Thursday, May 6, 2010
2.4.1 Robotics Social/ Ethical issues
Salihas blog:
smmwahdy.blogspot.com
Monday, May 3, 2010
Artificial Intelligence and Robotics
machines can only do what they are programmed to. They cannot sense our needs and automatically react.
Asian countries tend to be more obsessed with artificual intelligence than European countires and the United States. This is becasue Asian countires dont have much religion so they donnot debate ethical issues and dont worry about tkaing tech too far.
Nowadays there are more and mroe artifical intellignce applications.
Ex. cars that can automatically adjust speed and park themselves.
google can help you search by recognizing patterns in your recent searches
Researchers want to try to develop machines that can process beyong human capabilities. Religious communities are generally alarmed by these researchers and studies.
We as Muslims dont worry becasue we have the intelligence that Allah (SWA) is th only creator. No human can create anything that can exceed the creation of Allah(SWA).
Sunday, May 2, 2010
GAMING Entertainment or training killers?
he was simply playing a vddieo-game as all teens do, and didn't think it would influence him that heavily.
Supporting arguemnts for strickland:
Video-gaming industries have created addicting games that promote violence and in a snense"train" one to kill, especially in teenageers who arent' fully developed mentally, and act on impulse. Video-game companies and its carriers should be mroe carefula and take responsibility, as well as the teens who purchase them and play them excessively.
2)Supporting arguements Gaming Industry:
The gmaing industry has the right to free expression and can create whatever games they would like. They are not responsible for the actions fo those who choose to purchase and play them. They do have the games rated and placed in the market so technically those impressionable and easily influencedd shouldnt even be buying them.
3)When selling violent games in the industry, the game rating should eb taken more seriously. One should only purchase a game if they can accoding to the rating, and those who carry and sell the games should try and moniter to the best of the ability who they are sold to. This way, incidents like the one discussed in this article can be rpevented.
4) Videogame companies should eb more careful in terms of violent video-games. Yes, they do haev the right to freedon of expression, but they should limit the violence in their games as well as any otehr innapropriate material. They should also have strogner ratings on the games and if a game is very violent still, they shouldnt be easily available at all stores, maybe sold only in particular stores where adults may access them but children cant.
Thursday, April 22, 2010
Notes on Class Presentations
-Allows us to understand concepts and ideas invisible to us.
-Shared Visualization allows people to make discoveries about the human body. The Us national Library of health and medicine have digitized versions of a male and female body for researchers to use.
-Fractal Geometry and Simulation allows people to plot graphs and such to help with mathematics, particulary in geometry.
-Computer modeling is the use of computers to vreate abstract models of organisms, settings,etc.
-Simulations may cause one to be too dependant on the computer itself when learning.
-Simulatios are used to teach people, such as driving, piloting,etc
Wednesday, April 21, 2010
Notes on Class Presentations
7 steps:
write the text
edit your text
add graphics
design basic format for publication
arrange text and graphics on page
type setting and printing pages
printing
Desktop publishignt echnology makes ot easier to publish books
AOI: Business and employment- reduces errors, money and time
DTP tech offers new hope for every infdividual who would otherwise get turned down by major publishing companies.
There are now paperless publication options
Notes on Class Presentations
Spreadshets allow to control and manipulate nuimbers and information
One can automatically program spreadsheets to calculate numbers and information.
Replication commands allow to copy and apste celss.
templates are ready to use worksheet layouts
Sutomatic links among worksheets allow one to change links on all spreassheets automaticalls
One can make various charts cush as pie charts, line charts,
bar charts, and scatter charts. Each is appropriate for different situations.
Spreadsheet errors
Tips for avoiding errors:
Olan the worksheet before entering values and fomulas
Make accurate assumptions
Make it easy to compare data
Put data first
Do not distract reader
Take advantage of programmed functions
Spreadsheets are often used in money management. There are specific and more specialized spreadhseet programs that allow busiensses and banks to keep track of money. There is also symbolic mathematics processing software.
Another branch that uses spreadsheets is statistics. There is specific statistical software that analyzes data relationships to come up with statistical conclusions
Scientific visualisation software allows one to understand relationships that are invisible to us.
Computers are used to analyze, visualize and keep track of scoentific data. Pften used in ohysical, biological, and engineering sciences.
There are some problems with computer simulations: simulations can be really complex...the best hadware is needde. It also gives people the illusion that it is completely accurate.
