About Me

My photo
i hate to say what i feel...

Monday, August 8, 2011

Quiz 9

Quiz 9 - Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist. 




Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 


Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.

Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism



2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots. 



A computer virus is a potentially damaging program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 
A worm is a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate program. 
A root kit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. 
To take precautions against this malware:
1. Do not start a computer with removable media in the drives or ports. 
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source. 
4. Install an antivirus program and a personal firewall. 
5. Stay informed about any new virus alert or virus hoax. 
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.


3. Discuss techniques to prevent unauthorized computer access and use


Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or illegal activities. Organizations can take measures such as implementing a written acceptable use policy (AUP), a firewall, intrusion detection software, an access control, and an audit trail. Access controls include a user name and password or passphrase, a CAPTCHA, a possessed object, and a biometric device.

4. Identify safeguards against hardware theft and vandalism 

Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.


5. Explain the ways software manufacturers protect against software piracy. 


Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explain why it is necessary 


Encryption prevents information theft and unauthorized access by converting readable data into unreadable characters. To read the data, a recipient must decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher, converts readable plaintext into unreadable cipher text. Encryption is used to protect information on the Internet and networks.


7. Discuss the types of devices available that protect computers from
system failure
A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.


8. Explain the options available for backing up computer resources. 


A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.


9. Identify risks and safeguards associated with wireless communications. 

Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.


10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing. 



Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical. Green computing reduces the electricity and environmental waste while using a computer.

12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
 


Information privacy is the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following. 
An electronic profile combines data about an individual's Web use with data from public sources, which then is sold. 
A cookie is a file that a Web server stores on a computer to collect data about the user. 
Spyware is a program placed on a computer that secretly collects information about the user.
Adware is a program that displays an online advertisement in a banner or pop-up window. 
Spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
Phishing is a scam in which a perpetrator attempts to obtain personal or financial information. 
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web. 

Monday, August 1, 2011

Quiz 8



1. Define the term, database, and explain how a database interacts with data
and information.
A database is an organized collection of data for one or more purposes, usually in digital form.
Data is collection of unprocessed items text, numbers, images,video and audio.
Information is a processed data,organized, meaningful and useful.

2. Describe file maintenance techniques (adding records, modifying records,deleting records) and validation techniques.

- File Maintenance  refers to the procedures that keep data current.
- Adding Records users add new records to a file when they obtain new data Disc
- Modifying Records users modify a record to correct inaccurate data or update old data
- Deleting Records When a record no longer is needed, a user deletes it from a file
- Validation Techniques compares data with a set of rules or values to find out if the data is correct  


  • Alphabetic/Numeric check
  • Range check
  • Consistency check
  • Completeness check
  • Check digit
  • Other checks


3. Discuss the terms character, field, record, and file


ØField is a combination of one or more characters. It . It is the smallest unit of data user accesses
 Record is a group of related fields.
File is a collection of related records
§

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

Data dictionary contains data about each file in a database and each field within the files.
Backup - is the copy of the database.A log is a listing of activities that change the contents of the database. 
Recovery Utility - uses the logs and/or backups to restore the database.

5. Differentiate between a file processing approach and the database
approach.
File processing approach each department or area within organization has its own set of files.

Database approach- many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.


6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
    An object-oriented database (OODB) stores data in objects
•Object-oriented databases often use Object Query Language (OQL) to manipulate and retrieve data.

    A relational database stores data in tables that consist of rows and columns
        –Each rowhas a primary key
        –Each columnhas a unique name
        •A relationshipis a link

    A multidimensional database can store data in more than two dimensions of data
        –Can consolidate data much faster than a relational database


7. Explain how to access Web databases.
Web database  database you can access through web by filing in a form in a web page.

A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a database.
 
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.



Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. 
Cybercrime Perpetrators

Hacker refers to a computer programmer who is able to create usable computer programs where none previously existed. 

Cracker is a variation of hacker , with the analogy equal to a safe cracker. Some individuals use the term cracker in an attempt to differentiate from the honorable computer programmer definition of hacker.

Script kiddy is an individual who executes computer scripts and programs written by others. Their motive is to hack a computer by using someone else’s software. Examples include password decryption programs and automated access utilities. 

Corporate Spy - have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information.

Unethical employee - break into their employers' computer for a variety of reasons. Some simply want to exploit security weakness.

Cyberextortionist - is someone who uses e-mail as a vehicle for extortion. These perpetrator s send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization s network - if they are not paid of a sum of money.

