Monday, December 15, 2008

IT Homework for December th 2008

Pgs. 156-1571
What is the difference between application and language software (4 pts.)?
2) Pg. 157 #1 (2 pts. each)
3) Pg. 157 #2 (3 pts.)
Pgs. 158-1591
What is meant by high level language (3pts?)
2) Pg. 159 #1 (1 pt.)3) Pg. 159 #2 (1 pt.)4) Pg. 159 #3 (4 pts.)

Pgs. 160-1611)
Pg. 161 #1 (1 pt.)
2) Pg. 161 #2 (1 pt.)3)
What is a plug-in (2pts.)?
4) Pg. 161 #3 (2 pts.)

1.) An application software is a software that i nstructs a computer to carry out a specific task. and a language software is something that creates both system and application softwares.

2.) Default setting is when the appilcation software is already installed and it is set up in the way that the sowtware company thinks most people will want. A template is a predesigned file that sets up a structure for a document. Expert System is an application that performs a task that would otherwise be performed by a human expert. Artificial Intelligence is the part of computer science that that is concerned with getting computers behave like humans.

3.) Medicine - to diagnose the illness
Buying and selling of company shares - to choose the best shares to invest in
House buying - to choose the best mortage


Pgs. 158-1591
1.) examples of highlevel language is Pascal, Visual Basic and Java. These are called high level because they use keywords similar to english and are easier to write than low level languages.

2.) COBOL(Common Buisness - Oriented Language) is a high level language used in buisness programs

3.) The reason why Visual Basic is popular is because it can use predefined libraries of code that can be adapted for their application

4.) A macro is a series of commands that a program can perform automatically. you can use it to sort the class between the surname and the class. To sort out different categories

Pgs. 160-1611
1.) Java is a good computer language because they are able to access any content on the web pages

2.) An applet ensures that everyone can access the web content a small java application.

3.) It is a small piece of software that plugs into larger application to add more features.

4.) The advantage is that the content and layout of a document is preserved

Monday, December 1, 2008

Homework for Tuesday December 2nd 2008

pg. 126-127:
1. Explain what is a computer control system. (3 pts)
2. Give one example of a control system found in the reading and describe how it works. (3 pts)

pg. 128-129:
1. What does a control system consist of? (6 pts)
2. Explain what is meant by embedded controller. (4 pts)
3. Why are control systems considered real-time systems? (3 pts)
4. In your own words explain how control systems have made an impact on our lives. (4 pts)

pg. 130-131:
1. List 6 questions that must be answered when designing a control system. (6 pts)
2. For what purpose would you use a flow chart when designing a control system? (2 pts)
3. Describe two approaches to control programming which most students use. (6pts)

Pg. 126-127
1.) a computer control system is seen everywhere its just that you dont notice. Computer systems do not necessarily posses the features of a regular computer with a monitor and keyboard. A good example of a computer control system is the traffic lights. The control system is all about making the devices do what we want them to do in the right order.

2.) The central heating system is one example. the heat in the system, is generated by the radiators is then fedback to the input of the sensors to stop the rooms from getting too hot.

pg. 128-129
1.) A control system system consists of some sensors which input information, a processing unit(computer) which decides how to respondd to the inputs, and output devices which do what is required.

2.) An embedded controller is the proccessing unit program in electric circuits. They have only one program in their electronics to do the job they were designed to do. It makes them much cheaper to make because they do not need disk storage divices such as a keyboard, a mouse or a screen.

3.) They are known as real-time systems because they rely on the enviornmental feedback in order to work and get their job done. They need to be able to respond quickly to the current conditions as described by the sensors and to let the processing unit take the appropriate action.

4.) I think that the control systems have impacted our lives. People lost their jobs but at the same time machines were made and now rather than doing the repetitive tasks themselves they now keep running machinery. the speed and effiency of the machines are higher.

pg.130-131
1.) the 6 questions are
-What need to be done?
-What outputs are required from the system?
-Which output devices do you use?
-How many devices do you need?
-Which sensors do you use?
- what will the system need to know about what is going on so that it can make sensible decisions about what to make the output devices do

2.) You will use a flow chart for the visual approach. You will build your working ansewwr by constructing a flow chart. These commands may set the pattern of ons and offs you want on the outpput. Also to instruct the computer to look aat sensor to see what is happening or to make some decisions based on what it had just found out about the state of the system.