Tuesday, April 20, 2010
Notes
It increases risks of intellectual property theft.
Desktop publishing is becoming more common, e-books may soon replace paper books.
There are e-book readers are not very popular which arefailing becasue teh screens are difficult to read and the books are difficult to access.
Electronic paper is a thin flexible material that dynamicly shows black and white test and automatically erases and presents new text.
Wednesday, April 14, 2010
Database Review Questions
2)Patients personal information, suhc us phne number, address, social security, etc...patients lab test results, patients check-up results.
3)Query
4)There is much convern over them becasue they can be breached or sold and personal information of individulas can be released to the public.
5) Privacy: ones privacy can be violated if theirr information is on a database that is breached.
Security: Ones security an be put as risk..for example identity theft, if thei personal information is lost exposed in a databse.
Policies adn Standards: rules need to be set related to database information being shared of released.
6)We need to protect databases form being hacked into or breached and have infomation stole. ther eis database security software that can be used ot protect dataases form being breached.
Tuesday, April 13, 2010
ITGS WORDS
1) Batch Processing: Accumulating transactions and feeding them into a computer in large batches.
2) Browse: The process of finding information in a database or other data source, such as the World Wide Web.
3) Centralized Databases: A database housed in a mainframe computer, accessible only to information-processing personnel.
4) Client/Server: Client programs in desktop computers send information requests through a network to server databases on mainframes, minicomputers, or desktop computers; the servers process queries and send the requested data back to the client.
5) Computed Fields: In a database, a field containing formulas similar to spreadsheet formulas; they display values calculated from values in other numeric fields.
6) Data Mining: The discovery and extraction of hidden predictive information from large databases.
7) Data Scrubbing: The process of going through a database and eliminating records that contain errors.
8) Data Warehouse: An integrated collection of corporate data stored in one location.
9) Database: A collection of information stored in an organized form in a computer.
10) DBMS: A program or system of programs that can manipulate data in a large collection of files (the database), cross-referencing between files as needed.
11) Database program: A software tool for organizing the storage and retrieval of the information in a database.
12) Dirty Data: Data records with spelling mistakes, incorrect or obsolete values, or other errors.
13) Distributed Database: Data strewn out across networks on several different computers.
14) Export Data: Transmitting records and fields from a database program to another program.
15) Field: Each discrete chunk of information in a database record.
16) File Manager: A program that enables users to manipulate files on their computers.
17) GIS: that combines tables of data with demographic information and displays geographic and demographic data on maps.
18) Identity theft: The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards. Imported Data
19) Interactive Processing: Interacting with data through terminals, viewing and changing values online in real time.
20) Object oreinted Database: Instead of storing records in tables and hierarchies, stores software objects that contain procedures (or instructions) with data.
21) Personal Information manager: A specialized database program that automates an address/phone book, an appointment calendar, a to-do list, and miscellaneous notes. Also called an electronic organizer.
22) Privacy: Freedom from unauthorized access to one's person, or to knowledge about one's person.
23) Query: An information request
24) Query Language: A special language for performing queries, more precise than the English.
25) Real time: When a computer performs tasks immediately.
Notes on ITGS Reports.
Database Information brings up two issues, privacy and security. personal data is stored on databases and we trust these databases to keep these rpivate. However, some people sell dtabases with private information to other companies, causing security issues. It can elad to complications such as identuty theft. There are laws for database issues, most fo these laws are related to procedures that must be carried out when selling database information.
Paper Files Vs Electronic Files
Nowadays Electronic files are being used more often nowadays. it makes it easier to search for inforamtion and keep things organized and efficient. Databases allows allow any group of data. But tehre are also problems with dtabase files. You can easily leak information.
Responsibility for the Security of Data Stored in Databases
The number of databases in use grows and grows each day. Databases are continuously breached and information is stolen. Each company is responsible for trying to keep their data secure. If they are not careful, they can put the identities of many at risk of being stolen. Software contorls are being used to safeguard databases.
Monday, April 12, 2010
Notes on Class Presentations
Nowadays, privacy is difficult to get a hold of. Information is available all over the internet. Different countries have different rules on privacy. In the Uk, there are specific guidelines allowing people to access any informaiton the governemtn may have and fix it. The regulations in Europe are more strict thatn the United States. Canada gives individuals the right to know that all organizations can obtain consent before they use or share personal information.
