BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Monday, May 3, 2010

Artificial Intelligence 5/3/10


Artificial Intelligence (AI) relies on intelligence agents.

It should be able to set goals and achieve them by itself, not be programmed to do it.

Some countries are generally nonreligious, therefore they are not concerened about ethical issues reguaring AI and robotics.

They want machines to be able to learn the more you use it. Ex. Youtube's "recommended for you " videos

luguage processing

Motion and manipulation

perception: Sense and percieve

Social Intelligence(for making friends :) )

Creativity


General Intelligence

Friday, April 30, 2010

1. One would argue he did what he was trained to do through  a murder simulator. 

Or it is only a game and it will not effect him negatively but  teach him hand-eye coordination. This game may not have triggered him stealing car but another force within him.
2.This case is not likely to happen again. This game has been out for years and no one playing the game has reacted so extreme due to this game.

"The video game industry gave him a cranial menu that popped up in the blink of an eye, in that police station," says Thompson. "And that menu offered him the split-second decision to kill the officers, shoot them in the head, flee in a police car, just as the game itself trained them to do."
3. Before having violent video games sold to minors, one should make  sure the minor is emotionally and psycological stable and should maybe have parental consent before purchasing the game.
4.Video game designers do play a role in violent crime, because with video games such as GTA a player is trained to kill a person without consequences like it would be the same in reality.
"the teenage brain is different from the adult brain. The impulse control center of the brain, the part of the brain that enables us to think ahead, consider consequences, manage urges -- that's the part of the brain right behind our forehead called the prefrontal cortex"

Wednesday, April 28, 2010

Social impact of reliance on simulations to examine issues of public policy

Social impact of reliance on simulations to examine issues of public policy

It is relatively difficult to study the effects from public policy on people are using technology. Most, if not all computer simulations are not able to capture the affect of public policy on society, through human nature, or their likes or dislikes. A computer simulation designer must be sure their computer simulation accurately captures human behavior. Human behavior is subjective and there is no universal standard for how human behavior should be simulated in technology.
For example, Today, with interest rates decreasing, banks are able to invest more, which leads to more investments, which results in a flourishing economy. This is not 100% accurate at simulating economical undulations based on human behavior and their buying and selling, but through statistics and the mathematical aspect, computer simulations, simulating the economy are relatively accurate.
Also one can argue, there is a difference of opinion on using government money to send oversees to poverty-stricken countries. Although it may be helping one country it may be “negatively” impacting another. This issue is subjective and no accurate computer simulation can be accurately created from this fact.
Although simulations can help study the effects of public policy to make it easier for policymakers to understand the positive or negative effects of their policies, due to subjectivity, it is difficult to full paint and accurate picture through a simulation. Some computer simulations also may be based off of incorrect information, resulting in harmful laws created by policy makers.
The following is from the Public News Health Center.
“Many scientists and public health experts believe that a global pandemic caused by a deadly and highly contagious flu virus is likely one day, if not inevitable. However, computer simulations of an influenza outbreak in Southeast Asia show that a global pandemic might be averted with a prompt public health response, such as targeted geographic use of prophylactic anti-viral drugs and policies to reduce social contact, such as quarantines or temporarily closing schools and businesses. The analysis is published in the August 3, 2005, edition of Nature.

Thursday, April 22, 2010

50 Key Terms

software         Instructions that tell the hardware what to do to transform input into output.

shareware         Software that is free for the trying, with a send-payment if-you-keep-it honor system.

public domain         Creative work or intellectual property that is freely usable by anyone, either because the copyright has expired or because the creator obtained a Creative Commons license for the work.

Freeware: computer software that is available for use at no cost or for an optional fee.

e-commerce software         Programs on a Web server that provide the commercial services to consumers and business partners on the Web site.

Integrated software is software for personal computers that combines the most commonly used functions of many productivity software programs into one application.

