prevent unauthorized computer access and use

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.

4. Identify safeguards against hardware theft and vandalism

Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.


5. Explain the ways software manufacturers protect against software piracy.

Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explains why it is necessary

Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.


7. Discuss the types of devices available that protect computers from
system failure

A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.


8. Explain the options available for backing up computer resources.

A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.

9. Identify risks and safeguards associated with wireless communications. 

Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.


10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 



Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
 


Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. 
An electronic profile combines data about an individual's Web use with data from public sources, which then is sold. 
A cookie is a file that a Web server stores on a computer to collect data about the user. 
Spyware is a program placed on a computer that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window. 
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. 
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web.

Lunes, Agosto 1, 2011

Quiz 8

1. Define the term, database, and explain how a database interacts with data
and information.

A database is an organized collection of data for one or more purposes, usually in digital form.
Data is collection of unprocessed items text, numbers, images,video and audio.
Information is a processed data,organized, meaningful and useful.

2. Describe file maintenance techniques (adding records, modifying records,deleting records) and validation techniques.

- File Maintenance  refers to the procedures that keep data current.
- Adding Records users add new records to a file when they obtain new data Disc
- Modifying Records users modify a record to correct inaccurate data or update old data
- Deleting Records When a record no longer is needed, a user deletes it from a file
- Validation Techniques compares data with a set of rules or values to find out if the data is correct  




  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
  • Other checks



3. Discuss the terms character, field, record, and file



ØField is a combination of one or more characters. It . It is the smallest unit of data user accesses
 Record is a group of related fields.
File is a collection of related records
§


4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

Data dictionary contains data about each file in a database and each field within the files.
Backup - is the copy of the database.A log is a listing of activities that change the contents of the database. 
Recovery Utility - uses the logs and/or backups to restore the database.
5. Differentiate between a file processing approach and the database
approach.
File processing approach each department or area within organization has its own set of files.

Database approach- many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.


6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
    An object-oriented database (OODB) stores data in objects
•Object-oriented databases often use Object Query Language (OQL) to manipulate and retrieve data.

    A relational database stores data in tables that consist of rows and columns
        –Each rowhas a primary key
        –Each columnhas a unique name
        •A relationshipis a link

    A multidimensional database can store data in more than two dimensions of data
        –Can consolidate data much faster than a relational database


7. Explain how to access Web databases.
Web database  database you can access through web by filing in a form in a web page.

A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.
 
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.




Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities.

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.
Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism



9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use



Operating system and software patches and updates
There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.
Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.
  • How to update a Microsoft Windows computer.
Passwords
Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.
  1. Change passwords often. It is recommended at least once every few months.
  2. Create a BIOS password.
  3. When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23!.
  4. Do not use sticky notes around your computer to write down passwords. Instead use a password manager.
  • Complete information and links to information about computer passwords.
Get a hardware or software firewall
We highly recommend all computer users have a firewall solution. There are two ways a firewall can protect your computer and network.
  1. Hardware firewall - A hardware firewall is a hardware device that is connected to your network. Often many home users who have a home network use their network router as a firewall solution.
  2. Software firewall - A software firewall is a software program that you install on your computer that helps protect that computer from unauthorized incoming and outgoing data. Below is a listing of a few of the more widely used software firewall programs.
Agnitum Outpost Firewall
BlackICE PC Protection
Kerio Personal Firewall
Sygate Firewall
Tiny software Tiny Personal Firewall
Network Associates
Zone Labs Zone Alarm

Note: A software firewall is only going to protect the computer that has the firewall installed on it.
In addition to the above listed firewall software programs many of the antivirus scanners released today also include their own version of a firewall program. If you have an antivirus scanner that also has a firewall program you do not need to worry about getting one of the above programs or another third-party firewall program.
  • How to enable or disable the Microsoft Windows firewall.
Trojans, viruses, spyware, and other malware
Software Trojans, viruses, spyware, and other malware can not only damage or destroy your computer data Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information. but is also capable of monitoring your computer to learn more about your viewing habits on the
To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.
  • What are the current available antivirus programs?
  • My web browser has been hijacked.
Know how to handle e-mails
Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.
  • Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.
  • Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See the phishing definition for additional information about this term as well as examples of these e-mails.
Alternative browser
Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.
Run system scans to check for vulnerabilities
There are several sites on the Internet that allow users to check their computers for potential threats or issues their network or computer may have that can allow users unauthorized access to their computer. Below are a listing of recommend sites to try:


Gibson Research Corporation - The Gibson Research Corporation, or GRC, is a great location to learn about network security as well as well as test your computer or network for vulnerabilities.