3.) there is the visual apporoach and the others use a programming language. These often work like the LOGO programming. The have words or commands that make the computer to do particular thingss. they also let you build procedures(functional blocks of programming which can then be linked together to create a larger, more complex control program sequence)

Thursday, November 20, 2008

IT Homework for November 21st 2008

pg.182-183

1.) List 5 examples of potential health problems linked to using IT equipment for long periods and give 3 most important points to consider in order to avoid each of the first three mentioned potential problems.

-Repetitive Strain Injury (RSI) which occurs when you use the mouse or type for a long period of time
-Back Problems may also occur on having the bad equipment
- A long period of staring at the screen may cause Eye problems. Also being too close to the computer, font size and color may affect your eyes.
- Stress is caused by people who work full time during their job without getting enough rest. Buisness workers oftenly deal with stress.
- The excessive use of comptuers by pregnant woman may effect the baby by the electromagnetic radiation

RSI-
1.) Take rests, stand up and stretch.
2.) Less use of mouse and keyboard
3.) Less use of the computer its self.

Back Problems-
1.) Buy/use a soft office chair not the hard ones
2.) Stretches
3.) Be in a good position at all times while working

Eye Problems-
1.) Get your eyes away from the screen. Not to close
2.) rest your eyes every 30 minutes.
3.) Try not to stay on computer for more than 1 hour per day. Unless for work.

Monday, November 3, 2008

IT Homework for November 4th 2008

Questions from video #1-3

1.) What are the problems associated with Technology in the workplace?
People now in days take up too much time on computer, phones and emails. Everyone
who has a phone checks their email 59% of the time. It doesnt ditract them from their homelife but also their worklife. You have the choice of technology taking over you or you taking over the technology

2.) What are 3 ways to reduce this stress?
-you can turn off the email notifications on desktop/phone
-check the email when you want to
-set the phones computers aside you can get to it but not straight away

3.) What are the positives to technology in the workplace?
It can make you more productive during the work day. Some people actually have 2 monitors ont their desk and this shows and raises the productivity by 20%. If you do really good you can get a leg up in your job.

IT Homework for November 4th 2008

pg. 180-181 #1-2

1.) Write a 4-6 line summary (in your own words) for each of the 3 subheadings: Economic Effects, Social Effects, and Environmental Effects of IT.

Economic Effects:
Life in the Economic ways have definently been easier. It is faster, easier and more reliant. But the information systems have also led to an increase in other types of jobs. Since the technology is so advanced now in days people who try to get new jobs include packing boxes and sweeping floors. The government evidence would suggest that the use of information systems has created more jobs than have been lost by its introduction.

Social Effects:
The social affects has led to more efficient ways of working and also it decreased the hours that people have to work. Which leads to people spending time on leisure purisuits. There was an arguenment on how young people spend to much time on computers playing computer games. People argue that the long uses are decreasing the communication levels. Although others argue that playing video games online can help and develop problem-solving sills and encourage collaboration and team work.

Enviornmental Effects:
Enviornmental effects are a big part too. The computers have increased a level in electricity consumption while in the other hand electricity and other forms of energy has been reduced as computers carefully control the air conditioning and heating systems. Information systems have teleworking enabled from the house. Which means less travel to and from work and therefore a reduction in traffic polution.



2.) Answer 2 of the questions raised under the legal, ethical & moral effects section, giving your opinion on each.

How far should the law go in giving the police access to everyones personal data or emails in order to fight crime or to defend national security?
I think police should have some access to everyones personal data. But it shall be only to a certain extent. Giving away too much information might include private information so only to an extent where you can find for example where you are living name adress.

How far should established and new technologies, such as closed circuit television and microchip smart cards be used to monitor peoples activities?
Same as the answer above, i dont think that they need to know every little information. You can have small monitoring cameras just incase people steal things from stores. But other than that i dont think there is a particular reason for having microchip smart cards.

