Sunday, April 18, 2010

Week 14: Clear


This weeks topic was fairly interesting. I am really into corporation and talking about enterprise computing really had me going on this. In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization. A live mirror is automatically updated as soon as the original is changed. Striped set with distributed parity or interleave parity requiring 3 or more disks. Distributed parity requires all drives but one to be present to operate; drive failure requires replacement, but the array is not destroyed by a single drive failure. Upon drive failure, any subsequent reads can be calculated from the distributed parity such that the drive failure is masked from the end user. The array will have data loss in the event of a second drive failure and is vulnerable until the data that was on the failed drive is rebuilt onto a replacement drive. A single drive failure in the set will result in reduced performance of the entire set until the failed drive has been replaced and rebuilt.

an enterprise storage is the computer storage designed for large-scale, high-technology environments of the modern enterprises. When comparing to the consumer storage, it has higher scalability, higher reliability, better fault tolerance, and much higher initial price. A Storage Area Network can best be thought of as a large pooled storage bucket. As servers or applications require more, the storage is allocated as necessary. A SAN centralizes and shares storage for multiple application servers, and optimizes file serving for end users. Each server participates in sharing the underlying storage resources, but the allocations are dedicated to the individual server or application on a server. This allows the organization to manage storage at a more granular level as well as provide a way to provision storage as needed, rather in large blocks to dedicated server like a traditional direct-attached RAID array.

http://www.hp.com/sbso/productivity/howto/san/components.html
http://en.wikipedia.org/wiki/Enterprise_storage
http://en.wikipedia.org/wiki/RAID#RAID_5

Secure E-mail




I didn't find a particular company that used a secure e-mail but I did find articles about banks using secure e mail data protection steps. The article is pretty much about how the banking business does so many transactions and activities online that it makes perfect sense for them to use a secure e-mail system. Or just any sort of security measurements that help protect data. The article talks about if data isn't secure then we can have viruses. Viruses are a major email security hazard that companies simply cannot afford to ignore. Over 11,000 different computer viruses exist to date and some 300 new ones are created each month. Their effects range from negligible to bothersome to destructive. The article also talks about information leaking, various studies have shown how employees use email to send out confidential corporate information. Be it because they are disgruntled and revengeful, or because they fail to realize the potentially harmful impact of such a practice, employees use email to share sensitive data that was officially intended to remain in-house. And one more important thing spam. About 90 per cent of email users receive spam - or unsolicited commercial mail - at least once a week, a survey conducted by the Gartner Group shows. The research results, issued in June 1999, revealed that almost half those surveyed were spammed six or more times a week. The study surveyed 13,000 email users. Banks do a lot of things via e-mail including reaching the customer, bill paying, checking balances, etc. And if the customer sees this kind of stuff they will be turned off and maybe just maybe move to another bank.

http://www.safetysend.com/secure_email.htm

Sunday, April 11, 2010

Week 13: Clear

This was one of more interesting lectures. It talked about what is the right way to use a computer. Or in other words the lawful way to use the computer and the information shared on the internet. A lot of us think since there is so much information available on the internet we are free to use without giving credit to the rightful owner. Well thats not how it works. We have to give them credit. Other wise we are ethically wrong and are totally working against privacy. I also liked the part about why people create viruses and worms. I never really understood why they did it.



Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

Ethics, in the classical sense, refers to the rules and standards governing the conduct of an individual with others. As technology and computers became more and more a part of our everyday lives, we must understand that the problems that have always plagued business and conduct will continue to be a problem. In fact, a new medium can provide even more difficult questions of judgement. In other words, since the introduction of the World Wide Web, the definition of ethics has evolved, too. A new type of ethics known as computer ethics has emerged. Computer ethics is concerned with standards of conduct as they pertain to computers.



Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive.

http://privacy.org/
http://library.thinkquest.org/26658/
http://www.library.ucsb.edu/istl/02-fall/internet.html

Sunday, April 4, 2010

VOIP

My experience with VoIP has always been a positive one. My family and I are very familiar with skype because our family lives across the globe so it's a very effective way to keep in touch and see everyone on a fairly regular basis, not to mention, it's free! It's nice because we are able to see what people are doing, and hear their voices at the same time which makes you feel as if you were there with them. Other than skype, to keep in touch I've also used AIM chat which is another form of VoIP which I find to be more convenient with friends since most of my friends have AIM. However, I feel like when I used Jing, I was having problems recording the video because even though I skyped with my mom for a bit, only about 30 seconds showed up and the quality shown on the Jing link is less than average, freezing up often and with bad sound quality even though the actual video call on skype itself went smoothly. However, I noticed that Jing does a good job with efficiently recording actions being done on a computer. I would say that my experience with Skype was great, as usual, but I'm not too sure about Jing.

http://www.screencast.com/users/hsmbb/folders/Jing/media/0cd5fb00-87ea-4eb5-96f5-f5a6da4e0d43

VOIP

My experience with VoIP has always been a positive one. My family and I are very familiar with skype because our family lives across the globe so it's a very effective way to keep in touch and see everyone on a fairly regular basis, not to mention, it's free! It's nice because we are able to see what people are doing, and hear their voices at the same time which makes you feel as if you were there with them. Other than skype, to keep in touch I've also used AIM chat which is another form of VoIP which I find to be more convenient with friends since most of my friends have AIM. However, I feel like when I used Jing, I was having problems recording the video because even though I skyped with my mom for a bit, only about 30 seconds showed up and the quality shown on the Jing link is less than average, freezing up often and with bad sound quality even though the actual video call on skype itself went smoothly. However, I noticed that Jing does a good job with efficiently recording actions being done on a computer. I would say that my experience with Skype was great, as usual, but I'm not too sure about Jing.

http://www.screencast.com/users/hsmbb/folders/Jing/media/0cd5fb00-87ea-4eb5-96f5-f5a6da4e0d43

Microsoft Access Project



This project was perhaps the most time consuming and troubling. It was really hard to do. I got confused in a lot of parts. But I really liked learning the part where you can import data in pretty much any format in to the database. You can share data between Access and Excel in many ways. You can copy data from an open worksheet and paste it into an Access datasheet, import a worksheet into an Access database, or simply load an Access datasheet into Excel using the Analyze it with Excel command. This topic explains in detail how to exchange data between Access and Excel by importing, exporting, or linking to data. I really liked the part where you had to create tables. I enjoyed that a lot and really learned a lot of new stuff. When you create a database, you store your data in tables — subject-based lists that contain rows and columns. For instance, you can create a Contacts table to store a list of names, addresses, and telephone numbers, or a Products table to store information about products. Because other database objects (database objects: An Access database contains objects such as tables, queries, forms, reports, pages, macros, and modules. An Access project contains objects such as forms, reports, pages, macros, and modules.) depend so heavily on tables, you should always start your design of a database by creating all of its tables and then creating any other objects. Before you create tables, carefully consider your requirements and determine all the tables that you need.

Sunday, March 28, 2010

My Avatar



For my first attempt at creating an avatar I used the 'Build your wild self' program in which I had to create a realistic looking avatar and then added animal features. However, I did not like this program because I wanted to make an avatar that was simply a realistic version of myself. This led me to use the program 'Face your Manga.' On this program I just had to go through a series of option tabs where I picked out specific features that were similar to my face to make an avatar that looked like me. It was very straightforward and easy to do and in the end, I was able to make a realistic avatar, just like I wanted!

Week 11: Clear



I really enjoyed this weeks lecture. It just seemed to me its the 'in' thing right now. Database management is huge in technology world or even in computer world. A database management system is a suite of software applications that together make it possible for people or businesses to store, modify, and extract information from a database. Sound like something found only in bank vaults? It's not. You can find database management systems many places in your everyday life. That ATM that you get cash out of every week is a database management system. When you make flight reservations online, you're providing information that is entered into a database management system. Even the library that you or your children check out books from runs on a database management system.

On a more personal level, your personal computer can have its own database management system. You might have spreadsheets that contain mountains of data. Any time you fill up a spreadsheet with data and run queries to find and analyze data in different ways, you are accessing a database management system. And how do you view the data that is the result of a query? By looking at a report. Most database management systems have a reporting function that is the last step in the data manipulation process. After all, collating the data without looking at it won't get you very far.