Hacker Wacker - Another great site with computer security related information, help, and programs to help test your computer and network.

Huwebes, Hulyo 21, 2011

Quiz 7 Communications and Networks

  1. Discuss the components required for successful communications.

Computer communications describes a process in which one computer transfers data, instructions and information to another computer or computers. Successful communications require a sending device that initiates an instruction to transmit data, instructions or information, a communications device that converts or formats the data, instructions or information from the sending device into signals carried by a communications channel, and a communications channel or path on which the signals travel. Also required are a communications device that receives signals from the communications channel and converts or formats them so the receiving device can understand the signals, and a receiving device that accepts the data, instructions or information.

2. Identify various sending and receiving devices.
A sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
Microcomputers, minicomputers, and mainframes all can serve as sending and receiving devices.
Besides, Internet appliances and Web enabled handheld computers and devices (e.g. cellular telephones and pagers) can also serve sending and receiving devices.

3. Describe uses of computer communications.

Today most computers are capable (through either a phone line or a cable connection) of exchanging information over the Internet. Your child can send a message from his or her computer to the computer of a neighbor or a friend on the other side of the planet. Students might use computers to communicate with their classmates about homework assignments, group projects, or other school-related activities. They may also use them to submit homework assignments and presentations to their teachers.

4. List advantages of using a network.

A network is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with each other. Resources may include data, information, hardware and software.
By using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephony, videophone calls and videoconferencing. In a networked environment, each computer on the network can access and use hardware on the network, such as printers or scanners. Authorised computers on a network can also access data and information stored on other computers in the network. Users connected to a network can access software (programs) on the network.

5. Differentiate among client/server, peer-to-peer, and P2P networks.

Network architecture is the logical design of the components of a network, including the number and type of servers, workstations and network resources. It includes the communications devices and the type of physical transmission media used to connect components.
A peer-to-peer LAN is a simple, inexpensive network that typically connects less than 10 computers together. Each computer on a peer-to-peer network can share hardware (such as a printer), data or information located on any other computer in the network. Each computer stores files on its own storage devices, and contains both the network operating system and application software. Peer-to-peer networks are ideal for very small businesses and home users. Another use of peer-to-peer, called P2P, describes an Internet network that enables users with the same networking software to connect to each other's hard disks and exchange files directly.
A client/server LAN is a network in which one or more computers acts as a server and the other computers on the network can request services from the server. A server, sometimes called the host computer, controls access to the hardware and software on the network and provides a centralised storage area for programs, data and information. The other computers on the network, called clients, rely on the server for these resources. The major difference between the server computer and the client computer is that the server has more storage space and power. Dedicated servers perform a specific task - a file server stores and manages files, a print server manages printers and print jobs, a database server stores and provides access to a database and a network server manages network traffic. A client/server network provides an efficient means to connect 10 or more computers together, but can be used to connect a smaller number of computers. A network administrator is the operations person in charge of the network.

6. Describe the various network communications standards.

Network standards defines:
  •  Way devices access the medium
  •  Speed on different types of networks
  •  Types of network technology (cable / wireless)
Protocols
  •  Rules on how devices communicate with each other
  •  Data format used
  •  Coding Scheme
  •  Error Handling
  •  Sequencing techniques etc.
  •  Hardware / Software Vendors try to meet these guidelines
ANSI, IEEE
Standardizing Organization


7. Explain the purpose of communications software.
The purpose of communication software is used to provide remote access to systems and is also    used to exchange messages in text, audio and video format for the purpose of communication. This software sends and receives data over telephone lines through modems. The communication software allows computers in different geographical regions to communicate with each other through terminal emulators, file transfer programs, chat and instant messaging programs.

