Thursday, April 22, 2010

Notes on Class Presentations

Computer Smulation and Visualization

-Allows us to understand concepts and ideas invisible to us.
-Shared Visualization allows people to make discoveries about the human body. The Us national Library of health and medicine have digitized versions of a male and female body for researchers to use.
-Fractal Geometry and Simulation allows people to plot graphs and such to help with mathematics, particulary in geometry.
-Computer modeling is the use of computers to vreate abstract models of organisms, settings,etc.
-Simulations may cause one to be too dependant on the computer itself when learning.
-Simulatios are used to teach people, such as driving, piloting,etc

Wednesday, April 21, 2010

Notes on Class Presentations

Desktop publishing is the creation and publication of books
7 steps:
write the text
edit your text
add graphics
design basic format for publication
arrange text and graphics on page
type setting and printing pages
printing

Desktop publishignt echnology makes ot easier to publish books

AOI: Business and employment- reduces errors, money and time

DTP tech offers new hope for every infdividual who would otherwise get turned down by major publishing companies.

There are now paperless publication options

Notes on Class Presentations

Spreadsheets
Spreadshets allow to control and manipulate nuimbers and information
One can automatically program spreadsheets to calculate numbers and information.
Replication commands allow to copy and apste celss.
templates are ready to use worksheet layouts
Sutomatic links among worksheets allow one to change links on all spreassheets automaticalls
One can make various charts cush as pie charts, line charts,
bar charts, and scatter charts. Each is appropriate for different situations.

Spreadsheet errors
Tips for avoiding errors:
Olan the worksheet before entering values and fomulas
Make accurate assumptions
Make it easy to compare data
Put data first
Do not distract reader
Take advantage of programmed functions

Spreadsheets are often used in money management. There are specific and more specialized spreadhseet programs that allow busiensses and banks to keep track of money. There is also symbolic mathematics processing software.

Another branch that uses spreadsheets is statistics. There is specific statistical software that analyzes data relationships to come up with statistical conclusions

Scientific visualisation software allows one to understand relationships that are invisible to us.

Computers are used to analyze, visualize and keep track of scoentific data. Pften used in ohysical, biological, and engineering sciences.

There are some problems with computer simulations: simulations can be really complex...the best hadware is needde. It also gives people the illusion that it is completely accurate.

Tuesday, April 20, 2010

Notes

Desktop Publishing
It increases risks of intellectual property theft.
Desktop publishing is becoming more common, e-books may soon replace paper books.
There are e-book readers are not very popular which arefailing becasue teh screens are difficult to read and the books are difficult to access.
Electronic paper is a thin flexible material that dynamicly shows black and white test and automatically erases and presents new text.

Wednesday, April 14, 2010

Database Review Questions

1)RDBMS: Relational Database Management System= A series of databases that are conected via one common field, making it easierto seach information related to the saem subject.

2)Patients personal information, suhc us phne number, address, social security, etc...patients lab test results, patients check-up results.

3)Query

4)There is much convern over them becasue they can be breached or sold and personal information of individulas can be released to the public.

5) Privacy: ones privacy can be violated if theirr information is on a database that is breached.

Security: Ones security an be put as risk..for example identity theft, if thei personal information is lost exposed in a databse.

Policies adn Standards: rules need to be set related to database information being shared of released.

6)We need to protect databases form being hacked into or breached and have infomation stole. ther eis database security software that can be used ot protect dataases form being breached.

Tuesday, April 13, 2010

ITGS WORDS

1) Batch Processing: Accumulating transactions and feeding them into a computer in large batches.

2) Browse: The process of finding information in a database or other data source, such as the World Wide Web.

3) Centralized Databases: A database housed in a mainframe computer, accessible only to information-processing personnel.

4) Client/Server: Client programs in desktop computers send information requests through a network to server databases on mainframes, minicomputers, or desktop computers; the servers process queries and send the requested data back to the client.

5) Computed Fields: In a database, a field containing formulas similar to spreadsheet formulas; they display values calculated from values in other numeric fields.