One of the main functions of the database management system is doing the heavy lifting for you. In other words, you don't necessarily have to know exactly where all that data is in the system; as long as the database management system knows where it all is, it can deliver a report for you to peruse. This might not seem to matter if you're thinking of just your computer; but throw in a mainframe that contains reams and reams of data, and we're talking about a huge amount of information that can be stored any number of places within the mainframe system. The result is the same, though: a report that you can read, analyze, and act on. This functionality also extends to a multi-user database. Such a database management system under this scenario would allow you as one user to operate all functions within the database without having to know what other users are accessing the same database. One popular example of this kind of multi-user database is Microsoft SQL Server.



The database community has developed a series of guidelines for ensuring that databases are normalized. These are referred to as normal forms and are numbered from one (the lowest form of normalization, referred to as first normal form or 1NF) through five (fifth normal form or 5NF). In practical applications, you'll often see 1NF, 2NF, and 3NF along with the occasional 4NF. Fifth normal form is very rarely seen and won't be discussed in this article. It's important to point out that they are guidelines and guidelines only. Occasionally, it becomes necessary to stray from them to meet practical business requirements. However, when variations take place, it's extremely important to evaluate any possible ramifications they could have on your system and account for possible inconsistencies.

http://databases.about.com/od/specificproducts/a/normalization.htm
http://philip.greenspun.com/panda/databases-choosing
http://databases.about.com/od/administration/g/dbms.htm

Sunday, March 21, 2010

Week 10: Clear

Communications and networks, sounds boring..right? But its because of those two 'things' that connect us with the entire world. Those are why I am able to write this blog, go on Facebook, Twitter, ESPN, check me e-mail and so many other things. There are a lot of niche and glitches in order for network to get communication from the outside world. Its not as easy as 1,2,3. Nothing really is in the computer world. We have communication concepts which include protocols and networks. We have TCPIP which invloves static addressing. LANs and WANs are different types of network. Then we have communication apps like email. And finally network servers.



We can define a protocol as set of rules. So communication protocol is a set of rules which are used for communication. for example when we log on to MSN Messenger and we do chat with our friends then this is communication between us and protocols which are used for this are known as communication protocols. Now we can define communication protocol as a set of rules which enable commuhttp://www.blogger.com/img/blank.gifnication between two or more than two users in the form of voice, video and messaging. TCPIP is a communication protocol. Transmission Control Protocol is used to control the data exchanged between two ends these ends can be computers or any other device. It is guaranteed that data will be reached on the destination in the form in which it was sent from the source. Similarly SSL, USB are also known as communication protocols.

A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link. Typically, connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). Usually, the server has applications and data storage that are shared in common by multiple computer users. A local area network may serve as few as two or three users (for example, in a home network) or as many as thousands of users (for example, in an FDDI network).



A wide area network (WAN) is a geographically dispersed telecommunications network. The term distinguishes a broader telecommunication structure from a local area network (LAN). A wide area network may be privately owned or rented, but the term usually connotes the inclusion of public (shared user) networks. An intermediate form of network in terms of geography is a metropolitan area network (MAN).



A network server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet.

Network servers typically are configured with additional processing, memory and storage capacity to handle the load of servicing clients. Common types of network servers include:

- Web servers
- proxy servers
- FTP serv
ers
- online game servers

Numerous systems use this client / server networking model including Web sites and email services. An alternative model, peer-to-peer networking enables all computers to act as either a server or client as needed.

http://compnetworking.about.com/od/basicnetworkingconcepts/g/network_servers.htm
http://www.yale.edu/pclt/COMM/TCPIP.HTM
http://compnetworking.about.com/cs/lanvlanwan/g/bldef_lan.htm
http://compnetworking.about.com/cs/lanvlanwan/g/bldef_wan.htm

Saturday, March 20, 2010

Excel Project

This project really brought that best out of me, it really got me involved. I think Excel is the most powerful program on the computer. If it is used right. It can do so much right in itself. Its perfect for the business world. I really enjoyed doing this project and learning a lot of new things. I didn't even know pivot tables existed, this was the first time i heard of them. I find excel very helpful, just not in the business world but also in everyday life. Excel can get as simple as 1,2,3 it can get as complex as statistics and what if formulas. You have to pay attention and look at everything in excel, it just doesn't come to you.



