BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Friday, January 22, 2010

Tuesday, January 19, 2010

Review Questions #10 and 11

10. Computers threaten our personal privacy on several front. Corporate and government databases accumulate and share massive amounts of information about us against our will and without knowledge. Corporate managers use monitering software to measure agencies secretly monitor telephone calls and transmitted data.
Security measures are ued to prevent computer crime and help protect privacy rights.

11. Smart weapons are missiles that use computerized guidance systems to locate their targets and allows a human operator to control its path. It can greatly reduce th eamount of civilian destruction. A problem with samrt weapons is that they reduce the time humans have mor life-or-death situations.

1. i do nit RFID tags will be widely accpted becuase it may require time for people to adjust to a new ideo world-wide.


I would be interested becuase it may save time and may be useful around the house.

Monday, January 18, 2010

Review Questionspage 379

#7 What are the two inherit characteristics of computers that make security so difficult?

1. A comp uter does exactly what it is porgrammed to do, including reveal sensitive information. Anyone can program a computer.
2. a computer can only does what it is programmed to do, it cannot protect itself from malfunctions.

8. Describe several different computer security techniques, and explain the purpose of each.

some computer secuirty techniques include, a smart card containing digitally encoded identification in a built-in memory chip.
Voice print or finger print detected by biometrics.

Firewalls keep networks secure while enabling communication with the rest of the internet.
Encryption protects transmitted information.

Thursday, January 14, 2010

pg 372-374

Will computers be democratic?
Today computers are used to promote democtratic ideals such as blogging experiences at war or lobbying for a cuase online but many organizations use computers t o promotes personal businesses. Many wonder Will personal computers and the internet empower ordinary citizens to make better lives for themselves?
Will the Global Village be a community/
Many countries are able tom comuncate online, this may promote peace throughout countries or have countries fihting in information wars.
Will we become information slaves?
MAny wonder if humans will be able to adapt to a h\faster paced society with the advent of the internet. The information age may change the way people act, learn and interact.
Standing on the shoulders of Giants
By learning about the inventors and their inventions we are able to learn about the past and past inventions that make up modern day society.
There are many uses for computer technology today such as improving health care in differenct countries and education opportunities or the invention of unmanned combat aircraft to prevent a lost life.

Wednesday, January 13, 2010

Review Questions #2/4

Why is it hard to estimate the extent of computer crime?
Many computer crimes go undetected and unreported becuase businesses fear if computer crfimes are detected thay would lose more from negative publicity than the actual crime. businesses do know that instituions lose billions of dollars every year to computer criminals.

What is the most common computer crime? Who commits it? What is being done to stop it?
Theft is the most common form of computer crime, computers are used to steal money, goods, information and computer resources.

Examples of people that have commited computer crime are intruders who broke into a credit card website, the company has created a safer website.
two Russian men were arrested for breaking inteo several US Company networks.

Many computer users today face a growing problem of hacked files and emails, proving passwords are just not enough.  New technologies have emerged as a solution to this poblem such as  security questions  aupon accessing your network  or biometric technology that may scan  physical features. These techniques which are now used by  many people continue to grow  ad develope and serve as a solution to these social and ethical issues such as security or  reliability issues.

Wednesday, January 6, 2010

What are the different levels of access to the internet?

The levels  that one can access the internet by are categorized by scope and scale. 

There is WAN which stands for Wide Area Network, which can reach many house and has alarger  connection range. Then there is MAN - Metropolitan Area Network, which can reach " a  couple" ofhouses.
Then LAN (LOCAL AREA NETWORK) for the  private   household  computer

Monday, January 4, 2010

Questionsjanuary 4, 2009

2-Watch Networks video 1, 2, 33- Watch video:http://www.youtube.com/watchv=Cma3MABaHsw


Answer the following questions on your blog:
1. Name 3 networking sites. How do they allow users to participate?

Youtube: Youtube allows users to rate and comment on videos and share their opinions with others.
Twitter: Allows users to share updates with followers.
Blogger: Allows users who follow blogs to be constantly updated on blpg announcements.


2. Explain the impact of these networking sites in three different areas.

Education: Blogs and videos can serve as education or tutorials to students who may not understand  a lesson.
Politics: Politicians can tweet updates about thier campaign  on twitter as President Barack Obama did before  he became president.
Business and emplyment: Business blogs can update  employees on changes and anouncements within a buisness.

3. Consider the advantages and disadvantages of networking as pertaining to 3 social/ethical issues.

Privacy: sometimes twitter may not be private enough and can be viewed by most people unless tweets are protected.

Equality of Access:  some countries did not have websites  such  as blogger available to them until recently.
And all website  accounts  must be pretected  by security passwords