Wednesday, May 19, 2010

Class work

Area of Impact: Politics and Government

a. Identify two features of Optical Character Recognition
Two features of OCR Technology is that there is a camera that records unusual behavior and a wireless transmitter which will transmit the data to a data base which can be viewed by police or other officials.

b. Describe two situations where the use of a wireless link between the camera and the network would not be possible.
Two situations where the use of a wireless link between the camera and the network be if the power went out so that the wireless transmitter would be powered off and therefore it would no longer have the capabilities to work, and another situation would be, if the range of the wireless signal could not reach the network.

c. Explain how this new expanded system will be able to detect regnoized unusual situations.
This new system can detect unusual situations because it will be programed to record when there are/are not people present depending on the location of the site. Also cars speeding through the red lights is unusual.

d. To what extend are citizen's concerns about the expanded system outweighed by the benefits of it providing continuous information to the police department .

The citizens concerns about having the system recording are understandable but they are outweighed by the benefits of it providing the continuos information to the police department.
The Citizens could think that it is an invasion of privacy because they could be being monotered if they are acting unusual. However the police department, with the opposing view would resopond with that if they withstand from unusual behavoir they do not have to worry about being monotered.
Antoher view could be that, The OCR technology would not work. and that it could either miss the crime or document something that does not matter.
In conclusion, it seems that the it is the best thing to do to instill the new technology because yes it may record people without their permission but it can help solve crimes. Also it does not matter if it falsely records data, it is a shame if it misses something important but it does not matter at all if it gets something thats unimportant.

Wednesday, April 14, 2010

Case Study- class and vocab words

ITGS HL2 2010 Midyear Exam

Refer to the Healthcare in an East African country case study and to your own related research in responding to the following questions.

1. Define the following terms:

(a) internet [2 marks]

A computer network that connects computers across the world

(b) intranet [2 marks]

A restricted network that only connects specific computers (not restricted by location)

2. (a)"Dr Ogola wants the Western Province to be in the forefront of medical care in the future and to be an example for other provinces to follow. The key to this transformation will be the development of an integrated IT system linking the hospital and the outlying clinics" (lines 84-86). Explain the purposes of the following in a client-server network:

(i) server [2 marks]

A server would be the computer where all of the data is stored. This would be the computer which house the EMR.

(ii) firewall [2 marks]

is part of the intranet which is used for blocking unwanted accesses, in this case it is preventing outside people to view the EMR. The Fire wall also

(iii) security software [2 marks]

Software which protects against hackers, and virus.

(b) Examine two methods Dr. Ogola can use to ensure the security of the data he intends to transmit among the medical centers of the Western Province. [8 marks]

Two methods Dr.Ogola can use to ensure the security of the data that he intends to transmit among the medical centers of the Western Province would be to, encrypt the data, and also to create an intranet with a very specific access key. Which would ensure that only a select few could.

The benefits to encrypting the data with a complex key, would be to insure that even if someone did attain access to the data that they would not be able to understand it, and read the medical files.

One way to create a very secure intranet is to give out key chains which wirelessly connect to the server and every hour or so, a new combination of letters and numbers appear on the keychain so that inorder to access the site the user has to provide a user name and the number letter code on the key chain piece.

3. "In 2007, there was a significant loss of data when the system crashed due to a power surge. An effective disaster recovery and backup plan was not in place and has still not been implemented" (lines 72-74).

Evaluate two possible strategies that Dr. Ogola could adopt in order to reduce the problems with major system crashes. [12 marks]

Two possible strategies that Dr. Ogola could adopt would be to have an external hard drive which is updated every day and stored in a different location, or to work off of an Intranet so that the data is always stored online.

Having an external hard drive would reduce to problems with having major system crashed. If having an external hard drive is implemented then if there is a system crash, all of the lost information could be retained by collecting it off of the external hard drive. The best way to go about having an external hard drive is to set one person responsible to export the data every day, and then to store the external hard drive at a separate location in case of a fire or flood because in that case the computers and the hard drive would be destroyed if it was kept at the same location.

Another solution to the problem would be to create an intranet which would allow documents and files to be stored online, and to be worked on online. This is safe depending on how secure the intranet is. It would still be smart to back up the server from time to time as well with an external hard drive.