IT Homework for November 4th 2008

pg.178-179 #1-4

1.) What is a teleworker?

Teleworkers are people who work on a full part time basis either at home or move about the country using a PC andmodem to communicate with their employers.

2.)What is the advantagee of teleworking?

The advantages of teleworking are time and mobey is saved by not having to travel to and from a main office (hours can be flexible) people can work together over a very large area and employers save money not having to run large offices.

3.)Summarize (in your own words) the way an information system affects how supermarkets operate?

Information systems do affect supermarkets to operate faster and easier. The supermarkets have/use a barcode which is swiped through a barcode reader are the point of sale computer terminal at the checkout. Everything you buy is transmited to the central database and then is transmitted back to the POS terminal. Payment can be made with a credit/debit card. The computers are all linked to an warehouse and main ccomputer system through a wide area network. When the items are swiped through the barcode readers at the checkouts, the sto levels are automatically updated. When the product gets too low, the product is automatically re ordered and delivered.


4.)How have banks been affected by computerized information systems?

Banks have been affected alot by computerized information systems. For example the ATMs (automated teller machines) are known throughout the world and allow customers to withdraw cash and check their account details. Salaries can also be automatically paid into accounts and bills paid using direct debits.

IT Homework for November 4th 2008

Pg. 176-177 #1-5

1.) List 4 ways to protect data.

-Backing up
- Computer Viruses
- Locking disks
- Network security

2.) Why is the data protection act important?

The data protection act is important because it has a set of rules on what information can be kept to the certain individual. Also the importance is so that the computer users can protect/prevent from losing data.

3.) Explain the difference between data subjects and data controllers.

The difference between data subjects and data controllers are that data subjects are people who have data held about them. The data controllers are the people of the organization who have the data.

4.) Give 2 ways the Data Protection Act works.

The data protection act works in two ways. one of them gives people rights about the way their personal information is used. the next is that it ensures that the data controllers are open about how their information is used.

5.) What rights do individuals have regarding the information that is held about them?

You do have legal rights to find out what information is held about you on the computer. You can do this by writing to the person or organization you belive holds the information. But you are not allowed to chec information held on you concerning things suh as national security, crime prevention/detection, salaries and income tax.

Thursday, October 9, 2008

Homework for Friday, October 10th 2008

Pg. 174-175 #1-3

1.) A copyright is a name given to the protection of the rights of the person responsible for creating things. For example, text, a piece of music, a painting or a computer program. Hacking are people who are able to access a computer system without the users permission. They usually mess around with the programs and the data.

2.) The four main types of piracy are the copying of the software to try to make it look like a genuine product. Also the copying and selling of recordable CD-ROMS than contain prirated software. Also the downloading of a copyright software from the internet. The last point is the use of software on more computer in a network than the number of computers for which there are software licenses

3.) One of the points are that they deliberately plant computer viruses that damage program files and data. They also copy computer programs illegally or other wors computer priracy. Also they hack into a computer with the intention of seeing or altering information. Last one is that they use your employers computer to carry out unauthorised work.

Monday, October 6, 2008

IT Homework for October 7th 2008

Pg. 172-173 #1-3

1.) What is a computer virus? How does it work?

A computer virus infects the computers files and damages your computer by doing something that is unexpected. First the virus program is inputed into the computer file. That file is then used and put in as memory, while other files get infected. The user of the computer is unaware and doesnt know that any of this is going on. If the infected mail is sent by mail or given to others by a floppy disk, that computer will be infected and the virus will spread.

2.) What are the 3 main types of computer viruses?

The three main type of computer viruses are, the ones that infect the program files. It is attached to the files and when the file is loaded so does the virus. The second type is the ones that infect the system/boot files. When it infects the boot file, the virus is loaded into the memory and is able to run whenever the computer is on. The last main type of virus is the macro viruses. They are carried by the files and is executed when the file is opened. Most of these macro viruses are spread by email attachments.

3.) List 4 ways to prevent a computer from becoming infected with a computer virus.