There were a few parts where I got stuck and had to watch the lecture videos again. But in the end all the information I gathered and learned were all worth it. It was not like this project something I was forcing myself to do, I really wanted to do it. Excel jjust has that persona to it and it gets me every time. Everyone needs to at least learn the basis of Excel. It comes in handy for everything. Another intriguing part to this project was learning the what if function. There is so much you can do with Excel, I hope Microsoft keeps upgrading this wonderful program every year.

Sunday, March 7, 2010

Week 8: Clear



Excel is an electronic spreadsheet program that can be used for storing, organizing and manipulating data.

When you look at the Excel screen (refer to the example on this page) you see a rectangular table or grid of rows and columns. The horizontal rows are identified by numbers and the vertical columns with letters of the alphabet. For columns beyond 26, columns are identified by two or more letters such as AA, AB, AC.

The intersection point between a column and a row is a small rectangular box known as a cell. A cell is the basic unit for storing data in the spreadsheet. Because an Excel spreadsheet contains thousands of these cells, each is given a cell reference or address to identify it.

The cell reference is a combination of the column letter and the row number such as A3, B6, AA345.

Data Types, Formulas, and Functions

The types of data that a cell can hold include numbers, text or formulas. Just as in math class, formulas are used for calculations รข€“ usually involving data contained in other cells. Excel and other electronic spreadsheets include a number of built in formulas used for common tasks known as functions.

Excel and Financial Data

Spreadsheets are often used to store financial data. Formulas and functions that are used on this type of data include:

- Performing basic mathematical operations such as summing columns and rows of figures.
- Finding values such as profit or loss.
- Calculating repayment plans for loans or mortgages.
- Finding the average, maximum, or minimum values in a specified range of data.



Excel's Other Uses

Other common operations that Excel can be used for include:

- graphing or charting data to assist users in identifying data trends.
- sorting and filtering data to find specific information.

The information garnered in a spreadsheet can easily be incorporated into electronic presentations, web pages, or printed off in report form. Excel is a specialized program that manages numbers in various ways. It uses spreadsheets and data to process a large amount of numbers. One enters the data, or numbers, and the program calculates the numbrs in the manner you designate in the program.

http://wiki.answers.com/Q/What_is_excel_on_computers
http://en.wikipedia.org/wiki/Microsoft_Excel

Sunday, February 21, 2010

Week 7: Clear





Computer Software, many people think its nothing. Its just a small 'thing' in your computer. BREAKING NEWS! Without software you computer is just a collection of expensive computer parts.

The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.

An operating system is a program designed to run other programs on a computer. A computer’s operating system is its most important program. It is considered the backbone of a computer, managing both software and hardware resources. Operating systems are responsible for everything from the control and allocation of memory to recognizing input from external devices and transmitting output to computer displays. They also manage files on computer hard drives and control peripherals, like printers and scanners.

For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.

Operating systems can be classified as follows:
- multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
- multiprocessing : Supports running a program on more than one CPU.
- multitasking : Allows more than one program to run concurrently.
- multithreading : Allows different parts of a single program to run concurrently.
-real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.

Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications
you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.

As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.

http://www.wisegeek.com/what-is-an-operating-system.htm
http://www.howstuffworks.com/operating-system.htm

Sunday, February 14, 2010

Week 6: Clear



This weeks lecture which was combined with last weeks was long and very enduring. It was a lot of information to grasp. But I did understand some of the information. And those topics included memory and flash storage.

What is memory? How does it work? Although memory is technically any form of electronic storage, it is used most often to identify fast, temporary forms of storage. If your computer's CPU had to constantly access the hard drive to retrieve every piece of data it needs, it would operate very slowly. When the information is kept in memory, the CPU can access it much more quickly. Most forms of memory are intended to store data temporarily. All of the components in your computer, such as the CPU, the hard drive and the operating system, work together as a team, and memory is one of the most essential parts of this team. From the moment you turn your computer on until the time you shut it down, your CPU is constantly using memory. Fast, powerful CPUs need quick and easy access to large amounts of data in order to maximize their performance. If the CPU cannot get to the data it needs, it literally stops and waits for it. Modern CPUs running at speeds of about 1 gigahertz can consume massive amounts of data -- potentially billions of bytes per second. The problem that computer designers face is that memory that can keep up with a 1-gigahertz CPU is extremely expensive.