8. Describe various types of lines for communications over the telephone network.

A telephone network is a telecommunications network used for telephone calls between two or more parties.
There are a number of different types of telephone network:


9. Describe commonly used communications devices.
Dial-up modem
  • A dial-up modem converts digital signals to analog signals and vice versa
  • Usually in the form of an adapter card
DSL Modem / ISDN Modem-Cable Modem
  • Send and receive digital data from DSL(Digital Subscriber Line) / ISDN
Cable Modem
  •  Sends and receives data over cable television (CATV) network
  •  Much faster than dial-up modem or ISDN
  •  Sometimes called a broadband modem
Wireless Modem 
  • Allows access to the Web wirelessly from a notebook computer, a smart phone, or other mobile device. 
Hub or Switch 
  • Device that provides central point for cables in network. 
Router
  • Connects computers and transmits data to correct destination on network. 



10. Discuss different ways to set up a home network.

Setting up a home network

Before you start: To decide what type of network to set up or to find out what hardware and cables you need, see What you need to set up a home network. That topic has information about the different types of networks (also known as network technologies), as well as hardware requirements for each type.
Once you know what type of network you want and have the necessary hardware, there are four possible steps to take (two of these are not always required):
1.       Install any necessary hardware.
2.       Set up an Internet connection (optional).
3.       Connect the computers.
4.       Run the Set Up a Wireless Router or Access Point wizard (wireless only).
Each of these steps is described in detail later in this article.
Start by setting up one computer. Once you set up the network and you are sure that the first computer is working correctly, you can add additional computers or devices.

Install the hardware

Install network adapters in any computers that need them. (Follow the installation instructions in the information that came with each adapter.)

Set up or verify an Internet connection (optional)

You don't need an Internet connection to set up a network, although most people want to use their network to share an Internet connection. To set up an Internet connection, you need a cable or DSL modem and an account with an Internet service provider (ISP). Then open the Connect to the Internet wizard and follow the instructions.
If you already have an Internet connection, you just need to verify that the connection is working. To do that, open your web browser and go to a website that you don't usually visit. (If you go to a website that you visit often, some of its webpages might be stored on your computer and will display correctly even if your connection is faulty.) If the website opens and you don't get any error messages, your connection is working.

Connect the computers

There are several ways to connect computers—the configuration depends on the type of network adapters, modem, and Internet connection that you have. It also depends on whether or not you want to share an Internet connection among all the computers on the network. The following sections briefly describe some connection methods.
Turn on all computers or devices, such as printers, that you want to be part of your network. If your network is wired Ethernet or HPNA, it should be set up and ready to use. You should test your network (see below) to make sure that all computers and devices are connected correctly.

Run the Set Up a Wireless Router or Access Point wizard

If your network is wireless, run the Set up a Wireless Router or Access Point wizard on the computer attached to the router.
·         Open Set Up a Wireless Router or Access Point by clicking the Start button, clicking Control Panel, clicking Network and Internet, and then clicking Network and Sharing Center. In the left pane, click Set up a connection or network, and then click Set up a wireless router or access point.
The wizard will walk you through the process of adding other computers and devices to the network. For more information, see Add a device or computer to a network.

Test your network

It's a good idea to test your network to make sure that all of the computers and devices are connected and working properly. To test your network, do the following on each network computer: Click the Start button, and then click Network. You should be able to see icons for the computer you are on and all of the other computers and devices that you have added to the network. If the computer you are checking has a printer attached, the printer icon might not be visible on other computers until you enable printer sharing. (Printer sharing is not available on Windows Vista Starter.)

Changing TCP/IP settings

If you need to adjust TCP/IP settings for your network, see Change TCP/IP settings.

Connecting your mobile PC from work to your home network

To connect the mobile PC that you use at work to the Internet or to your work network from your home network, you must have a network connection set up at home. For information about using your mobile PC on your home network, see Switching between your home and workplace networks.

11. Identify various physical and wireless transmission media.

Miyerkules, Hulyo 20, 2011

Quiz 6 - Operating Systems and Utility Programs

1.Define system software and identify the two types of system software.


System software

  Two Types of Software System

 An operating system (OS) is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources.

A utility program is a type of system software that allows a user to perform maintenance-type tasks


 2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.

UNIX
Linux
is an open-source, popular, multitasking UNIX-type operating system
 3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.

4.Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and
restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.