There are 4 ways to protect and prevent a computer from getting infected by a computer virus. One of them are to install an anti-virus software. It protects the whole operating system, program and files against the virus. Another way is to turn on a program virus protection. A good example of a program that contains this protection is the Microsoft applications. The 3rd way is to know tthe origin of each program or file you use. The last and most important one is to never double-click on an e-mail attachment that contains an executable file with an extention EXE, COM or VBS.

Thursday, September 25, 2008

Homework Friday, September 26th

Pg. 170-171 # 1-3

1.) A intranet is a private network which is based on the internet. it is only accessable to the ones who are part of the organization. The difference between an internet and the intranet is that the internet iis accessable to anyone who has the internet connection. But the intranet is only accessable for the people who are in the organization. The intranet is used in several ways. Most of the schools are setting up their own intranets. The biggest reason is the timetables, room changes, sports teams and results can be shared with the student and staff.

2.) The difference between extranets and intranets are that the intranet can only be accessed by the people who are in the certain organization. But the extranets can be accessed by outsiders with a valid username and password, but they only have limited access.

3.) EDI (electronic data interchange) is a special way to transfer buisness documents. For example orders and invoices between computers. e-commerce is used for the term, buying and selling goods and services on the internet, in particular the World Wibe Web.

Monday, September 15, 2008

IT Homework for Sep. 16

Pg. 164-165 #1-5

1.) A telecommunication is a name given or sending and receiving  data through wires, optical fibers  or radio waves. It also involves communications over great distance. It includes sending and receiving the computer data, television pictures, images, voice, sound and faxes. 

2.) The satellites send and receive data by using microwaves. Some are used for sending and receiving phone calls, television pictures and computer data, while others are dedicated to certain tasks. A communications satellite receives signals sent from a ground-based station then it gets simplifies. 

3.) It consists of a transmitter, a transmission channel and a receiver. First in converts the data collected to which enables it to be sent over wires or optical fibers or by radio waves to the receiver. It converts the data to a form that can be understood by a person or machine. 

4.) The Process Is pretty simple. It is when the analogue signals are converted to digital signals. This process occurs because many digital signals can be squeeze d into the analogue signals. The digital signals are more reliable and higher quality transmission than analogue. The equipment used for digital signals are also cheaper.

5.) The advantage of using the Bluetooth is that it’s a wireless hand held technology devise. For example mobile phones, computers, and more.

Pg. 166-167 #1-5

1.) A dial-up network is where the computer is connected to the internet with a modern. The dial up connections are the cheapest but also slowest.

2.) ISDN is a high speed digital alternative to using the telephone network. T can send and receive data at 128 keps. But the ADSL transforms the data into big speed digital data lines. It can send and receive data faster than ISDN with the speed up to 8Mbps.

3.) The advantage is that the via cable is able to send and receive data at high speed. It’s a broadband service, so a cable can carry many channels.

4.) It is important to the Internet because it breaks down the data into little packets, which are sent to computers to the internet. It also makes the data that is reassembled into its normal form.

5.) IP is an address for numbers usual four. It is important because it can track the users internet usage.

Pg. 168-169 #1-5       

1.) I personally think that the one which says, research in finding more information and information on the web can be multimedia: that is, text, graphics, video, animation and sound. If we were enable to research and find information we need we will have to go to the library and look up books. Without information on the web we wont be able to download videos, movies, and pictures we need.

2.) Security

-       Downloading viruses.

-       Protection of copyright material

-       No control on information

-       Cost of computer equipment

-       Searching for information that is difficult 

3.)  The advantages of mail is that its quicker than postal mail, mails can be sent to more than one person at the same time. Also text messages can be sent to mobile phones. 

4.) Encryption is the process when you put data into a code to prevent accessing the data. Encryption is also used during the sending of files on the internet and the World Wide Web.
 
5.) A firewall is a security system that prevents hackers to access the network. It stops the computers on a network communicating directly with computer on the Internet. A proxy server is an outside the network. The proxy server is a gatekeeper. It filters internet sites and decides which files or messages should come in to or go out from a computer network.