Rights of the Individual with Respect to Storage of Personal Data
In Europeans countires regulations regarding the storage of data are bery strict and complicated. There are problems regardign biometrics in particular. The PPPC on human genetics came up wwitha document regarding the rights of the individula in biometrics. The datada protection right of 1988 also gives rights to individuals regarding personal data storage.
In the US, the individual doenst have much privacy with regards to personal data.
Social Consequences of the release of Sensitive Data to Databases
Sensitive Data can lead to crime, theft, and other violations of ones rights. Sensitive data includes, social security, credit card infor or bank information, tax information, basically anythign that can lead to identity theft. It is very easy to find information on a person. One must be careful to release information that isnt to sensitive.
Thursday, April 8, 2010
Database Review Questions
7)What does it mean to sort a data file?
Sorting a data file refers to putting files in order according to a specefic trait, such as ordering them alphabetically.
8)How can a database be designed to reduce the likelihood of data-entry errors?
Data scrubbing can help get rid of any dirty data in databases.
9) Describe how record mathcing is used to obtain information about you.
record matching is a process in which two or more databases mathc information using common fleids to pull up other information on an individual. For example, if there were two databases and each had my social security number, they could math the number and pull up any information form each other regarding me.
10)Do we have a legal right to privacy? On what grounds?
YEs, the right to privacy is given to all individual from the constitution. The United States has expanded the idea of privacy to informatio processing.
11) Why are computers important in discusisions of invasion of privacy?
Computers can often offer access to databases and internet records to access information. Nowadays it is probably the most effective method of finding data and information, that is why it is essential to include computers in discussions regarding privacy.
Tuesday, April 6, 2010
ITGS Review Questions: Database
2)What is the difference between a file amamger and a database management system?
A database management system allows to more easily navigate through data. It is more effient, quick, and eay to use becasue it uses spreadshets and tables that are linked together to locate and organize files, unlike a file system.
3)Describe the structure of a simple database.
Each database is made up of tables, each record is basically a record. Each record is made up of fields containing information.
4)What is a query? GIve examples of kinds of questions that might be answered with a query.
A query is a request for any kind of information, usually asked on an internet search engine. There are many search engiens such as google, yahoo, bing,etc. A query can be virtually anything one wants to know. For example, looking up the information and reviews on a movie, or finding recipes or information on a program you are interested in.
5)What steps are involved in producing a standard multicolumn business report with a database?
One can design and program a spreadsheet to simply calculate and keep track of monthy sales and so on, all they have to do after designing the spreadhseet in the way they think is best fit, and programming certain cells to calculate, all they need to do is input information when they want to updatet eh report and allt eh numbers and calculations will automatically be doen on the spreadsheet without any extra effort.
6)What are the advantages of personal information management software over paper notebook organizers? What are the disadvantages?
Having personal information management software makes it easier to track through information because it is well organized and easy to search. Finding and entering information is a mroe effiecnet process, and you can easily share it with whoever you please. You can also keep it on a PDA, or phone and easily open and access it wherever you are.
Sunday, April 4, 2010
A weeks worth of ITGS vocab
A set of step-by-step instructions that, when completed, solves a problem. |
Instructions that tell the hardware what to do to transform input into output. |
Finding and correcting errors—bugs—in computer software. |
A translator program that translates an entire program from a high-level computer language before the program is run for the first time. |
A file allocated to noncontiguous clusters on a disk, thus degrading the disk’s performance. |
A user interface based on graphical displays. With a mouse, the user points to icons that represent files, folders, and disks. Documents are displayed in windows. The user selects commands from menus. |
An agreement allowing the use of a software program on a single machine. |
Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision making. |
A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage. |
Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs. |
Technology that collects information from computer users without their knowledge or consent. |
A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage. |
Wednesday, March 24, 2010
Softwware Basics
1) What is the relationship between aprogram adn an algorithm?
A program is a set of computer instructions designed to solve problems. An Algorithm is a set of detailed step by step nstructions, usually not in computer understandable code. An Algorithm can become part of a program by being translated into computer understandable language.
2)In what ways is writing instructions for a computer more ddifficult than writing instructions for a human?
A computer can only do what it is programmed to do and can only understand what it is programemd to understand. It must be given very specific and detailed instructions, every word fed to it must be well defined.
Wednesday, March 3, 2010
Online Study Guide Results
1.