A
file manager is a utility that performs functions related to file management


–Copying, renaming, deleting, moving, and sorting files and
folders
A search utility is a program that attempts to locate a file on your computer based on criteria you specify
•A disk cleanup utility searches for and removes unnecessary files –Downloaded program files –Temporary Internet files –Deleted files –Unused program files
An uninstaller removes a program, as well as any associated entries in the system files An image viewer allows users to display, copy, and print the contents of a graphics file Creating shortcuts Organizing files in folders Displaying a list of files is a multitasking operating system developed in the early 1970s consists of the programs that control or maintain the operations of the computer and its devices

Martes, Hulyo 19, 2011

quiz 5

1. Differentiate between storage devices and storage media.
 answer:
Storage device refers to the apparatus for recording computer data. Examples are the RAM, floppy drives, ZIP drives, and other disks drives. While, storage media are the materials on which data are written and stored. Examples are the floppy disks, optical discs, hard disks, etc.

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.

Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. A tape drive reads and writes data and information on tape. Business users utilize tape most often for long-term storage and backup. A magnetic stripe card is a credit card, entertainment card, bank card, or other similar card with a stripe that contains information identifying you and the card. A magnetic stripe card reader reads the information stored on the stripe. A smart card, which is similar in size to a credit or ATM card, stores data on a thin microprocessor embedded in the card. A smart card reader reads the information on the smart card and updates it if necessary. Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4 X 6 inches. Microfilm and microfiche reduce the amount of paper firms must handle, are inexpensive, and have the longest life of any storage media. Enterprises use computers, servers, and networks to manage and store huge volumes of data and information. In an enterprise, some storage systems can provide more than 185 TB of storage, and optical disc servers hold hundreds of optical discs.

3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.


Flash memory chips are a type of solid state media, which means they consist entirely of electronic components and contain no moving parts. A solid state drive (SSD) typically uses flash memory to store data, instructions, and information. A memory card is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or card reader/writer. Common memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, microSDHC, xD Picture Card, Memory Stick, and Memory Stick Micro (M2). A USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs in a port on a computer or mobile device. An ExpressCard module is a removable device that fits in an ExpressCard slot. Express Card modules can add memory, storage, communications, or other capabilities to a computer.

4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.


A CD-ROM, or compact disc read-only memory, is a type of optical disc that uses laser technology to store items. Users can read the contents of standard CD-ROMs but cannot erase or modify their contents. A CD-R (compact disc-recordable) is a multisession disc on which users can record their own items, such as text, graphics, and audio. Each part of a CD-R can be written on only one time, and the disc's contents cannot be erased. A CD-RW (compact disc-rewritable) is an erasable disc that can be written on multiple times. An archive disc stores photos from an online photo center in the jpg file format. A Picture CD is a single-session CD-ROM that stores digital versions of film using the jpg format at a lower resolution than an archive disc. A DVD-ROM (digital versatile disc-read-only memory or digital video disc-read-only memory) is a high capacity optical disc that you can read but not write on or erase. A newer, more expensive DVD format is Blu-ray Disc-ROM (BD-ROM), with higher capacity and better quality than standard DVDs. Many types of recordable and rewritable DVD formats are available. DVD-R and DVD+R are DVD-recordable formats. BD-R is a high-capacity DVD-recordable format. DVD-RW, DVD+RW, and DVD+RAM are rewritable DVD formats that allow users to erase and record multiple times. BD-RE is a high-capacity rewritable DVD format.

5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers


An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer.

Laser printers operate by shining a laser beam to produce an image on a drum. The drum is then rolled through a pool, or reservoir, or toner, and the electrically charged portions of the drum pick up ink. Finally, using a combination of heat and pressure, the ink on the drum is transferred onto the page. Laser printers print  very fast, and the supply cartridges work a long time. Color laser printers use the same toner-based printing process as black and white ( B/W) laser printers, except that they combine four different toner colors.  Color laser printers can also be used as a regular black and white laser printer. 