6) Data Mining: The discovery and extraction of hidden predictive information from large databases.

7) Data Scrubbing: The process of going through a database and eliminating records that contain errors.

8) Data Warehouse: An integrated collection of corporate data stored in one location.

9) Database: A collection of information stored in an organized form in a computer.

10) DBMS: A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.

11) Database program: A software tool for organizing the storage and retrieval of the information in a database.

12) Dirty Data: Data records with spelling mistakes, incorrect or obsolete values, or other errors.

13) Distributed Database: Data strewn out across networks on several different computers.

14) Export Data: Transmitting records and fields from a database program to another program.

15) Field: Each discrete chunk of information in a database record.

16) File Manager: A program that enables users to manipulate files on their computers.

17) GIS: that combines tables of data with demographic information and displays geographic and demographic data on maps.

18) Identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards. Imported Data

19) Interactive Processing: Interacting with data through terminals, viewing and changing values online in real time.

20) Object oreinted Database: Instead of storing records in tables and hierarchies, stores software objects that contain procedures (or instructions) with data.

21) Personal Information manager: A specialized database program that automates an address/phone book, an appointment calendar, a to-do list, and miscellaneous notes. Also called an electronic organizer.

22) Privacy: Freedom from unauthorized access to one's person, or to knowledge about one's person.

23) Query: An information request

24) Query Language: A special language for performing queries, more precise than the English.

25) Real time: When a computer performs tasks immediately.

Notes on ITGS Reports.

Ethical Issues Related to Selling Database Information
Database Information brings up two issues, privacy and security. personal data is stored on databases and we trust these databases to keep these rpivate. However, some people sell dtabases with private information to other companies, causing security issues. It can elad to complications such as identuty theft. There are laws for database issues, most fo these laws are related to procedures that must be carried out when selling database information.

Paper Files Vs Electronic Files
Nowadays Electronic files are being used more often nowadays. it makes it easier to search for inforamtion and keep things organized and efficient. Databases allows allow any group of data. But tehre are also problems with dtabase files. You can easily leak information.

Responsibility for the Security of Data Stored in Databases
The number of databases in use grows and grows each day. Databases are continuously breached and information is stolen. Each company is responsible for trying to keep their data secure. If they are not careful, they can put the identities of many at risk of being stolen. Software contorls are being used to safeguard databases.

Article used for Database News Bubble: http://www.marketwatch.com/story/medical-database-raises-ethical-issues

Monday, April 12, 2010

Notes on Class Presentations

Privacy of Information in Different Cultures

Nowadays, privacy is difficult to get a hold of. Information is available all over the internet. Different countries have different rules on privacy. In the Uk, there are specific guidelines allowing people to access any informaiton the governemtn may have and fix it. The regulations in Europe are more strict thatn the United States. Canada gives individuals the right to know that all organizations can obtain consent before they use or share personal information.

Rights of the Individual with Respect to Storage of Personal Data

In Europeans countires regulations regarding the storage of data are bery strict and complicated. There are problems regardign biometrics in particular. The PPPC on human genetics came up wwitha document regarding the rights of the individula in biometrics. The datada protection right of 1988 also gives rights to individuals regarding personal data storage.
In the US, the individual doenst have much privacy with regards to personal data.

Social Consequences of the release of Sensitive Data to Databases

Sensitive Data can lead to crime, theft, and other violations of ones rights. Sensitive data includes, social security, credit card infor or bank information, tax information, basically anythign that can lead to identity theft. It is very easy to find information on a person. One must be careful to release information that isnt to sensitive.

Thursday, April 8, 2010

Database Review Questions

page 259

7)What does it mean to sort a data file?
Sorting a data file refers to putting files in order according to a specefic trait, such as ordering them alphabetically.

8)How can a database be designed to reduce the likelihood of data-entry errors?
Data scrubbing can help get rid of any dirty data in databases.