Which of the following is an example of B2B e-commerce?
Your Answer:
Amazon.com buying books from Prentice-Hall Publishers
Correct.
2.
Which of the following is typically used in a B2E environment?
Your Answer:
Intranets
Correct.
3.
What does middleware software handle?
Your Answer:
intranet physical communications connections
Correct.
4.
Which of the following makes collaboration and teamwork within an organization easier to achieve?
Your Answer:
intranets
Correct.
5.
What is it when various companies can place orders with one another in a secure environment through the use of technology?
Your Answer:
Extranet
Correct.
6.
What is the preferred method for extranets due to the relative low cost and good security?
Your Answer:
VPN
Correct.
7.
Which of the following is NOT a feature of a customer-centered Web site?
Your Answer:
Small unchanging list of products
Correct.
8.
What type of database includes past purchase, customer preferences, service schedules, and customer communications?
Your Answer:
CRM
Correct.
9.
What can a company use to track potential purchases and the Web pages that users visit?
Your Answer:
Cookie
Correct.
10.
What does the U.S. tend to lean toward in regard to issues surrounding data privacy?
Your Answer:
Self-regulation
Correct.
11.
M-commerce typically involves connecting to the Internet with cell phones, PDAs, and laptop PCs.
Your Answer:
False
Correct Answer:
True
Review the "How E-Commerce is Transforming Business" section.
12.
Electronic payment systems, such as PayPal, allow people to make purchases from strangers without revealing their credit card numbers.
Your Answer:
True
Correct.
13.
Web hosting services are typically used by large companies due to their technical know-how.
Your Answer:
False
Correct.
14.
Typically codes of ethics should include a statement that tells how the company monitors or tracks user behavior on the Web site.
Your Answer:
True
Correct.
15.
B2C is the dominant form of e-commerce.
Your Answer:
True
Correct Answer:
False
Review the "E-Commerce Models" section. B2B is the dominant form, although B2C is the most visible to customers.
16.
The U.S. has stricter laws for dealing with data privacy than the European Union.
Your Answer:
False
Correct.
17.
The Children's Online Privacy Protection Act of 1998 (COPPA) requires parental consent for collection of information about children under 18.
Your Answer:
True
Correct Answer:
False
Review the "Ethical Issues of E-Commerce" section. The age is 13.
18.
Match each computer term with the correct definition.
Option
Your Answer:
18.1
C2C
A. 12-year-old selling his used bike to someone else through eBay
18.2
B2B
D. retail clothing store buying dresses from a designer
18.3
B2E
C. company posting a new health insurance option for employees
18.4
B2C
B. soon-to-be father buying "How to Raise a Child" book from an online bookseller
Tuesday, March 2, 2010
Discussion Questions
Numbers 1,3,6
1) Discuss why you beleive e commerce is importnat in today's business world? What impact does e commerce have on consumers?
E-commerce is importnat nowadays becasue it a is a major way for companies to and comsumers to interact in a faster, more productive manner. It allows for us to recieve more instant gratification in regards to customer service, support, and recieving the product itself.
3)Can you identify opportunities for using extranet . Discuss how your school could form a business alliance with its suppliers. How could it provide competitive advantage?
Creating a business alliance can help one gain competitive egde becasue they know have a sponsor of sorts to help fund any school activities in turn for advertising in the school on the company's behalf.
6)How important is privacy? Would you pay extra for an item you purchased in return for a guarantee to not sell info on your purchase to anyone else?
Privacy is very important to anyone when online. i would pay a little more to get the guarantee that they would nto share my information with others, because if the information was released and got intot he wrong heands, it could be misused, and could potentially result in identity theft. The company should give the guarantee to the customer in the first place without having to pay.
Wednesday, February 17, 2010
Review Questions 2/17
b) Describe the 3 forms of e-commerce
Tuesday, February 16, 2010
IB ITGS Exam Practice Questions
1) Two input devices that would be used in a pilot training computer simulation.
--> The input devices may be headphones so that you can hear the sounds that may be present if one was actually flying the plane, so one could also practice communicating via radio when flying the plane.
--> Other input devices may include controls like the ones found in a plabne so that the pilot cou;d practice using them before actually taking flight.
2) One advantage and one disadvantage of schools providing their students with USB drives.