A user guide or user's guide, also commonly known as a manual, is a technical communication document intended to give assistance to people using a particular system.

A serial number is a unique number assigned for identification which varies

warranty In commercial and consumer transactions, a warranty is a collateral assurance or guarantee that certain facets of an article or service sold is as factually stated or legally implied by the seller

copyright         A type of law that traditionally protects forms of literary expression.

site license         License for multiple copies or removing restrictions on software copying and use at a network site.

compression         Making files smaller using special encoding schemes. File compression saves storage space on disks and saves transmission time when files are transferred through networks.

file decompression         The process of restoring a compressed file back to its original state.

backup         The process of saving data—especially for data recovery. Many systems automatically back up data and software onto disks or tapes.

A backdoor is a method of bypassing normal authentication, securing remote access to a computer

upload         To post software or documents to an online source so they’re available for others.

download         To copy software from an online source to a local computer. wizard         A software help agent that walks the user through a Online complex processing (OLCP) is a class of realtime data processing involving complex queries, lengthy queries and/or simultaneous reads and writes to the same records.

templates         In desktop publishing, professionally designed empty documents that can be adapted to specific user needs. In spreadsheet software, worksheets that contain labels and formulas but no data values. The template produces instant answers when you fill in the blanks.

graphical user interface (GUI)         A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

command-line interface         User interface that requires the user to type text commands on a command-line to communicate with the operating system.

speech recognition         The identification of spoken words and sentences by a computer, making it possible for voice input to be converted into text files.

cell         The intersection of a row and a column on the grid of a spreadsheet.

numeric field         A field containing only numbers.

value         The numbers that are the raw material used by spreadsheet software to perform calculations.

function         A predefined set of calculations, such as SUM and AVERAGE, in spreadsheet software.

automatic recalculation         A spreadsheet capability that allows for easy correction of errors and makes it easy to try out different values while searching for solutions.

date field         A field containing only dates.

table         A grid of rows and columns; on many Web pages tables with hidden grids are used to align graphical images.

columns         Along with rows, comprise the grid of a spreadsheet.

label         In a spreadsheet, a text entry that provides information on what macro         Custom-designed embedded procedure program that automates tasks in application programs.

worksheet         A spreadsheet document that appears on the screen as a grid of numbered rows and columns.

“what if?” questions         A feature of spreadsheet software that allows speculation by providing instant answers to hypothetical questions.

0.automatic formatting         A word-processing feature that applies formatting to the text.

0.spelling checker (batch or interactive)         A built-in component of a word processor or a separate program that compares words in a document with words in a disk-based dictionary and flags words not found in the dictionary. May operate in batch mode, checking all the words at once, or interactive mode, checking one word at a time.

0.grammar and style checker         Component of word-processing software that analyzes each word in context, checking for content errors, common grammatical errors, and stylistic problems.  

0.ASCII         American Standard Code for Information Interchange, a code that represents characters as 8-bit codes. Allows the binary computer to work with letters, digits, and special characters.

0.PDF (portable document format)         Allows documents of all types to be stored, viewed, or modified on any Windows or Macintosh computer, making it possible for many organizations to reduce paper flow.

text-to-speech         The creation of synthetic speech by converting text files into phonetic sounds.

clip art         A collection of redrawn images that you can cut out and paste into your own documents.

computer-aided design (CAD)         The use of computers to draw products or process designs on the screen.

hypermedia         The combination of text, numbers, graphics, animation, sound effects, music, and other media in hyperlinked documents.

hypertext         An interactive cross-referenced system that allows textual information to be linked in nonsequential ways. A hypertext document contains links that lead quickly to other parts of the document or to related documents.

pixel         A picture element (dot) on a computer screen or printout. Groups of pixels compose the images on the monitor and the output of a printout.

resolution         Density of pixels, measured by the number of dots per inch.

MP3         A method of compression that can squeeze a music file to a fraction of its original CD file size with only slight loss of quality.