9) Describe how record mathcing is used to obtain information about you.
record matching is a process in which two or more databases mathc information using common fleids to pull up other information on an individual. For example, if there were two databases and each had my social security number, they could math the number and pull up any information form each other regarding me.

10)Do we have a legal right to privacy? On what grounds?
YEs, the right to privacy is given to all individual from the constitution. The United States has expanded the idea of privacy to informatio processing.

11) Why are computers important in discusisions of invasion of privacy?
Computers can often offer access to databases and internet records to access information. Nowadays it is probably the most effective method of finding data and information, that is why it is essential to include computers in discussions regarding privacy.

Tuesday, April 6, 2010

ITGS Review Questions: Database

page 259

2)What is the difference between a file amamger and a database management system?
A database management system allows to more easily navigate through data. It is more effient, quick, and eay to use becasue it uses spreadshets and tables that are linked together to locate and organize files, unlike a file system.

3)Describe the structure of a simple database.
Each database is made up of tables, each record is basically a record. Each record is made up of fields containing information.

4)What is a query? GIve examples of kinds of questions that might be answered with a query.
A query is a request for any kind of information, usually asked on an internet search engine. There are many search engiens such as google, yahoo, bing,etc. A query can be virtually anything one wants to know. For example, looking up the information and reviews on a movie, or finding recipes or information on a program you are interested in.

5)What steps are involved in producing a standard multicolumn business report with a database?
One can design and program a spreadsheet to simply calculate and keep track of monthy sales and so on, all they have to do after designing the spreadhseet in the way they think is best fit, and programming certain cells to calculate, all they need to do is input information when they want to updatet eh report and allt eh numbers and calculations will automatically be doen on the spreadsheet without any extra effort.

6)What are the advantages of personal information management software over paper notebook organizers? What are the disadvantages?
Having personal information management software makes it easier to track through information because it is well organized and easy to search. Finding and entering information is a mroe effiecnet process, and you can easily share it with whoever you please. You can also keep it on a PDA, or phone and easily open and access it wherever you are.

Sunday, April 4, 2010

A weeks worth of ITGS vocab

algorithm:
A set of step-by-step instructions that, when completed, solves a problem.


program:
Instructions that tell the hardware what to do to transform input into output.

debugging:
Finding and correcting errors—bugs—in computer software.

compiler:


fragmented file:
A file allocated to noncontiguous clusters on a disk, thus degrading the disk’s performance.

open-source software;


Graphical User Interface (GUI)
A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus.

software license:
An agreement allowing the use of a software program on a single machine.

autonomous software:

logic bomb:


malware:
Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

spyware:
Technology that collects information from computer users without their knowledge or consent.
trojan horse:

de-skilled:
Deskilling is the process by which skilled labor within an industry or economy is eliminated by the introduction of technologies operated by semiskilled or unskilled workers. Work is fragmented, and individuals lose the integrated skills and comprehensive knowledge of the crafts persons

up-skilled
to teach someone additional skills, especially as an alternative to redundancy; to acquire such additional skills

distributed computing:
Integrating all kinds of computers, from mainframes to PCs, into a single, seamless system.

open standards:
Standards not owned by any company.

packet-switching:
The standard technique used to send information over the Internet. A message is broken into packets that travel independently from network to network toward their common destination, where they are reunited.

Web authoring software:
Programs such as Adobe’s. Dreamweaver that work like desktop publishing page layout programs to allow users to create, edit, and manage Web pages and sites without having to write HTML code.

authentication software:
Computer network security measures that ensure that only legitimate users have access to the system by asking potential users to identify themselves.

authorization mechanisms:
Computer network security measures that guarantee that users have permission to perform particular actions.

groupware:
Software designed to be used by work groups rather than individuals.

narrowcasting:
Providing custom newscasts and entertainment features aimed at narrow groups or individuals.

technophobia:
The fear of technology.


outsourcing:
Hiring talent for selected activities on a contract basis.

software engineering:
A branch of computer science that applies engineering principles and techniques to the world of computer software.