4. (a) Describe two advantages of a peer-to-peer network. [4 marks]

(b) State two ways clinics in outlying areas could use mobile phones to effectively support healthcare. [2 marks]

a. Two advantages to a peer to peer network is that, with the system it is very easy to share files because, the files are stored on each individual computer so that when they are needed by another user they can be attained very easily and the fact that they are relatively easy to create.

b. Two ways that clinics in outlying areas could use mobile phones to effectively support healthcare is that, they can help to connect remote doctors to hospital doctors if there is a sickness that is unknown that hospital doctors might know what to do. And also if PDA are used, the doctors could use those instead of computers, which would save money.

5. (a) Describe two ways an EMR management system could lead to better healthcare in the Western Province. [4 marks]

An EMR management system could lead to a better healthcare in the Western Province because it makes it easier to share files. This is a benefit because now doctors can share files with more modern hospitals and send patients there. This implies that the hospitals do not need to do all of the tests that the local doctors have already done.

Another way that EMR Management system could lead to better healthcare is because if there was a disaster, and if the EMR system was properly backed up then nothing would happen. But if the system has not be implemented and only paper is used then everything will be lost.

(b) Explain how the main hospital and the outlying clinics can use IT to exchange information. [8 marks]

The Main hospital and the outlying clinics can use IT to transmit data by using an Intranet. This is beneficial because an intranet it built so that data is updated

6. "The government has recently started improving Internet coverage, including WiFi and Broadband Wireless Access, as well as increasing the number of mobile phone providers licensed to operate in the country." (lines 76-78)

Evaluate the use of WiFi and Broadband Wireless Access as means of connecting the various health facilities of the Western Province. [12 marks]

Case Study vocab words

Backup Software-Software that allows copying files or databases so that they will be preserved in case of equipment failure or other catastrophe.

can you find an example of a brand name with specific features it offers? -Justin Scott 6/1/09 9:18 AM

Broadband Wireless Access-Wireless Broadband is a fairly new technology that provides high-speed wireless internet and data network access over a wide area. how wide of an area? -Justin Scott 6/1/09 9:19 AM

Client/server network-A computer network in which one centralized, powerful computer (called the server) is a hub to which many less powerful personal computers or workstations (called clients) are connected. The clients run programs and access data that are stored on the server. Compare peer-to-peer network.

CT scanner (CAT Scan)- Tomography (a method of producing a three-dimensional image of the internal structures of a solid object (as the human body or the earth) by the observation and recording of the differences in the effects on the passage of waves of energy impinging on those structures) in which computer analysis of a series of cross-sectional scans made along a single axis of a bodily structure or tissue is used to construct a three-dimensional image of that structure. The technique is used in diagnostic studies of internal bodily structures, as in the detection of tumors or brain aneurysms.

-A machine does imaging of you body to look for growths and other things that shouldn't be there.

Data redundancy- The occurrence of values for data elements more than once within a file or database. (this is bad because: One of the biggest disadvantages of data redundancy is that it increases the size of the database unnecessarily. Also data redundancy might cause the same result to be returned as multiple search results when searching the database causing confusion and clutter in results.)

Disaster recovery-Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity. This article focuses on disaster recovery planning as related to IT infrastructure.

Embedded IT systems-Any electronic system that uses a computer chip, but that is not a general-purpose workstation, desktop or laptop computer. Such systems use microcontrollers (MCUs) or microprocessors (MPUs), or they may use custom-designed chips. Deployed by the billions each year in myriad applications, the embedded systems market uses the lion's share of all the electronic components in the world.Embedded systems are employed in automobiles, planes, trains, space vehicles, machine tools, cameras, consumer electronics, office appliances, network appliances, video games, cellphones, PDAs, GPS navigation as well as robots and toys. Low-cost consumer products can use microcontroller chips that cost less than a dollar. See microprocessor and microcontroller.

EMR- Electronic Medical Records-An electronic medical record (EMR) is a medical record in digital format. In health informatics and most contexts, EMR and EHR (electronic health records) are used synonymously, but many people define an EMR as just the physician interface and EHR including both a physician and patient interface. The term has sometimes included other systems which keep track of medical information, such as the practice management system which supports the electronic medical record.

Failover systems-Failover is the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.Systems designers usually provide failover capability in servers, systems or networks requiring continuous availability and a high degree of reliability.