Cyber-terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism


9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use


Operating system and software patches and updates
There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.
Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.
  • How to update a Microsoft Windows computer.
Passwords
Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.
  1. Change passwords often. It is recommended at least once every few months.
  2. Create a BIOS password.
  3. When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23!.
  4. Do not use sticky notes around your computer to write down passwords. Instead use a password manager.
  • Complete information and links to information about computer passwords.
Get a hardware or software firewall
We highly recommend all computer users have a firewall solution. There are two ways a firewall can protect your computer and network.
  1. Hardware firewall - A hardware firewall is a hardware device that is connected to your network. Often many home users who have a home network use their network router as a firewall solution.
  2. Software firewall - A software firewall is a software program that you install on your computer that helps protect that computer from unauthorized incoming and outgoing data. Below is a listing of a few of the more widely used software firewall programs.
Agnitum Outpost Firewall
BlackICE PC Protection
Kerio Personal Firewall
Sygate Firewall
Tiny software Tiny Personal Firewall
Network Associates
Zone Labs Zone Alarm
Note: A software firewall is only going to protect the computer that has the firewall installed on it.
In addition to the above listed firewall software programs many of the antivirus scanners released today also include their own version of a firewall program. If you have an antivirus scanner that also has a firewall program you do not need to worry about getting one of the above programs or another third-party firewall program.
  • How to enable or disable the Microsoft Windows firewall.
Trojans, viruses, spyware, and other malware
Software Trojans, viruses, spyware, and other malware can not only damage or destroy your computer data Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information. but is also capable of monitoring your computer to learn more about your viewing habits on the
To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.
  • What are the current available antivirus programs?
  • My web browser has been hijacked.
Know how to handle e-mails
Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.
  • Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.
  • Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See the phishing definition for additional information about this term as well as examples of these e-mails.
Alternative browser
Before the release of Microsoft Windows XP SP2 and Internet Explorer 7.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.
Run system scans to check for vulnerabilities
There are several sites on the Internet that allow users to check their computers for potential threats or issues their network or computer may have that can allow users unauthorized access to their computer. Below are a listing of recommend sites to try: 


Gibson Research Corporation - The Gibson Research Corporation, or GRC, is a great location to learn about network security as well as well as test your computer or network for vulnerabilities. 

Hacker Wacker - Another great site with computer security related information, help, and programs to help test your computer and network.

Friday, July 22, 2011

Quiz 7 Communications and Networks

1. Discuss the components required for successful communications.

Sender - initiates instructions to transmit data, information.
Communication Device - connects communication device to communication channel.
Communication Channel -  media on which data, information, or instruction travel.
Communication Device - connects the communication channel to receiving device.
Receiving Device - accepts the transmission of data,instruction or information.

2. Identify various sending and receiving devices.

Wire pairs are commonly used in local telephone communication and for short distance digital data communication.
They are usually made up of copper and the pair of wires is twisted together
Data transmission speed is normally 9600 bits per second in a distance of 100 meter. 


A sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
All types of computers and mobile devices serve as sending and receiving devices in a communications system. This includes mainframe computers, servers, desktop computers, notebook computers, Tablet PCs, smart phones, portable media players, and GPS receivers.


3. Describe uses of computer communications.
Communications technologies include the Internet, Web, e-mail, instant messaging, chat rooms, newsgroups, blogs, wikis, RSS, VoIP, FTP, Web folders, video conferencing, and fax machine or computer fax/modem. Users can send and receive wireless messages to and from smart phones, cell phones, handheld game consoles, and other personal mobile devices using text messaging, wireless instant messaging, picture messaging and video messaging. A wireless Internet access point lets people connect wirelessly to the Internet through a wireless Internet access point. A hot spot is a wireless network that provides Internet connections to mobile computers and devices. . A global positioning system (GPS) analyzes signals sent by satellites to determine an earth-based receiver’s geographic location. Many software products provide a means to collaborate, or work online with other users connected to a server. A document management system provides for storage and management of a company’s documents, such as word processing documents, presentations, and spreadsheets. Groupware is software that helps people work on projects or share information over a network. Voice mail allows someone to leave a voice message for one or more people. Web services describe standardized software that enables programmers to create applications that communicate with other remote computers.

4. List advantages of using a network.
  • Speed
  • Cost
  • Security
  • Centralized Software Management
  • Resource Sharing
  • E-mail
  • Work group computing 
5. Differentiate among client/server, peer-to-peer, and P2P networks.
A client server setup has servers, which are dedicated machines that perform specific functions in the network. A server can be used to manage a network's email (mail server), database (database server), files (file server), printers (print server), or access an anti-virus (security server). In a client server setup, each component has a designated function in the network. Servers handle most of the network load, while workstations handle day-to-day tasks of users. This division of labor between components make a client server setup more efficient than a peer-to-peer network.
- A peer-to-peer network setup Simple network that connects fewer than 10 computers. Each computer, or peer, has equal capabilities. 
P2P is an Internet peer-to-peer network Enables users to connect to each other’s hard disks and exchange files directly.