--> Advantage: Students wouldn't have an excuse as to why they don't have their assignment, because the school proviuded them with a USB to ensure they had a means of storing the assignment. It would be easier on the students part to bring in the assignemtn they were asked to and share it with the teacher.
--> Disadvantege: Students may misuse the uSB and store personal items on it not related to school, and use up all the space, not leaving any room for possible school assignments. The personal items of the USB may be music, pictures, or anything that can distract them from shcool work.
ITGS words
-->
MIDDLEWARE: Connectivity software linking the client and server machines, providing easy access to information.
-->Middleware allows for information to be easily transferred between clietns and servers making it essential for online businesses to serve their clientelle.
E-BUSINESS: Electronic business, commonly referred to as "eBusiness" or "e-business", may be defined as the utilization of information and communication technologies in support of all the activities of business.
--> This can allow for businesses to reach more clientelle and allow clients to reach the busineses more easily for support and service.
E COMMERCE Commercial services to consumers and business partners on the Web site.
-->Same benefitsd as an e-business, more quick access to customer support, as well as a more effiecnt customer support system that allows for more productivity.
DOT-COMS: a company that does most of its business on the internet usually through a website that uses the popular top level domain ".com"
-->
MOBILE COMMERCE: A system in which which workers use laptops and wireless handheld devices to take their offices with them wherever they travel.
--> Allows for the
Thursday, February 11, 2010
ITGS Practice Questions
1) simulation: a rendition of a real event/place projected or presented with computer technology to allow an individual to expeirence somehting virtually, without the risks the may come with experiencing it in reality.
2) bandwidth: A term describing the capacity of a computer to download or upload information onto the internet or any network.
Answers:
1) Computer simulations are those programs based on models in order to imitate a certain scenario. Situations can be used in a wide spectrum of areas, including business, traffic, training,communalistic matters and the weather.
2) Bandwidth refers to the speed and capability of a connection (internet) to transfer a certian amoun to of data per unit of time. Most of the time the unit of time is seconds and the data is classified into ks (kbps). It also refers to the phycical measurements of the band through which connection cables pass.
Tuesday, January 19, 2010
Reveiw Questions page 379
The privacy of one can be protected becasue security methods will prevent unauthorized personel to access ones personal files or information. Sometimes in order to prevent computer crime, the rules made violate or threaten ones privacy.For example in order to prevent email servers from being hacked a law was passed allowing them to read user email.
11)What are smart weapons? How do they differ from conventional weapons? What are the advantages and risks of smart weapons?
Smart weapons are missiles that use computerized guidance systems to locate their targets. Whereas in normal missiles, they have to be aimed and shot, msart weapons can still be controlled after they are shot by a person who watches its path on a sreen and uses controls to direct it to the desired target. This allows for more accuracy when hitting a target, but it also lowers the amount fo time to make the life and death decisions. This can make errors go up, becasu epeople have less time toi think out whehter using the weapon is necessary or not.
Monday, January 18, 2010
Review Questions pg 379
- A coputer does whatever it is programmed to do. This allows for anyone with enough knowledge to try and reprogram computers for their own reasons.
-A computer can do only what it is programmed to do, so it cant protect itslef from malfunctions and any trespassing or attacks from hackers.
8) Describe several different computer security techniques, and explain the purpose of each.
Biometrics: this and other physical access restircitiona allow only authorized individuals to access computers and information with fingerprints, faial recognition, iris scans, etc.
Passwords: These are words used to restrict unauthorized eprsonal fromaccessin accoutns and computers. Each individual comes up witht heri own personal password to keep others out.
Firewalls: "gates with locks" that guard against unauthorized access to an internal network.
Encryption: softawre used to scramble transmissions between computers so others cnanot read them.
Wednesday, January 13, 2010
Summary of Computer Security and Risks
Technology Notes
Security measures:
· Smart badge/Active badge: microprocessor controlled badges broadcast infrared identification codes every 15 seconds, which are picked up by networks transmitted to a badge receiver database that is constantly updated.
· These badges are used to
o IDENTIFY: it can be used to identify authorized employees and allow them entrance into buildings and access to files on computers.
o FIND: Employees can locate each others using computers and their badges.
o REMEMBER: One can at the end of the say see everywhere they went and to whom they communicated with by using their badges.
· Conferences use badges to help people meet each other. The badges have information on each person’s history and hobbies so they can find people with similar interests.
Justice on the Electronic frontier
· As computer crimes have increased, governments have created laws to prevent crimes and serve justice to those who violate them.