MIDI         Musical Instrument Digital Interface, a standard interface that allows electronic instruments and computers to communicate with each other and work together.

morph         Video clip in which one image metamorphoses into another.

moral dilemma         A predicament for which rules and ethics don’t seem to apply, or to contradict one another.

Wednesday, April 21, 2010

Spread Sheet Software and DTP Notes

enaables users to take control of numbers, taking control of calculation processes

Malleable Matrix: Worsksheet: grids of numbers rows and lettered columns
Values are the raw material the spreadsheet uses to preofrm calculations scuh as #'s.
Replication commands: copy and paste
Austomatic recalulations changes data upon change
Functions: are already set calculations like a square root button
Macros: custom-designed programs that automates tasks in applications.
Templates: are ready-to-use worksheet layouts
Spreadsheets allow you to change numbers wqith automatic calculations
Pie chart: show relati ve proportions of the parts to the whole
Line charts: show trends over time
Bar charts: like a graph but more opportune when the data falls into more categories.
Working wisdom: spreadsheet errors
plan
make accurate assump[tions
double check
make readable
take advabtage of templates
put data first
dont distract
make easy to compare data
make it relate to the rest of the documen

Automatic MAth
many people who use math data depend on Mathematics-processing software
Staistics: the science of collecting and analyzing data


DESKTOP PUBLISHING
used for publishing documents, books, newspapers or magazines
DTP is easy
AoI
Business and employment
saves money and time
S&E
Equality of Access
you can publish at home

8 steps to DTP
1. Write the text
2.Edit Text
3. Add Drawings
4. Design basic format
5. Arrange text and graphics on pages
6. Print your Pages
7.Bind your Work
8. Share with your friends

Tuesday, April 20, 2010

4/20/10 notes

Wprd precessing and word tools

Application people use to read tools and numbers
entering text, editing, formatting, proofreding. saving and printing

Formatting
(Control size, color and font)
Control margins and justification

All modern word processors (WSYIWYG) How it looks on the screen is how it will rpint.

Outliners and idea processors
Arranging info into level so each heading can be flashed out with more detailed subheads which can be broken down
Outliners can replace note cards

Digital references
Dictionary, encyclodeia, atlases

Checkers and other tools
-Spell check
-incorrect spelling in wrong context
-pronouns
-analyze each word in context

Word processors today are also able to produce personalized form letter. They can be used with a database to generate individually addressed ;etters
Groupware allows people to collaborate together

Word tools
Some processors can recognize handwriting and convert it to text
Speech recogntion

Intelligent Word processors
can suggest new words if word is frequently used

Digital media formsare likely to eclipse papre
PDF: Prtable document format enables all documents to be edited, viewed and saved, reducing all paper use.
PAperless publishing and the web
Communication medium easy and inexpensive to reach wide audiences
Copyright protection: posting on the web is all free for all
S &E authenticity
solutions: transactions upon viewing online books

ebooks: content difficult to access, screens difficult to read
pixel blockiness should be reduced

elctronic paper

Monday, April 19, 2010

virus, preforms what the creator wants it to ppreform not the intention of the original program.
Denial of Service, program, act as user, generates volume, crash the website
Firewalls distingui sh between internal and external traffic (Demititarization Zone)
Data at rest ismore secure than data at flight, encrypting data hides the daaata in a code, must have the same code to decrypt
HTTPs< --------- secure

Wednesday, April 14, 2010

4/14/10 R Q's

1. Readable Database Management System
2. Past surgeries, medications, past appointments
3. Searching the database to find specific information is called a
__query____________.
4. Electronic databases can be easily accessed by hackers which can lead to stolen information, but at the same time they are more organized and more efficent are are able to hold more information than a paper notebook.
5. Security: Databases must be secured and gaurded with software to be protected from any database breaches.
Reliability: Management and organizations whol hold databases should be reliable in order for consumers to trust them with information.
Privacy and anonymity: Some databases hold personal and private information on individulas. if given to the wrong hands, that infpramtion can be severly misused.
6.
We can protect databases from database breaches and hackers. Helpful software or firewall can be used to protect databases .