6. Describe the various network communications standards.
Network standards defines:
  •  Way devices access the medium
  •  Speed on different types of networks
  •  Types of network technology (cable / wireless)
- Protocols
  •  Rules on how devices communicate with each other
  •  Data format used
  •  Coding Scheme
  •  Error Handling
  •  Sequencing techniques etc.
  •  Hardware / Software Vendors try to meet these guidelines
- ANSI, IEEE
- Standardizing Organization

7. Explain the purpose of communications software.
is used to provide remote access to systems and is also    used to exchange messages in text, audio and video format for the purpose of communication. This software sends and receives data over telephone lines through modems. The communication software allows computers in different geographical regions to communicate with each other through terminal emulators, file transfer programs, chat and instant messaging programs.

8. Describe various types of lines for communications over the telephone network.
  • PSTN - Worldwide telephone system that handles voice-oriented telephone calls.
  • Dial-up line - Temporary connection using telephone line for communications.
  • Dedicated line - Always on connection between two communication devices.  
  • Five types of digital dedicated lines are ISDN line, DSL, FTTP, T-carrier line and ATM.

9. 
Describe commonly used communications devices.
Dial-up modem
  • A dial-up modem converts digital signals to analog signals and vice versa
  • Usually in the form of an adapter card
- DSL Modem / ISDN Modem-Cable Modem
  • Send and receive digital data from DSL(Digital Subscriber Line) / ISDN
- Cable Modem
  •  Sends and receives data over cable television (CATV) network
  •  Much faster than dial-up modem or ISDN
  •  Sometimes called a broadband modem
- Wireless Modem 
  • Allows access to the Web wirelessly from a notebook computer, a smart phone, or other mobile device. 
- Hub or Switch 
  • Device that provides central point for cables in network. 
- Router
Connects computers and transmits data to correct destination on network. 
10. Discuss different ways to set up a home network.

Setting up a home network

Before you start: To decide what type of network to set up or to find out what hardware and cables you need, see What you need to set up a home network. That topic has information about the different types of networks (also known as network technologies), as well as hardware requirements for each type.
Once you know what type of network you want and have the necessary hardware, there are four possible steps to take (two of these are not always required):
1.       Install any necessary hardware.
2.       Set up an Internet connection (optional).
3.       Connect the computers.
4.       Run the Set Up a Wireless Router or Access Point wizard (wireless only).
Each of these steps is described in detail later in this article.
Start by setting up one computer. Once you set up the network and you are sure that the first computer is working correctly, you can add additional computers or devices.

Install the hardware

Install network adapters in any computers that need them. (Follow the installation instructions in the information that came with each adapter.)

Set up or verify an Internet connection (optional)

You don't need an Internet connection to set up a network, although most people want to use their network to share an Internet connection. To set up an Internet connection, you need a cable or DSL modem and an account with an Internet service provider (ISP). Then open the Connect to the Internet wizard and follow the instructions.

Connect the computers

Turn on all computers or devices, such as printers, that you want to be part of your network. If your network is wired Ethernet or HPNA, it should be set up and ready to use. You should test your network (see below) to make sure that all computers and devices are connected correctly.

Run the Set Up a Wireless Router or Access Point wizard

If your network is wireless, run the Set up a Wireless Router or Access Point wizard on the computer attached to the router.
·         Open Set Up a Wireless Router or Access Point by clicking the Start button, clicking Control Panel, clicking Network and Internet, and then clicking Network and Sharing Center. In the left pane, click Set up a connection or network, and then click Set up a wireless router or access point.
The wizard will walk you through the process of adding other computers and devices to the network. For more information, see Add a device or computer to a network.

Test your network

It's a good idea to test your network to make sure that all of the computers and devices are connected and working properly. To test your network, do the following on each network computer: Click the Start button, and then click Network.
Changing TCP/IP settings
If you need to adjust TCP/IP settings for your network, see Change TCP/IP settings.

Connecting your mobile PC from work to your home network

To connect the mobile PC that you use at work to the Internet or to your work network from your home network, you must have a network connection set up at home. For information about using your mobile PC on your home network, see Switching between your home and workplace networks.
11. Identify various physical and wireless transmission media.

