Tuesday, April 21, 2015

Web Application Development

What are HTML5 and CSS? List some uses of JavaScript.

HTML5 specifies the structure of content displayed on a web page.

CSS (cascading style sheets)  describes the design and appearance of information on a webpage.

JavaScript allows users to interact with a page's content.

Uses of JavaScript:

  1. Often used to check  for appropriate values on web forms.
  2. Display alert messages. 
  3. Display menus on webpages.
  4. Control the appearance of a browser window.
  5. Read and write cookies 
  6. Display alert boxes.
  7. Detect the browser version in order to display a page especially designed for that browser.


Friday, April 17, 2015

Reasons for Backing Up a Database

List reasons for backing up a database. List some ways to back up a database.

Backing up a database is an important step to protect the the data. from loss. Databases should be back up a database on a regular basis:

  1. before modifying or deleting data.
  2. before performing any maintenance operations on the database.
  3. after adding data to the database.
Ways to back up database:
  • If the computer already has a back up program running, it might be backing up your database. Check your backups to determine whether the database is included in the back up. If not, configure the backup program to backup the database.
  • Copy the database to another storage device.
  • Copy the database to different folder on the same storage medium as the original database. This method is effective for keeping multiple copies in an accessible location, but you will lose both the original database and the back ups if the storage device fails. 


Tuesday, April 7, 2015

Communications and Networks

List various communication devices. List ways you can try to strengthen your wireless signal

Communication devices are:

  • Digital modems (Broadband modem) sends and receives data and information to and from a digital line.
  • Wireless modems uses a mobile phone provider's network to  to connect to the internet wirelessly from a computer or mobile device.
  • Wireless access points is a central communications device that allows computers ad devices to transfer data wirelessly among themselves or to transfer  data wirelessly to a wired network using wireless technologies such as Wi-fi.
  • Router connects multiple computers or other routers together and transmits data to its correct destination on a network.
  • Network card enables a computer or device that does not have built-in networking capability to access a network.
  • Hubs and Switches provides a central point for cables in a network.


Ways to strengthen wireless signal

  1. If your wireless routers has antennas, make sure they are extended completely.
  2. If you are going to remove the antennas, replace them with a wireless signal booster.
  3. If possible position the wireless router or wireless access point in a central location of your home and away from appliances. or electronic devices.
  4. Purchase a range extender for your wireless router or access point
  5.  If you still experience problem with the strength of your wireless signal after following the suggestions above, consider replacing the wireless routers or wireless access point.

Operating Systems

Describe the process of starting a computer. Differentiate between memory resident and nonresident.

When you start or restart a computer,  a series of  messages may appear on the screen. The information displayed  varies depending on the type of the computer and the equipment installed.
The start-up process is similar  for large and small computers. as described in the following steps:

1. When the computer or mobile device was turned on,  the power supply or battery sends an electrical current to circuitry in the computer or mobile device.

2. The charge of electricity causes the processor chip to reset itself and finds the firmware that contains start-up instructions.

3. The start-up process executes a series of tests to check the various components.

4. If the tests are successful, the kernel of the operating system  and other frequently used instructions load from the computer or mobile or mobile device's internal storage media  to its memory (RAM).
The kernel is the core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources. the kernel is memory resident  which means it remains in memory while the computer or mobile device is running while nonresident instructions remain on a storage medium until they are needed, at which time they are transfer to memory (Ram)

5. The operating system in memory takes control of the computer or mobile device and loads system configuration information.




Wednesday, April 1, 2015

Lifespan of a Memory Card

What is the lifespan of a memory card? List ways to care for a memory card.

A memory cards enable mobile user to easily transport digital photos, music, video, or other files to and from mobile devices and computers.

Depending on the card, manufacturers claim their media can last from 10 to 100 years with proper care, including the following:

  • Do not bend the card
  • Avoid dropping the card.
  • Keep cards away from direct sunlight.
  • Do not expose cards to extreme temperatures.
  • Do not remove the card while while data is transferring to or from it.


Tuesday, March 10, 2015

Printer Hacking

Define printer hacking. List steps you can take to secure printers.

Printer is an output device that produces text and graphics on a physical medium such as paper. Printer hacking is where an individual from within the organization or outside the building can print a document without permission if the network is connected to the internet.

Here are steps to take to secure printers:
  1. Place printers in a secure room, not out in the open.
  2. If the printer has a hard disk, destroy it before disposing of the printer at the end of its useful life.
  3. Encrypt documents before sending them to the printer using a secured network.
  4. Restrict users through the use of sign-in procedures, passwords, and types of documents they are allowed to print.
  5.  Use a printer program to track and report the types of jobs, and keep a record of the users who sent them.
  6. Unplug the printer when it is not in use, or do not connect it to a network.
  7. Update the printer with the latest firmware.


Cloud Computing

List some reasons that home and businesses choose cloud computing. In reference to cloud computing describe the front end and the back end.

Cloud computing refers to an environment of servers that house and provide access to resources users access via the Internet.

Home and business users choose cloud computing for various reasons:

1. Accessibility- Data and/or applications are available worldwide from any computer or device with an internet connection.