Tuesday, April 13, 2010

News Bubble Article

Monday, April 12, 2010

4/12/10 Notes

Privacy of Information in Different Cultures

With a click of a button you can post pictures and information over the internet on social networking sites allowing people to paint an alarmingly accurate picture of who you are.

In the UK strict measurements are taken to prevent any theft of personal information on databases.
Individuals have rightsd over the information they dislose to the organizations.
__________________

Biometrics are used as security restricting access to certain parties, there are opposing argumetns on whether this is ethical or not.

It is legal to rack cyber records in the US.

__________________________
Social consequences of the release of sensitive data stored in databases
It is important to try to proetct data from being stolen
sensiive data can be easily recovered even though you may have thought they were deleted

__________________

Database selling
Inofmation can be sold to brokers and companies, which are privacy and security issues
Database informatin should be kept private
No one has the right to access any1 elses secure information
There are laws relating to this issue
he database only collects necessary information and then lets the owner know about stored info and must allow owner to access information or change any information
________
Social consequences of outdated or incorrect information in databases.
If a databses has incorrect information about you, you may not be able to get prodeuct(mailing lists)
Databases can record what you interested in based on likes and information from other database breaches

Friday, April 9, 2010

Friday Guest Speaker Notes

Logic does not mean thinking.
Thinking looks areound the reality and uses senses to make a conclusion.
A website can querie againts a table to extract information to make it visible on the web, such as prayer times.
An electronis database sorts and manages information easier and more efficiently than a paper notebook organizer.

Thursday, April 8, 2010

Key terms

1. Backup (or back-up) is a way of copying files to one or more places (independent of the normal file system) to avoid loss of data in case of a mass failure or system crash.
2. A graphical user interface (or GUI) is an interface that uses visual metaphors for certain objects, such as files and a desktop, instead of text. Graphical User Interfaces are now in widespread use as they are more visually appealing and can be used by many more people, because of the visual metaphors they employ.
3. One or more pieces of information that are grouped together and are the subject of a query.
The information that you put into a search of a database.
4. Query: An inquiry that retrieves specific data from a database.
5.Copyright
:Protection given to a person for their original work and the rights to determine to who can publish, reproduce, and distribute.
6.Baud
A unit of speed in data transmission equal to one bit per second. The Voltage or frequency changes that are made per second. Baud is not used as often anymore.
7. fuzzy logic A type of logic that allows conclusions to be stated as probabilities rather than certainties.

8. pattern recognition Identifying recurring patterns in input data with the goal of understanding or categorizing that input.
9. heuristic A rule of thumb.

10. command-line interface User interface that requires the user to type text commands on a command-line to communicate with the operating system.
11. uninterruptible power supply (UPS) A hardware device that protects computers from data loss during power failures.
12. electronic data interchange (EDI) A set of specifications for conducting basic business transactions over private networks.
13. mail merge A feature of a word processor or other program that enables it to merge names and addresses from a database mailing list into personalized form letters and mailings.
14. push technology Technology in which information is delivered automatically to a client computer. The user subscribes to a service and the server delivers that information periodically and unobtrusively. Contrast with pull technology.
15. database management system (DBMS) A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.
16. database A collection of information stored in an organized form in a computer.
17. data warehouse An integrated collection of corporate data stored in one location.
18. optical character recognition (OCR) Locating and identifying printed characters embedded in an image, allowing the text to be stored as an editable document. OCR can be performed by wand readers, pen scanners, and OCR software.
19. macro Custom-designed embedded procedure program that automates tasks in application programs.
20. fieldEach discrete chunk of information in a database record.
21. record In a database, the information relating to one person, product, or event.
22. sort Arrange records in alphabetic or numeric order based on values in one or more fields.
23. Feedback loop In a computer simulation, the user and the computer responding to data from each other.
24. expert systems (ES) Information systems or software programs designed to replicate the decision-making process of a human expert.
25. knowledge base A database that contains both facts and a system of rules for determining and changing the relationship among those facts.