Cellular Phone
 Coaxial cable

Fiber-optic Cable
       
 Twisted-pair cable
Broadcast Radio 
Cellular radio 
Microwave



Communication Satellite
 



Wednesday, July 20, 2011

Quiz 6 - Operating Systems and Utility Programs

1.Define system software and identify the two types of system software.
System software is computer software designed to operate the computer hardware and to provide a platform for running  application software.




Two basic types of system software are:
An operating system is software, consisting of programs and data, that runs on computers, manages computer hardware resources, and provides common services for execution of various application software. in a computer system. Without an operating system, a user cannot run an application program on their computer, unless the application program is self booting. The operating system is the most important type of system software


Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer. A single piece of utility software is usually called a utility or tool.
Utility software should be contrasted with application software, which allows users to do things like creating text documents, playing games, listening to music or surfing the web. Rather than providing these kinds of user-oriented or output-oriented functionality, utility software usually focuses on how the computer infrastructure (including the computer hardware, operating software, application software and data storage) operates. Due to this focus, utilities are often rather technical and targeted at people with an advanced level of computer knowledge.


2.Briefly describe various server operating systems: Windows Server, UNIX,Linux, Solaris, and NetWare.


Unix (officially trademarked as UNIX, sometimes also written as Unix) is a multitasking, multi-useroperating system originally developed in 1969 by a group of AT&T employees at Bell Labs.
Unix was designed to be portable , multi-tasking and multi-users  in a time-sharing configuration. Unix systems are characterized by various concepts: the use of plain text for storing data; a hierarchical file system; treating devices and certain types of inter-process communication (IPC) as files; and the use of a large number of software tools, small programs that can be strung together through a command line interpreter using pipes, as opposed to using a single monolithic program that includes all of the same functionality. 
Under Unix, the "operating system" consists of many utilities along with the master control program, the kernel. The kernel provides services to start and stop programs, handles the file system and other common "low level" tasks that most programs share, and, perhaps most importantly, schedules access to hardware to avoid conflicts if two programs try to access the same resource or device simultaneously. To mediate such access, the kernel was given special rights on the system, leading to the division between user-space and kernel-space.


A Linux-based system is a modular unix-like operating system. It derives much of its basic design from principles established in Unix during the 1970s and 1980s. 


Solaris is a unix operating system. It superseded their earlier SunOs. n 1993. Oracle Solaris, as it is now known.

NetWare is a network operating system developed by Novell, Inc. It initially used cooperative multitasking to run various services on a personal computer, with network protocols based on the archetypal Xerox Network Systems stack.
Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation. All are part of Microsoft Servers. This brand includes the following software:
  • Windows Server 2003
  • Windows Server 2008
    • Windows HPC Server 2008, an edition designed exclusively for high-performance computing
    • Windows Server 2008 R2, the current release of Windows Server 2008
  • Windows Small Business Server, an operating system based on Windows Server with some integrated Microsoft Servers, for small businesses
  • Windows Essential Business Server, a product similar to Small Business Server, but for medium-sized businesses
  • Windows Home Server, a home server operating system for file sharing and streaming, automated backups, and remote access
    • Windows Home Server 2011, a home server operating system designed for Small Office/Home Office (SOHO)
  • Windows Multi-Point Server, a product allowing multiple simultaneous local users.
Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, Black Berry, Google Android, Embedded Linux, and Symbian OS.
Windows CE is optimized for devices that have minimal storage—a Windows CE kernel may run in under a megabyte of memory. Devices are often configured without disk storage, and may be configured as a “closed” system that does not allow for end-user extension (for instance, it can be burned into ROM). Windows CE conforms to the definition of a real-time operating system, with deterministic interrupt latency. From version 3 and onward, the system supports 256 priority levels and uses priority inheritance for dealing with priority inversion. The fundamental unit of execution is the thread. This helps to simplify the interface and improve execution time.
Most versions of Windows Mobile for Pocket PC have these standard features:
  • Today screen shows the current date, owner information, upcoming appointments, e-mail messages, and tasks. (Home screen in later WM6.5 builds)
  • The task bar shows the current time and the audio volume.
  • Office Mobile, a suite of Mobile versions of Microsoft Office applications, including Outlook Mobile.
  • Internet Explorer Mobile, an Internet browser developed by Microsoft for Pocket PC and Hand held PC that comes loaded by default with Windows Mobile and Windows CE for Hand held PC.
  • Windows Media Player for Windows Mobile.
  • Client for PPTP VPNs.
  • Internet Connection Sharing (ICS), which in mobile phones allows the phone to make its Internet connection available to computers via USB and Blue tooth.
  • File system similar to that of Windows 9x/Windows NT, with support for many of the same file types.
  • Ability to multi-task.