Multifunction printers: combine top-quality color ink-jet or laser printing with plain-paper and PC faxing, color copying and color scanning , telephoning- all in one convenient, space-saving machine. If you work from home or have a small office a multifunctional device may be ideal. 
Label Printers are  the smartest way to print labels one at a time.  The printers allow easy installation.  You can  get high-quality, professional results every time. There are multi-purpose  printers , that can print different types of labels. For example, label printers used in supermarkets can print bar codes as well as normal text. There are also some label printers that can print different sizes of labels on goods.
Plotters  (Designjet) are large-scale printers that are very accurate at reproducing line drawings. They are commonly used for technical drawings such as engineering drawings or architectural blueprints. The two basic types of plotters are called flatbed plotters and drum plotters. Flatbed plotters are horizontally aligned with a flat surface to which a piece of paper is attached. The paper remains stationary and the printer moves pens across the paper to draw the image. Drum plotters, also called upright plotters, are vertically positioned. They have a drum that the paper rolls on. Drum plotters usually make more noise and are more compact than flatbed plotters. 
Portable printers are usually fairly lightweight and sometimes carry the option of using a battery instead of drawing power from the computer. Usually they realize basic print resolutions suitable for plain text printing. You can find on the market the following types of the portable printers:  Thermal printer, Thermal transfer printer and Ink-Jet printer. The main advantage of thermal and thermal transfer printers is that they can be very small. The smallest thermal and  thermal transfer printers  weigh  approximately one pound. Usually the  ink-jet portable printer weighs more than 2 pounds. Thermal printers require a special type of paper.

.

Biyernes, Hulyo 15, 2011

quiz 3

quiz 3

1. Describe the four categories of output.
 
Text consists of characters (letters, numbers, punctuation marks, or any other symbol requiring one byte of computer storage space) that are used to create words, sentences, and paragraphs. Graphics are digital representations of non text information such as drawings, charts, photographs, and animation (a series of still images in rapid sequence that gives the illusion of motion). Audio is music, speech, or any other sound. Video consists of images played back at speeds to provide the appearance of full motion
  1. The characteristics of LCD monitor LCD screens, plasma monitors, and HDTVs.
A liquid crystal display (LCD) is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals (LCs). LCs do not emit light directly.
They are used in a wide range of applications, including computer monitors, television, instrument panels, aircraft cockpit displays, signage, etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have displaced cathode ray tube (CRT) displays in most applications. They are usually more compact, lightweight, portable, less expensive, more reliable, and easier on the eyes.[citation needed] They are available in a wider range of screen sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image burn-in.
Plasma displays are bright (1,000 lux or higher for the module), have a wide color gamut, and can be produced in fairly large sizes—up to 150 inches (3.8 m) diagonally. They have a very low-luminance "dark-room" black level compared to the lighter grey of the unilluminated parts of an LCD screen (i.e. the blacks are blacker on plasmas and greyer on LCDs). LED-backlit LCD televisions have been developed to reduce this distinction. The display panel itself is about 6 cm (2.5 inches) thick, generally allowing the device's total thickness (including electronics) to be less than 10 cm (4 inches). Plasma displays use as much power per square meter as a CRT or an AMLCD television. Power consumption varies greatly with picture content, with bright scenes drawing significantly more power than darker ones – this is also true of CRTs. Typical power consumption is 400 watts for a 50-inch (127 cm) screen. 200 to 310 watts for a 50-inch (127 cm) display when set to cinema mode. Most screens are set to 'shop' mode by default, which draws at least twice the power (around 500–700 watts) of a 'home' setting of less extreme brightness. Panasonic has greatly reduced power consumption ("1/3 of 2007 models"). Panasonic states that PDPs will consume only half the power of their previous series of plasma sets to achieve the same overall brightness for a given display size. The lifetime of the latest generation of plasma displays is estimated at 100,000 hours of actual display time, or 27 years at 10 hours per day. This is the estimated time over which maximum picture brightness degrades to half the original value.
Plasma display screens are made from glass, which reflects more light than the material used to make an LCD screen. This causes glare from reflected objects in the viewing area. Companies such as Panasonic coat their newer plasma screens with an anti-glare filter material. Currently, plasma panels cannot be economically manufactured in screen sizes smaller than 32 inches. Although a few companies have been able to make plasma EDTVs this small, even fewer have made 32in plasma HDTVs. With the trend toward larger and larger displays, the 32in screen size is rapidly disappearing. Though considered bulky and thick compared to their LCD counterparts, some sets such as Panasonic's Z1 and Samsung's B860 series are as slim as one inch thick making them comparable to LCDs in this respect.
High-definition television (or HDTV) is video that has resolution substantially higher than that of traditional television systems (standard-definition TV, or SDTV, or SD). HDTV has one or two million pixels per frame, roughly five times that of SD. Early HDTV broadcasting used analog techniques, but today HDTV is digitally broadcast using video compression.