Review Q's pg 259 #'s 7-11

7. Sorting data files allows a user to arrange records in alphebetic or numeric order based on values in one or more fields.

8.Most large databased use data-checking routines whenever data is entered . Many organizations also depend on software to correct errors that make it through data checks to prevent any dirty data. When didrty data is eliminated it is referred to as data scrubbing or data cleansing.

9.If tables in the databases share a single unique field, such as social security number field, record matching can be quick and easy than when database information is combined.
Data matching can prove beneficial and helps in the National Crime Information Center.

10. Everyone has a right to privacy, although it is not explicitly stated in the US Constitusion.
The creation of computerized databases led to concerns over individual privacy.
In the 1970's the Code of Fair Information practices was created calling for no secret government databases, but this mainly caught on in Europe.
In the US The Privacy act of 1974 was created, however it only applies to databases managed by the federal governmetn.

11. Computers are important in discussions of invasion of privacy becuase a lot of information can be taken away off what a computer user searches. HAckers can also hack into computer databases and take or release private information.

Tuesday, April 6, 2010

Review Q's pg 237 #'s 2-6

2. A file manager enables users to work with one file at a time. A DBMS can manipulate data in a large collection of files. Both are used to search and store data. DBMS is more complex.
3. A database is composed of one or more tables, which is a collection of related information. It holds records which are information of people, product or event. Each "chunk" of information in a database is called a field.

4. A query is an information request. It can be a simple search for a record.An example of a query would be "all students who attended Al-Arqam in the year 1998)

5. To create a simple business report one would arrange data in tables with rows for individual records and columns for selected fields.

6. some advantages of personal information management softwares include more organized records of information, it is faster and more efficient then paper notebook organizers, it can also hold more information then a standard sized notebook.
Advantages of a paper notebook organizer is that this way one would not face privacy or security issues. A computer hacker can easily access a computer database and use or release confidential information.

Wednesday, March 24, 2010

Review Q and Discussion Q #1 p.134

What is the relationship between a program and an algorithm?
A program is written in a language that a computer can understand it is a set of computer instructions designed to solve problems. An Algorithm is a set of step-by-step procedures for accomplishing a task.


In what way is writing instructions for a computer more difficult than writing instructions for a person? In what way is it easier?

A computer already has a set language and with algorithms, can fix any ambiguities or problems. It may be more difficult because you would have to use "machine language" which is numeric codes that initiate computer operations.

Wednesday, March 3, 2010

Date/Time Submitted:
March 3, 2010 at 2:52 PM (EST)
Summary of Results
100% Correct of 21 Scored items:
21 Correct:
100%
0 Incorrect:
0%

Tuesday, March 2, 2010

E-commerce is important in today's business world becuase it makes it easier for people to carry out business transtactions. It increases productivity by providing faster transsactions and is more efficient.E-Commerce has a large impact on comsumers and is allowing consumers to become pore dependent on internet transactions and it does not require leaving the house for business purposes.

E-commerce (B2B) and extranet allows for the sharing or intraorganizational information and allows buying and selling between businesses. At a college or university, buisness alliances can be formed to buy and import recsources from one school to another. These resources can include bokks and office supplies. The extranet can facilitate orders between differenct companies and are more efficient becuase of easy communication between businesses. Links can be installed and advertised on the university website for more business and money opportuities.

Depending on the amount of extra money paid I would pay extra for more secure buisness transactions and to prevent the sharing or personal information. I don't think I would share personal information even if it did promise personalized service.