 
 
  4. Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup andrestore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.

A file manager or file browser is a computer program that provides a user interface to work with file systems. The most common operations performed on files or groups of files are: create, open, edit, view, print, play, rename, move, copy, delete, search/find, and modify attributes, properties and permissions. Files are typically displayed in a hierarchy. Some file managers contain features inspired by web browsers, including forward and back navigational buttons. Some file managers provide network connectivity via protocols, such as FTP, NFS, SMB or WebDAV. This is achieved by allowing the user to browse for a file server (connecting and accessing the server's file system like a local file system) or by providing its own full client implementations for file server protocols.

Tuesday, July 19, 2011

quiz 5

1. Differentiate between storage devices and storage media.

A storage medium is the physical material on which a computer keeps data, instructions, and information. The number of bytes (characters) a storage medium can hold is its capacity. A storage device is the computer hardware that records and/or retrieves items to and from storage media. Writing is the process of transferring items from memory to a storage medium, and reading is the process of transferring these items from a storage medium into memory. 

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.

Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. A tape drive reads and writes data and information on tape. Business users utilize tape most often for long-term storage and backup. 
A magnetic stripe card is a credit card, entertainment card, bank card, or other similar card with a stripe that contains information identifying you and the card. A magnetic stripe card reader reads the information stored on the stripe. 
A smart card, which is similar in size to a credit or ATM card, stores data on a thin microprocessor embedded in the card. A smart card reader reads the information on the smart card and updates it if necessary. 
Microfilm is a 100- to 215-foot roll of film. 
Microfiche

Microfiche is a small sheet of film, usually about 4 X 6 inches. Microfilm and microfiche reduce the amount of paper firms must handle, are inexpensive, and have the longest life of any storage media. 





Enterprises use computers, servers, and networks to manage and store huge volumes of data and information. In an enterprise, some storage systems can provide more than 185 TB of storage, and optical disc servers hold hundreds of optical discs.

3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.

Flash memory chips are a type of solid state media, which means they consist entirely of electronic components and contain no moving parts.
A solid state drive (SSD) typically uses flash memory to store data, instructions, and information.


Memory Card


A memory card is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or card reader/writer. Common memory cards include CompactFlash (CF), Secure Digital (SD), Secure Digital High Capacity (SDHC), microSD, microSDHC, xD Picture Card, Memory Stick, and Memory Stick Micro (M2). 


USB Flash Drive




A USB flash drive, sometimes called a thumb drive, is a flash memory storage device that plugs in a port on a computer or mobile device.












An ExpressCard module is a removable device that fits in an ExpressCard slot. Express Card modules can add memory, storage, communications, or other capabilities to a computer.

  1. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.

The Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio CD players have been commercially available since October 1982.

Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG compression. The product is aimed at consumers. Software to view and perform simple edits to images is included on the CD.

DVD is an optical disc storage media format, invented and developed by Philips, Sony, Toshiba, and Panasonic in 1995. DVDs offer higher storage capacity than compact discs while having the same dimensions.

Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format. The disc diameter is 120 mm and disc thickness 1.2 mm plastic optical disc, the same size as DVDs and CDs 
. Blu-ray Discs contain 25 GB (23.31 GiB) per layer, with dual layer discs (50 GB), the norm for feature-length video discs. Triple layer discs (100 GB) and quadruple layers (128 GB) are available for BD-XL Blu-ray re-writer drives. Currently movie production companies have not utilized the triple or quadruple layer discs, most consumers owned Blu-ray players will not be able to read the additional layers, while newer Blu-ray players may require a firmware update to play the triple and quadruple sized discs.

  1. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers.

An inkjet printer is a type of computer printer that creates a digital image by propelling droplets of ink onto paper. Inkjet printers are the most commonly used type of printer and range from small inexpensive consumer models to very large professional machines that can cost up to thousands of dollars.

A laser printer is a common type of computer printer that rapidly produces high quality text and graphics on plain paper. As with digital photocopiers and multifunction printers (MFPs), laser printers employ a xerographic printing process, but differ from analog photocopiers in that the image is produced by the direct scanning of a laser beam across the printer's photoreceptor.

An MFP (Multi Function Product/ Printer/ Peripheral), multifunctional, all-in-one (AIO), or Multifunction Device (MFD), is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or small business setting (the SOHO market segment), or to provide centralized document management/distribution/production in a large-office setting.

A thermal printer (or direct thermal printer) produces a printed image by selectively heating coated thermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image. Two-color direct thermal printers can print both black and an additional color (often red) by applying heat at two different temperatures.