  1. What are the components inside the systems units?

The system unit, sometimes called the chassis, is a box-like case housing the electronic components of a computer that are used to process data. System unit components include the processor, memory module, cards, ports, and connectors. Many of the system unit’s components reside on a circuit board called the motherboard. The motherboard contains many different types of chips, or small pieces of semi conducting material, on which one or more integrated circuits (IC) are etched. An integrated circuit is a microscopic pathway capable of carrying electronic current. Each IC can contain millions of transistors, which act as switches for electronic signals.

  1. The components of a processor and how they complete a machine cycle.

·         Control unit is responsible for supervising the operation of the entire computer system.

·         Arithmetic/logic unit (ALU) provides the computer with logical and computational capabilities.

·         Register is a storage location inside the processor.

  1. Define a bit and describe how a series of bits represents data.

A bit (a contraction of binary digit) is the basic unit of information in computing and telecommunications; it is the amount of information stored by a digital device or other physical system that exists in one of two possible distinct states.
When the user presses any letter using the keyboard the electronic signal from that letter is sent to the system unit. Then the system unit converts it to its binary code and stored in memory for processing. After processing the binary code for that particular letter is converted to an image and displayed on the output device (monitor).

  1. Identify the categories of application software.

Word Processing Software allows users to create, edit a document. Example: MS Word, Word Pad etc.
Spreadsheet Software allows users to create document and perform calculation. Example: Excel, Lotus1-2-3 etc.
Database Software allows users to store and retrieve vast amount of data. Example: MS Access, MySQL, Oracle etc.
Presentation Graphic Software allows users to create visual presentation. Example: MS Power Point
Multimedia Software allows users to create image, audio, video etc. Example: Real Player, Media Player etc.

  1. Identify the key features of widely used business programs.

People use productivity software to become more effective and efficient while performing daily activities. Word processing software allows users to create and manipulate documents that contain text and graphics. With word processing software, you can insert clip art into a document; change margins; find and replace text; use a spelling checker to check spelling; place a header and footer at the top and the bottom of a page; and vary font (character design), font size (character scale), and font style (character appearance).
With spreadsheet software, data is organized in rows and columns, which collectively are called a worksheet. The intersection of a row and column, called a cell, can contain a label (text), a value (number), or a formula or function that performs calculations on the data and displays the result.
Database software allows you to create and manage a database. A database is a collection of data organized to allow access, retrieval, and use of that data. A query is used to retrieve data according to specified criteria, which are restrictions the data must meet.
Presentation graphics software is used to create presentations that communicate ideas, messages, and other information to a group through a slide show. You can use a clip gallery to enhance your presentation with clip art images, pictures, video clips, and audio clips.
A personal information manager (PIM) is software that includes an appointment calendar to schedule activities, an address book to maintain names and addresses, and a notepad to record ideas, reminders, and important information. A software suite is a collection of individual applications sold as a single package.
Project management software allows you to plan, schedule, track, and analyze the progress of a project. Accounting software helps companies record and report their financial transactions.
Power users often use software that allows them to work with graphics and multimedia. Computer-aided design (CAD) software assists in creating engineering, architectural, and scientific designs. Desktop publishing (DTP) software is used to design and produce sophisticated documents. DTP is developed specifically to support page layout, which is the process of arranging text and graphics in a document. Paint software is used to draw graphical images with various on-screen tools. Image editing software provides the capability to modify existing images. Video editing software and audio editing software can be used to modify video and audio segments.
Multimedia authoring software is used to create electronic interactive presentations that can include text, images, video, audio, and animation. Web page authoring software is designed to create Web pages and to organize, manage, and maintain Web sites.
Many software applications are designed specifically for use at home or for personal or educational use. Integrated software combines several productivity software applications that share a similar interface and common features into a single package. Personal finance software is an accounting program that helps pay bills, balance a checkbook, track income and expenses, follow investments, and evaluate financial plans. Legal software assists in the creation of legal documents and provides legal advice. Tax preparation software guides users through the process of filing federal taxes. Personal DTP software helps develop conventional documents by asking questions, presenting predefined layouts, and supplying standard text.
Photo-editing software is used to edit digital photographs. A clip art/image gallery is a collection of clip art and photographs that can be used in all types of documents. Home design/landscaping software assists with planning or remodeling. Educational software teaches a particular skill and exists for about any subject. Reference software provides valuable and thorough information for all individuals. Entertainment software includes interactive games, videos, and other programs designed to support a hobby or provide amusement.
One of the main reasons people use computers is to communicate and share information. E-mail software is used to create, send, receive, forward, store, print, and delete e-mail (electronic mail). A Web browser is a software application used to access and view Web pages. A chat client is software that allows you to connect to a chat room, which permits users to chat via the computer. A newsreader is a software program used to participate in a newsgroup, which is an online area on the Web where users conduct written discussion about a particular subject. An instant messenger is a software program installed to use instant messaging (IM), a real-time communications service that notifies you when one or more people are online and then allows you to exchange messages or files. Groupware is a software application that helps groups of people on a network work together and share information. A videoconference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data.
  1. What are the advantages of using application software on the Web?