Wednesday, February 24, 2010

IB Practice Q

Computer based translators often do not translate correctly because during translation words and meanings are lost and the contrext of the word is not taken into consideeeration while translating. A word may be translated but the meaning may be completely different becuase of the context it was placed in.The meaning of a word before it was translated may not have the same quality or emphasis after becuase some languages may not exactly have the same word or phrase.
MArkup language is a keyword that is shown or marked after it was searched.

Wednesday, February 17, 2010

a) Is e-commerce possible without the Internet? Explain.

e-commerce it mostly internet based but can also be used without the internet, such as with the use of the electronic telegraph, fax machines, . electronic data interchange, & bar coding.
b) Describe the 3 forms of e-commerce
There is business-to-business,
(inter-organizational information systems in which a company handles transactions within its own value chain and with other business organizations.
business-to-employee ( focus mainly on handling the actvivities that take place within the organization.

business-to-consumer. (retail actions between a company and individual customers)
Consumer-to-connsumer (buying and selling directly, via internet.)

c) What are the purposes of an intranet? What are the main characteristics of an intranet
They connect phtsically with computers, printers and other hardware networks.
characteristics include, a network, at least one computer with server software and other computers.




Tuesday, February 16, 2010

Describe

Two input devices that would be used in a pilot training computer simulation: Keyboard or mouse used to contol and nivigate around the siimulation.
and a cd-drive to install a computer simulated software. A joystick would also be an input device that can be used to navigate.

ONe advantage and one disadvatage of school providing thier students with USB drives. An advantage is portability of diles and homework to and from home. A disadvatage is innapropriaaaaate information can be stored and stolen if the student is n ot r eesponsible or does not follow school rules.

Keyterms

intranet A self-contained intraorganizational network that is designed using the same technology as the Internet.
Reliability: It can be used the same way as the internet, only for self-contained networks

middleware Connectivity software linking the client and server machines, providing easy access to information.
Equality of Access: This provide easy access between client and server.

e-business Though sometimes used interchangeably with the broader term e-commerce, here used to refer to the e-commerce activities of a particular company or organization.
people and machines: used with organzation and thier employees

electronic commerce (e-commerce)
Business transactions through electronic networks.

Security: SOmetimes it may be hacked and not reliable

dot-coms Internet-based companies.
Equality of access: some countries may not have access to dot-com domains.
m-commerce Mobile commerce, in which workers use laptops and wireless handheld devices to take their offices with them wherever they travel.
Equality of access: Can be used anywhere and is portable/ mobile

Thursday, February 11, 2010

Practive test Questions

1. Computer simulation: Computer simulation is a created online world that includees interaction with other netwrok users, It is computer generated and often animated online, simulated, virtual world atmousphere.

Bandwidth: The extent to which a computeeer network can reach.


Computer simulations are those programs based on models of reality ion order to imitate a certan scenario. Simulation can be used in a wide spectrem of areas, including business, traffic, ttraining, communalistic matters and the weather.

Bandwidth: Speed of capability of a connection to transfer a certain amount of data per unit of tim. Most of the time, the unit of time are seciinds and data is classifed into kb. It also refers to the physical measurements of the band through which connnection cables pass.

Friday, January 22, 2010

Tuesday, January 19, 2010

Review Questions #10 and 11

10. Computers threaten our personal privacy on several front. Corporate and government databases accumulate and share massive amounts of information about us against our will and without knowledge. Corporate managers use monitering software to measure agencies secretly monitor telephone calls and transmitted data.
Security measures are ued to prevent computer crime and help protect privacy rights.

11. Smart weapons are missiles that use computerized guidance systems to locate their targets and allows a human operator to control its path. It can greatly reduce th eamount of civilian destruction. A problem with samrt weapons is that they reduce the time humans have mor life-or-death situations.

1. i do nit RFID tags will be widely accpted becuase it may require time for people to adjust to a new ideo world-wide.


I would be interested becuase it may save time and may be useful around the house.