Flash storage, sounds fancy doesn't it? Flash memory is a non-volatile computer storage that can be electrically erased and reprogrammed. It is a technology that is primarily used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products. It is a specific type of EEPROM (Electrically Erasable Programmable Read-Only Memory) that is erased and programmed in large blocks; in early flash the entire chip had to be erased at once. Flash memory costs far less than byte-programmable EEPROM and therefore has become the dominant technology wherever a significant amount of non-volatile, solid state storage is needed. Example applications include PDAs (personal digital assistants), laptop computers, digital audio players, digital cameras and mobile phones. It has also gained popularity in console video game hardware, where it is often used instead of EEPROMs or battery-powered static RAM (SRAM) for game save data. Since flash memory is non-volatile, no power is needed to maintain the information stored in the chip. In addition, flash memory offers fast read access times (although not as fast as volatile DRAM memory used for main memory in PCs) and better kinetic shock resistance than hard disks. These characteristics explain the popularity of flash memory in portable devices. Another feature of flash memory is that when packaged in a "memory card," it is extremely durable, being able to withstand intense pressure, extremes of temperature, and even immersion in water.

http://www.forbes.com/2009/10/21/flash-emc-seagate-technology-cio-network-storage.html
http://www.howstuffworks.com/computer-memory.htm
http://www.wisegeek.com/what-is-computer-memory.htm

Web 2.0 Tools



This project was fairly confusing to me in the beginning. I mean like I got it but it was too much and that discouraged me. But with a help of a friend it all turned out good. I really liked this project. It brought a lot out of me. I could say whatever and use whatever I wanted as long as it looked presentable and professional. Playing with different tools was also very interesting and got me thinking like wow, there are a lot of tools out there that can help me with a lot. I talked about my family and I moving to the United States of America. I shared why we choose to move here, about my family, and how things are now. I hope this presentation tells everyone a story of my life, a very important story. I really liked one true media tools. They were easy to understand and doable. Enjoy and please comment.

Sunday, February 7, 2010

Week 5: Muddy




The computer, one of the most important things to have in today's world. Computers do everything and it is really important everyone has one, depending on the financial situation. One of the reasons why I found this weeks lesson muddy was because there was so much that was covered. It was a lot of information to understand, especially for someone who doesn't go into the very deep of computers. One of the hardest sections for me were the processor. Pipelining was fairly difficult to understand, maybe because I've never heard that in the computer world. It was also hard for me to understand RSI. Again I think it was because there was too much information to grasp.

I found a few websites where they had video tutorials on how everything computer related works. They went in depth and the videos were not that long. And at the end of each video tutorial they had a mini quiz. They didn't have small points on hardware or input/output storage. They went into details. I understood the websites lectures better because I learn with more words written on a power point. The class lectures were mostly the instructor talking.

Our PC is a system, consisting of many components. Some of those components, like Windows XP, and all your other programs, are software. The stuff you can actually see and touch, and would likely break if you threw it out a fifth-story window, is hardware. The system unit is the actual computer; everything else is called a peripheral device. Your computer's system unit probably has at least one floppy disk drive, and one CD or DVD drive, into which you can insert floppy disks and CDs. There's another disk drive, called the hard disk inside the system unit. The floppy drive and CD drive are often referred to as drives with removable media or removable drives for short, because you can remove whatever disk is currently in the drive, and replace it with another. Your computer's hard disk can store as much information as tens of thousands of floppy disks, so don't worry about running out of space on your hard disk any time soon.

There's too much "stuff" on your computer's hard disk to use it all at the same time. During the average session sitting at the computer, you'll probably use only a small amount of all that's available. The stuff you're working with at any given moment is stored in random access memory (often abbreviated RAM, and often called simply "memory"). The advantage using RAM to store whatever you're working on at the moment is that RAM is very fast. Much faster than any disk. For you, "fast" translates to less time waiting and more time being productive. All of the information that's "in your computer", so to speak, is stored on your computer's hard disk. You never see that actual hard disk because it's sealed inside a special housing and needs to stay that way. Unlike RAM, which is volatile, the hard disk can hold information forever -- with or without electricity. Most modern hard disks have tens of billions of bytes of storage space on them. Which, in English, means that you can create, save, and download files for months or years without using up all the storage space it provides.