2. Cost saving- The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, shifts away from the user.

3. Space savings- Floor space required for servers, storage devices, and other hardware shifts away from the user.


4. Scalability- Provides the flexibility to increase or decrease computing requirement as needed.

Cyberwarfare


What is cyberwarfare? Differentiate among the various categories of cybercriminals

Cyberwarfare describes an attack whose goal ranges from disabling a government’s computer network to crippling a country.

Cybercrime refers to online or internet- based illegal acts such as distributing malicious software or committing identity theft.

Here are the various categories of cybercriminals:

Hacker refers to someone who accesses a computer or network illegally.

Cracker refers to someone who accesses ac0mputer or network illegally

Script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use prewritten hacking and cracking programs to break into computers and network

Corporate espionage is a corporate spies hired by is used by unscrupulous company to gain a competitive advantage

Cyberextortionist
is someone who demands payment to stop an attack on an organization's technology infrastructure

Cyberterrorist is someone who uses the Internet or network to damage computers for political reasons

Viruses and Malware


Differentiate among virus, worm, trojan horse, and rootkit. In reference to malware, what is quarantine?

Virus is a potentially damaging computer program that affects or infects a computer negatively by altering the way the computer works without the user’s knowledge or permission.

Worm resides in active memory and replicates over a network to infect computers and devices, using up the system resources and possibly shutting down the system.

Trojan horse is a destructive program disguised as real problem, such as a screen saver. When a user runs a seemingly innocent program, a Trojan horse hiding inside can capture information, such as user names and passwords, from your computer or enable someone remotely to control your computer

Rootkit is program that easily can hide and allow someone to take full control of your computer from a remote location, often for nefarious purposes.  Rootkit can be dangerous and often requires special software to detect and remove.


If an antivirus program identifies an infected files, it attempts to remove the malware. It the antivirus program cannot remove the infection, it often quarantines the infected file. A quarantine is a separate area of a hard disk that holds the infected file until the infection can be removed. This step that other files will not become infected

Monday, March 2, 2015

Exploring the Features of Google Picasa

Three edited photo files that have also been geotagged







 Poster 









Picture Collage




Movie






Wednesday, February 11, 2015

Typing Options for Smartphones

What typing options are available on smartphones? Differentiate between predictive text input and a swipe keyboard app.

Smartphones is an internet-capable mobile phone with an advanced operating system. It usually includes a calendar, an appointment book, an address book, a calculator, a media player, a GPS and other features like send and receive messages, conduct live video calls and it even function as a camera phone.  Most have a touchscreen. Some have a built-in mini keyboard or a keyboard that slides in and out from behind the phone.


A variety of typing options are  available on a smartphone.  Some phones use predictive text input, where you press one key on the keyboard or keypad for each letter in a word. Another option is the  swipe keyboard app, wherein the users enter words by tracing a path on an on-screen keyboard with their fingertip or stylus pen from one letter to the next in a continuous motion. An on-screen keyboard is use by pressing keys on the screen using a fingertip or a stylus. Another option is a virtual keyboard that projects an image of a keyboard on a flat surface. 

Cybersquatter


What is ? What is the goal of the Anticybersquatting Consumer protection Act (ACPA)?

Cybersquatting is buying and registering unused or lapsed domain names belonging to someone else or existing businesses so that they can profit from selling them. Some cybersquatters take advantage of people trying to reach a more popular website and redirect to a website for their own business.

Anticybersquatting Consumer protection Act’s goal is to protect the consumers and trademark owners from being forced to pay a cybersquatter for a domain name that includes their trademark. ACPA authorizes a trademark owner to sue an alleged cybersquatter in federal court and obtain a court order transferring the domain name back to the trademark owner. In some cases, the cybersquatter must pay money damages.

Online Social Networks


Define an online social network. Differentiate among Facebook, Twitter, and LinkedIn.

An online social networks is a websites that allow users to be part of a virtual community that share interests, photos, stories with other registered users. Some of the most popular sites are Facebook, Twitter and LinkedIn. Each websites provide users with tools to create a custom profile. Profile includes basic information about the user and one profile picture. Social networks site has different tools and online application based on their audience.

Facebook has no specific audience and has advanced profiles setting that may include photo albums and videos.  Users focuses more on an online community wherein a registered user can add friends, send messages to other users, and leave comments directly on friends' profiles.
Twitter enables registered users to read, and send short 140-character messages called "tweets". Only Registered users can read and post tweets, and unregistered users can only read them. Tweet keep the user to stay updated with the daily activities.

LinkedIn is a business-oriented social networking service, mainly used to share professional interest, education and employment history. It allows the registered user to add coworkers or college to their contact list. The online information in LinkedIn is consider an online resume. Employers can post a job and hire possible job hunter.  

Social networking is a community of people from different places that provide an opportunity to keep in touch with old friends and to meet people you don't know from across the world. Strangers can be able to get personal information from a friends profile page. It is a good idea to review the privacy settings of your account. Be responsible for your own safety and integrity and always remember to think first before posting. 

Tuesday, January 13, 2015

Discovering Computers



Today, I got the book that I ordered from Amazon through FedEx. So far this is the cheapest book I have bought for this semester. I purchased the book used at a very reasonable price and in good condition, All the other books are digital and with  access code which is too costly.  I really am not a fan of digital books. I still prefer the hard copy.