· Many hackers are punished for their crimes while some go unnoticed. Sometimes those that are found are unpunished because there was no solid law t the time preventing them from committing the crime, or it is argued that the government is violating their rights
· Man questions are raised over whether civil liberties relate to the electronic world and where the lines should be drawn.
· Laws such as the Telecommunications act, The Digital Millennium Copyright Act and Communications Decency Act have been passed to define the civil liberties and laws on the digital world.
· Although these laws were created to raise order in the digital world, they have sparked controversy over the rights of the people in this world of rapid technological change.
Security and Reliability
· Some of the issues with security are not related to crime, they have more to do with whether a computer system is reliable and can handle or prevent glitches and bugs
· There are more often software glitches than hardware problems.
Review Questions pg 379
Computer crime is very common and it can often be commited and undetected. The crimes that are detected are not always reported becasue companies who fall victim to the crime dont reveal it to keep their reputations. With these conditions its clear that the numebrs availabe surrounding the amount of copmuter crime is much less than the actual amount of crime.
4)What is the most common computer crime? WHo commits it? What is being done to prevent it?
Theft is the most common computer crime. People use computers to steal a persons goods information, resources, identity and even a persons computer itself. It can be commited by anyone who knows their way around acomputer. There is no specific age group or type of person who commits it. Spammer and hackers would be the most skilled in commiting digital theft crimes. In order to rpevent theft on computers. There are certain security measures taken, including passwords, firewalls, etc.
Tuesday, January 5, 2010
Homwork 1/5/10
Monday, January 4, 2010
Impact of Social Networks on Communication
Facebook: Allows users to send messages, publicly or privately, share links and photos, and update statuses to show what they are doing or make announcements.
Myspace: Just like facebook, allows users to share various photos, links, messages, and announcements. As well as to network and communicate with each other.
Twiter: Allows users to update their friends on what they are doing or make announcements via "tweets"
2. Explain the impact of these networking sites in three different areas.
Business and Employment: Allows for individulas to find jobs or for employers to find employess. also allows for the employers and employees to communicate efficiently.
Education: Allows for students to network and find people they can interview for various projects or whn conductiing research. Allows for teachers to communicate school related messages to their students.
Politica dn Governments: Politicians can use their networking sites to help campaign and keept heir audeince updated.
3. Consider the advantages and disadvantages of networking as pertaining to 3 social/ethical issues.
Key Terms
Networks can be useful in communicating with others and sharing or accessing information, however, there are issues that may arise with networks. Privacy and Security come into question because being connected to other computers means they can steal or access personal information, Computers that aren’t connected to certain networks cannot attain all the information that computers that are a apart oft he network can.
Areas of Impact: Business and Employment, networks can be useful in "networking", allowing people to find jobs and employees.
· Wireless Network: A network in which a node has a tiny radio or infrared transmitter connected to its network port so it can send and receive data through the air rather than through cables.
This can allow for easier connection to networks, allowing for more to access or become a part of networks that are further or larger. It lowers the issues of equality of access.
Areas of Impact: Business and Employment: Can allow for easier job searching, can allow employees to communicate. Education: students and teachers are given access to more information.
· Ethernet: A popular networking architecture developed in 1976 at Xerox.
WiFi: A popular wireless LAN technology that allows multiple computers to connect to a LAN through a base station up to 150 feet away. Often referred to as 802.11b.
Wireless Access Point: is a device that allows wireless communication devices to connect to a wireless network using Wi-Fi
This technology allows for people to easily access the internet no matter where they are, if the area has a wireless access point for WiFi. It lowers issues of equality of access and allows people to work wherever they may be. They can search for any information necessary via internet at various locations.
Areas of Impact: Education-students can work on assignments and conduct research when they’re not necessarily at school or at home. Entertainment and Leisure- People may entertain themselves via internet wherever they are.
· Node: A component of a network.
Communications Media: How Nodes are linked.
Client: Any part of the network that receives data
Host: Any part of a network that gives or provides data.
Servers: Any tool that offers a lot of users access to various networks
These components make up the network system, be it a LAN, WAN, or MAN. Network systems allow communication and globalization because they make information easy to share. One can access reliable information from experts of a field by communicating with them via networks, in some networks the hosts and clients work both jobs, so everyone can share files.