http://www.coolnerds.com/Newbies/Hardware/hardware.htm
http://www.pccomputernotes.com/

Sunday, January 31, 2010

Week 4: Clear



Application software, perhaps one of the most important elements in helping mankind do what they do in the computer life. Application software pretty much means programs designed to make users more productive and assist them with personal tasks. There are many different types of, tens of thousands. You can pretty much get help in anything with application software. There different ways to to describe application software. Horizontal vs Vertical applications. Horizontal means being used in many different industries and vertical means application designed to meet one market or business. Analyzing software is also very important for business decisions, asking questions like what it does? Why we need it? And for whom it will be useful for? You also have to decide how much value will bring it to you. Software licensing is very important in todays world or actually at all times. This process can get very completed and take many steps to get accomplished. We have individual licensing, multiple licensing, free licensing, and open source licensing.

/>

A program or group of programs designed for end users. Software can be divided into two general classes: systems software and applications software. Systems software consists of low-level programs that interact with the computer at a very basic level. This includes operating systems, compilers, and utilities for managing computer resources.
In contrast, applications software (also called end-user programs) includes database programs, word processors, and spreadsheets. Figuratively speaking, applications software sits on top of systems software because it is unable to run without the operating system and system utilities. Software licensing is a contract of agreement between the software publisher and the end user, sometimes referred to as the End User License Agreement, or EULA. Though software licensing can be a paper agreement, it is most often imbedded in the software itself as part of the installation process. If the user does not agree to the software licensing terms, he or she can indicate so with a click. This aborts the installation process. In most cases, end users click in agreement whether they actually read the license or not. Most notably, software licensing protects the copyright by placing restrictions on the end user in relation to the product. Duplication for purposes other than backup, installation on more than one computer, editing the code, or changing the program in any way is usually forbidden. Software licenses might also restrict reverse engineering and bypassing controls intended to cut down on pirating.

http://www.wisegeek.com/what-is-software-licensing.htm
http://news.cnet.com/Rethinking-software-licensing/2010-1012_3-6110449.html
http://www.sciencedaily.com/articles/a/application_software.htm

Friday, January 22, 2010

WEEK 3: Clear


The Internet and the World Wide Web, those are some immense words in yesterdays, todays, and tomorrow’s world. The Internet and the World Wide Web have revolutionized our lives. They have made our lives easy in so many ways. Everyone with an access to the internet and the World Wide Web can pretty much do everything. You can just sit home and work, shop, trade, communicate, get educated, and whatever pops up in to your head.

The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to one another. These computers are connected by phone lines, fiber optic lines, coaxial cable, satellites, and wireless connections. Some common ways of connecting to the Internet include:

  • Internet service provider (ISP) by modem
  • Internet ready cable
  • digital subscriber line (DSL)
  • simply turning on your computer which is on a network at work or school connected to the Internet

Once you are connected to the Internet you are able to do many things. You can send and receive e-mail. You can chat with text or voice. You can browse the World Wide Web. And you can perform countless other tasks with the appropriate software.

For more information on the Internet:

http://www.cnri.reston.va.us/what_is_internet.html
http://www.howstuffworks.com/internet-infrastructure.htm
http://www.boutell.com/newfaq/definitions/internet.html

World Wide Web, many people confuse this world with the internet. World Wide Web actually is a service of the Internet. World Wide Web or web is pretty much a collection of electronic documents. Each document is called a webpage. On that webpage, we have texts, visuals, audio, and graphics. There are two types of web pages, static meaning fixed and dynamic meaning changing. A Web site is a collection of related Web pages to your computer that delivers requested Web pages to your computer. The Web is the combination of four ideas, hypertext, resource identifiers, the client, and web browser. At its core, the Web is made up of three standards, URL, http, and html. Without the web we don’t have some the luxuries we enjoy today, e-mails, chatting, video conferences, shopping, entertainment, and in everyday college kids life…no Facebook, MySpace, or Twitter.

http://www.learntheweb.info/worldwide_web.htm
http://www.ideafinder.com/history/inventions/worldweb.htm
http://www.springer.com/computer/database+management+&+information+retrieval/journal/11280