Advantages of Web Applications
·         No special configurations of changes are need on user’s PCs.
·         Lower costs
·         Centralized data is secure and easy to backup.
·         Updates can be made quickly and easily.
·         Information is accessible to a wide audience anywhere in the world.
·         Available 24 hours a day, 7 days a week.
·         Everybody has a browser – familiar interface encourages use.
·         Online training can be completed at user’s own time and pace.
·         Always up-to-date.

  1. History of the Internet.

The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks.
In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation (NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNET provided access to supercomputer sites in the United States from research and education organizations. The ARPANET was decommissioned in 1990. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s and the Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic.
Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near instant communication by electronic mail, instant messaging, Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and the World Wide Web with its discussion forums, blogs, social networking, and online shopping sites. The research and education community continues to use advanced networks such as NSF's very high speed Backbone Network Service (vBNS) and Internet2. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.

  1. What are different storage devices?

1.       Hard Drive (Internal)

Internal Hard Drive
You computer's hard drive is the first most important type of storage. Anything that you download, applications that you install, your pictures, videos and music are all stored directly to your hard drive. Basically, anything that is on your computer is stored to your internal hard drive. Internal hard drive capacity is measured in gigabytes. For example, you may have a 500GB SATA hard drive on your computer. Also, internal computer hard drives have different speeds such as 5400RPM and 7200RPM. This reading is the speed that the hard drive disk spins. A faster hard drive will have higher RPM. The faster the hard drive spins, the faster your hard drive can read data, as well as write data.

2.       External Hard Drives

External Hard Drive
External hard drives are exactly the same as internal drives, with one exception. Rather then being enclosed inside your computer, external hard drives have their own separate casing and sit externally to your computer. External hard drives can connect to your computer in a variety of ways. Some common connection types are: USB 2.0, ESATA, Firewire 400 and Firewire 800. External hard drives measure capacity in gigabytes and have different speeds as well. For the most part, external hard drives are used for backup and storing files that a computer user may want to transport.

3.       Network Attached Storage

NAS Server
Another common form of computer storage is network attached storage or NAS. Network attached storage is a method commonly used by businesses to share files between computers. A NAS is simply a storage device connected to a computer network. This is beneficial because many computers can read and write to a NAS. Network attached storage capacity is measured in gigabytes. Also, NASs are available with different hard drive speeds.
Many at home computer users often create their own NAS devices by connecting an external hard drive to their router. This allows them to access it wirelessly, as well as share it with other computers.

4.       Optical Media Storage

Optical Drive
Optical media storage is basically writing data to a CD or DVD. When your burn a CD, you are storing songs and music on the CD so that you can listen to it later. If you are burning a DVD, you are storing a video on it so that you can watch it later. CD-RW and DVD-RW media has the capability to be recorded on and erased later if necessary. This makes optical media storage ideal for transporting relatively small amounts of data.

5.       Flash Drives

Flash Drive
Flash drives, or thumb drives, are one of the newest forms of computer storage. These drives connect to any computer by way of USB. Often times, students as well as business professionals, use flash drives as a simple way to transport text documents to and from work, and to and from school. When flash drives were first released, storage capacity was rather limited. However, companies are now manufacturing flash drives with huge storage capacities, up to 64GB.