Areas of Impact: leisure and Entertainment- People share music and movies in networks for entertainment. Science-People share ideas and conduct research using this technology.
· Network Interface Card: A card you can add to your computer that helps one to a connect to various networks.
This allows more access to people and since it is inside the computer, it allows one to access networks anywhere, making sending messages to others and researching a snap form any location. This can make the gap between people and machines smaller because people may start to depend on technology too much and wont be able to survive without it.
Areas of Impact: Education-Students can research wherever they are. Business- Employees and Employers can attend meetings from any location.
· Protocol: How data is sent, formatted, received
Topology: Design Layout (physical and logical)
These are responsible for the format and look of a website, which can determine how understandable and effective a website is. This can affect who will understand and can access the website.
Areas of Interaction: Business and Employment: The design of a website or online business can affect who will visits the website and whose attention it will catch.
· LAN: Multiple personal computers connected on a network.
MAN: A service that links two or more LANs within a city
WAN: A network that extends over a long distance. Each network site is a node on the network.
FiberOptic Cable: a cable made of optical fibers that can transmit large amounts of information at the speed of light.
These are networks that help computers connect to communicate and share information. WANs allow the largest networks and one can connect to them wirelessly. LANs are sometimes connected via fiber optic cables. These networks cant always be reliable, due to connection issues, and the information gathered from it, such as the info from the internet is not always the most reliable. Being connected to a network also brings up security issues, because a computer can access the information of other computers in the same network.
Areas of Interaction: Science: Research information can be shared. Politics and Government: Politicians can use networks to network for campaigns and keep their followers
· Access: Physical proximity to a person, or knowledge about that person, a common theme in privacy discussions.
· SPAM: Internet junk mail.
Phishing: The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.
These are possible scams that one can run into on the internet, especially when dealing with emails. It brings up serious security and privacy issues, because companies and online scammers can gather important information and possibly steal the identities of people attached to a network.
Areas of Interaction: Entertainment and Leisure: affects people who use email for entertainment or any other reason. Business: People can lose their financial information to others who will abuse it.
· Login: A one-word name that you type to identify yourself when connecting—logging in—to a secure computer system, network, or email account. Sometimes called login name or alias.
Password: The most common security tools used to restrict access to computer systems
Firewall: a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet
These are very important precautions that decrease the chances of privacy and security issues when dealing on networks.
Areas of Interaction: Education: Students can keep their identities safe on the internet and be safe from inappropriate or potentially dangerous websites.
· VPN:A network that uses encryption software to create secure “tunnels” through the public Internet or between intranets; a method an organization can use to set up an extranet.
· UPS:A hardware device that protects computers from data loss during power failures.
Increases reliability on this technology because people are less likely to lose their work or have their intellectual property stolen or lost,
· Blog: Short for Web log, a personal Web page that often carries diary-like entries or political commentaries. Blogs are fast proliferating as new software allows users to create Web pages without having to learn the technical details of HTML and Web authoring.
This allows for people to publish their ideas and thoughts online and allows others to read each other’s ideas. This is very helpful, and it attributes to globalization through the spread of cultures and ideas everywhere.
Areas of Interaction: Education: Individuals can learn to be more open-minded and global by learning of others ideas and how to post their own ideas without offending any culture.
· GPS: A defense department system with 24 satellites that can pinpoint any location on the Earth.
Very helpful in finding your way around an area and learning about places, however, it can cause people and machine issues, because people can become too dependent on technology and lose their sense of direction.
· Internet Telephony: combination of software and hardware technology that enables the Internet to, in effect, serve as a telephone network. Internet telephony systems can use standard telephones, computers, or both to send and receive voice messages.
· Video Teleconference: Face-to-face communication over long distances using video and computer technology.
· NOS: Server operating system software for a local-area network.
· Asynchronous Communication: Delayed communication, such as that used for newsgroups and mailing lists, where the sender and the recipients don’t have to be logged in at the same time.
Real TIme Communication: Internet communication that enables you to communicate with other users who are logged on at the same time.
Chat Room: Public real-time teleconference
IM: A technology that enables users to create buddy lists, check for buddies who are logged in, and exchange typed messages and files with those who are.
All these allow for individuals to communicate, some in real time, and others with delayed response. Either way, this allows for people to meet each other and handle any issues of just have a chat. Can breach ones privacy because they might reveal too much information to a stranger. Promotes globalization because it allows people to connect and share ideas.