Wednesday, March 23, 2011

10 different top-level domains


  1. (.edu) Educational sites

  2. (.com) Commercial sites

  3. (.gov) Government sites

  4. (.mil) Military sites

  5. (.net) Network Administration sites

  6. (.org) Nonprofit organizations

  7. (.aero) Air transport organizations

  8. (.biz) Businesses

  9. (.coop) Cooperative business such as credit unions

  10. (.info) Information services

Monday, March 21, 2011

Chapter 9: The Evolving Internet Review Questions

2. Why is it hard to determine how big the Internet is today? Give several reasons.
  • The Internet is growing much too rapidly for it to be tracked.
  • There is no "Internet Central" that keeps track of user activity or network connections.
  • Different types of connections to the Internet results in different degrees of interactivity, thus it is difficult to know what it means to "belong to the Internet".
3. Why are TCP/IP protocols so important to the functioning of the Internet? What do they do?
  • TCP/IP are practically the "language" of the Internet that allow cross-network communication for nearly any computer and network. It defines how information transfers between machines and how machines on network are defined by IP addresses or unique addresses.
4. How does the type of Internet connection influence the things you can do on the Internet?
Depending on the Internet connection, it can be much faster than others and more content streaming with higher bandwidth.

6. What do email addresses and URLs have in common?
  • They both use the same domain-naming scheme.
7. Briefly describe several software tools that can be used to develop Web pages.
  • Macromedia Dreamweaver, Adobe Golive, and Microsoft Frontpage are some web authoring software that make it easy to develop Web pages. Basically one lays out text and graphics in the way desired and the software will create an HTML document that looks similar to the original layout when seen on a Web browser. They are good for automating repetitive edits, apply formatting styles across pages, and check for bad links.
9. Why is file compression on the Internet important?
  • This is because it makes files smaller so that they may be downloaded and played faster.
11. How does push technology differ from standard Web page delivery techniques? How is it used?
  • With push technology you subscribe to the updates and information desired and the server delivers it periodically. It is used for company intranets but is increasingly used for the most trivial things such as weather updates.
12. What new services are available as a result of the commercialization of the Internet? What new problems are arising as a result of that commercialization?
  • Such new services for example are: the viewing of weather patterns, book flights, buy stocks, sell cars, track deliveries, listen to radio broadcasts, conduct video conferences, organize disaster recovery programs and do countless other functions.
  • Such new problems are: spam scams, get rich-quick hoaxes, online credit card thefts, email forgery, child pornography, illegal gambling, online stalking and other condemned acts.

Wednesday, March 16, 2011

Discussion Question 3/16/11

Suppose you have an important message to send to a friend in another city, and you can use the telephone, email, real-time teleconference, fax, or overnight mail service. Discuss the advantages and disadvantages of each. See if you can think of a situation for each of the five options in which that particular option is the most appropriate choice.

The advantages of the telephone would be that its the closest to actual seeing your friend face to face. Also, instead of typing you can express yourself in which you can't always do so with a keyboard. A disadvantage could be that if your friend lives far enough the time zone may be different and not convenient for either yourself or your friend. While with email you can email your friend anytime though you might not get a reply right away. Also, there isa chance that your computer may not be working or even your Internet. Real time conferencing is very nice because you can both talk as if on a telephone and actually see the person as if they are actually there.