Monday, January 18, 2010

Review Questionspage 379

#7 What are the two inherit characteristics of computers that make security so difficult?

1. A comp uter does exactly what it is porgrammed to do, including reveal sensitive information. Anyone can program a computer.
2. a computer can only does what it is programmed to do, it cannot protect itself from malfunctions.

8. Describe several different computer security techniques, and explain the purpose of each.

some computer secuirty techniques include, a smart card containing digitally encoded identification in a built-in memory chip.
Voice print or finger print detected by biometrics.

Firewalls keep networks secure while enabling communication with the rest of the internet.
Encryption protects transmitted information.

Thursday, January 14, 2010

pg 372-374

Will computers be democratic?
Today computers are used to promote democtratic ideals such as blogging experiences at war or lobbying for a cuase online but many organizations use computers t o promotes personal businesses. Many wonder Will personal computers and the internet empower ordinary citizens to make better lives for themselves?
Will the Global Village be a community/
Many countries are able tom comuncate online, this may promote peace throughout countries or have countries fihting in information wars.
Will we become information slaves?
MAny wonder if humans will be able to adapt to a h\faster paced society with the advent of the internet. The information age may change the way people act, learn and interact.
Standing on the shoulders of Giants
By learning about the inventors and their inventions we are able to learn about the past and past inventions that make up modern day society.
There are many uses for computer technology today such as improving health care in differenct countries and education opportunities or the invention of unmanned combat aircraft to prevent a lost life.

Wednesday, January 13, 2010

Review Questions #2/4

Why is it hard to estimate the extent of computer crime?
Many computer crimes go undetected and unreported becuase businesses fear if computer crfimes are detected thay would lose more from negative publicity than the actual crime. businesses do know that instituions lose billions of dollars every year to computer criminals.

What is the most common computer crime? Who commits it? What is being done to stop it?
Theft is the most common form of computer crime, computers are used to steal money, goods, information and computer resources.

Examples of people that have commited computer crime are intruders who broke into a credit card website, the company has created a safer website.
two Russian men were arrested for breaking inteo several US Company networks.

Many computer users today face a growing problem of hacked files and emails, proving passwords are just not enough.  New technologies have emerged as a solution to this poblem such as  security questions  aupon accessing your network  or biometric technology that may scan  physical features. These techniques which are now used by  many people continue to grow  ad develope and serve as a solution to these social and ethical issues such as security or  reliability issues.

Wednesday, January 6, 2010

What are the different levels of access to the internet?

The levels  that one can access the internet by are categorized by scope and scale. 

There is WAN which stands for Wide Area Network, which can reach many house and has alarger  connection range. Then there is MAN - Metropolitan Area Network, which can reach " a  couple" ofhouses.
Then LAN (LOCAL AREA NETWORK) for the  private   household  computer

Monday, January 4, 2010

Questionsjanuary 4, 2009

2-Watch Networks video 1, 2, 33- Watch video:http://www.youtube.com/watchv=Cma3MABaHsw


Answer the following questions on your blog:
1. Name 3 networking sites. How do they allow users to participate?

Youtube: Youtube allows users to rate and comment on videos and share their opinions with others.
Twitter: Allows users to share updates with followers.
Blogger: Allows users who follow blogs to be constantly updated on blpg announcements.


2. Explain the impact of these networking sites in three different areas.

Education: Blogs and videos can serve as education or tutorials to students who may not understand  a lesson.
Politics: Politicians can tweet updates about thier campaign  on twitter as President Barack Obama did before  he became president.
Business and emplyment: Business blogs can update  employees on changes and anouncements within a buisness.

3. Consider the advantages and disadvantages of networking as pertaining to 3 social/ethical issues.

Privacy: sometimes twitter may not be private enough and can be viewed by most people unless tweets are protected.

Equality of Access:  some countries did not have websites  such  as blogger available to them until recently.
And all website  accounts  must be pretected  by security passwords