Monday, March 14, 2011

Chapter 8: Networking and Digital Communication: Reading and RQs

2. Give three reasons for the importance of computer networking.
  • Networks let people to share computer hardware resources, reducing costs, and making it possible for more people to take better advantage of powerful computer equipment.
  • Networks let people to share data and software programs, increasing efficiency and productivity.
  • Networks let people to work together in ways that are otherwise difficult or impossible.
5. Under what circumstances is a modem necessary f0r connecting computers in networks? What does the modem do?
  • When one uses the telephone network to to connect remote computers. The modem connects a computer to a telephone line.
6. Describe least two different kinds of communication software.
  • Network Operating System(NOS)- for those who work exclusively on local area networks. It shields the user from the hardware and software details of routine communication between machines.
  • Terminal emulation software- this is outside of LAN. It lets a computer function as a character-based terminal - a simple input and output device for sending messages to and receiving messages from the host computer.
8. What are the differences between email and instant messaging systems?
  • Mailing lists and newsgroups use asynchronous communication while instant messaging uses real-time communication.
9. Describe some things you can do with email that you cannot do with regular mail.
  • One thing is that you can send your mail instantly and receive it instantly, while with regular mail you have to deliver your mail to the post office or mail box and the least amount of time it takes for you to receive it or for the recipient to receive it is one day. Another thing is that on email you can attach files but with regular mail you cannot. Attaching files is a lot easier than having to print out the document you wish to send.
10. Describe several potential problems associated with email and teleconferencing.
  • Well one thing could be spam because it slows you down and sometimes can cause viruses on your computer. Also, these are easy to hack into and if someone displays too much personal information, it could lead to identity theft.
11. "Money is just another form of information." explain this statement and describe how it relates to communication technology.
  • This statement is basically inferring that in the technological world money is just information shared or retrieved or what not. It relates to communication technology because for example nowadays people can easily check their account balances from their mobile phones in which they are communicating with their bank. Also, for business purposes, people can communicate through groupware or even email on budget updates and commerce increases.
12. Wi-fi and Bluetooth wireless technologies are designed to serve different purposes than mobile phone technology does. Explain this statement.
  • Well this statement much sums up that these technologies each have different purposes. Wi-fi's purpose is to connect wireless handheld computers and devices. While the purpose of Bluetooth is to overcome the differences between mobile phones, handheld computers and PCs so that they can all communicate with each other regardless of the operating system.

Wednesday, March 9, 2011

Database Article Link

FBI turns up faster, more accurate fingerprint identification system

FBI system lays groundwork for future biometrics such as latent palm prints and facial recognition

Monday, March 7, 2011

Tomorrow's Technology and You Eighth Edition:Chapter 7: Reading and RQs

Read pg.224-232 4RQs
2.What is the difference between a file manager and a database-manager system? How are they similar?
  • A file manager is a program that enables users to work with one file at a time. However, a true database-management system(DBMS) is a program or system of programs that can manipulate data in a large collection of files. They are similar in that they can both are sufficient for mailing lists and other common data management applications.
3. Describe the structure of a simple database. Use the terms file, record, and field in your description.
  • A database is structured with many data files in which these files are made up of one or more tables; it keeps the information together the way a folder in a file cabinet does. Then a database table is a collection of records. A record is the information related to one person, product or event. For instance, in a library's card catalog database, a record contains information on exactly one person. Then these records are further divided into fields. A field contains a discrete, specific piece of information in a record. For example, in a library's card catalog database a field could be title, author, date, etc...
4. What is a query? Give examples of the kinds of questions that might be answered with a query.
  • A query is an information request in database terminology. A query could be a search for a specific record or a request to select all records that match a certain criteria such as animals that are cold-blooded or amphibians with teeth .
7. What does it mean to sort a data file?
  • To sort a data file means using a command to that lets you arrange records in alphabetic or numeric order based on values in files.
Read p.237-245 4RQs

6. What are the advantages of personal information management software over paper notebook organizers? What are the disadvantages?
  • The advantages are that they are easier to understand and easier to use than regular database programs. Also, they are faster and more flexible than notebook organizers. They are good for people on the go especially with notebook or handheld computers. Some disadvantages may be if the user has a hard time using software and particularly does not know how to use it. If one does not have a cell phone or computer well than they would be no need for it.
8. How can a database be designed to reduce the likelihood of data-entry errors?
  • A database can be designed to reduce a likelihood of errors by reducing the number of changes. To do this one should use a relational database program because changes in one table are reflected in other tables automatically.
10. Do we have a legal right to privacy? On what grounds?
  • Legally, the U.S Supreme Court decisions have recognized a right to privacy is implied by other constitutional guarantees though it is not specifically mentioned.
11. Why are computers important in discussions of invasion of privacy?
  • This is due to the fact that in today's world everything we do on the computer and Internet are stored in databases.