File server-In the client/server model, a file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access the files. A file server allows users to share information over a network without having to physically transfer files by floppy diskette or some other external storage device. Any computer can be configured to be a host and act as a file server. In its simplest form, a file server may be an ordinary PC that handles requests for files and sends them over the network. In a more sophisticated network, a file server might be a dedicated network-attached storage (NAS) device that also serves as a remote hard disk drive for other computers, allowing anyone on the network to store files on it as if to their own hard drive.

A program or mechanism that enables the required processes for file sharing can also be called a file server. On the Internet, such programs often use the File Transfer Protocol (FTP).

Fire wall-computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet)

Internet-an electronic communications network that connects computer networks and organizational computer facilities around the world

Intranet-a network operating like the World Wide Web but having access restricted to a limited group of authorized users (as employees of a company)

LAN hardware and software- A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.

Network server- A computer system that serves as a central repository of data and programs shared by users in a network.

Peer-to-peer network- A network of personal computers, each of which acts as both client and sever, so that each can exchange files and email directly with every other computer on the network

Security software and hardware-

Software- McAfee

Hardware- Biometrics

Server-a computer in a network that is used to provide services (as access to files or shared peripherals or the routing of e-mail) to other computers in the network

VPN- Virtual Private Network- A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost.

WiFi- The term Wi-Fi is often used by the public as a synonym for wireless LAN (WLAN); but not every wireless LAN product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type.

Wi-Fi is supported by most personal computer operating systems, many game consoles, laptops, smartphones, pri

Tuesday, March 30, 2010

In Class Work- Paper 1

4. Artificial Intelligence is one way in which computer systems are used to solve problems. It is used in many different situations, including on personal system. An example on artificial intelligence is the use of office assistant (Clippy) in Microsoft Office.

a. Define the term artificial intelligence.
Artificial intelligence is when a computer has some intelligence. It obtains this intelligence by having a programer define words, and phrases, so it "knows" what the computer user is asking it.

b. Describe how Clippy could tell that the user was writing a letter.
Clippy would be able to know that a user was writing a letter because when the programer was programing Clippy, not only defining terms it defines phases or key formats. Clippy would know the general phrases used in a letter. (ie. dear who ever, and also the formatting of starting off with an address or date in the upper right hand corner.) When Clippy recognizes these phrases it will send a dialogue box out to the user asking what to do to continue.

c. Explain why it is possible that Eliza in this conversation is not a human being but really a computer running artificial intelligence.
It is possible for Eliza to be from computer intelligence because the conversation does not make since. It does not flow like a normal conversation between two people. To start off a conversation it is never started with "Hi I'm Eliza, Tell me your problems." just like that and expect the other person to tell you the problems. The fact that the other contributer in the conversation went along with it shows that it was what they were expecting it to be a computer with artificial intelligence. Also, A key tell of that Eliza is really just a computer is because she asks what "you certainly would means" any moderate level english speaker knows what this means. When Eliza asks what it mean and then the definition that is given then is stored in her data base so in the future she will know what it means.

Friday, March 26, 2010

Area of Impact: Health

3. In many hospitals around the world, surgeons are performing surgery with the assistances of robots. Robot surgery has been taken a step further with surgeons being able to use remote-controlled robots to perform surgery on patients thousands of miles away.

a. Identify one input and one output device using in robotic surgery.

One input device is a joy stick which would control the knife in surgery. One output device is the monitor in which the doctor is watching the surgery take place on so he knows where to move the tools.

b. Describe one capability and one limitation of Robot when used in surgery.
One capability of this sort of robotic sugary is that the doctor could be out of the country or the patent could get a specialist to do the work, this would save the patient money because they no longer have to travel out of the country for the work. ONe limitation to this sort of persedure is that the robot can not be nearly as persice as a human, and if something was to go wrong with the technology, then the patient will be in danger because the doctor is not there to finish the surgery

d. Discuss one economic concern, one reliability concern and one other concern patients under going robotic surgery. Evaluate the significance of these concerns.

There are many concerns for this type of surgery. When discuss the economics behind the surgery it really matters if the surgeon being used is out of the country and there is no one else who could perform the surgery then it would be cheaper rather to have to travel. If it is such an important surgery like heart surgery then most likely doctors will not recommend flights back afterwards. This will increase the cost. In this case it would appear to be more beneficial to use to robotic surgery so the recovery could be in the comforts of home. Both cases the cost would be more but it would seem that traveling would increase the cost even more.

There are much more reliability concerns, money is something that can be earned and fixed, but if something goes wrong in surgery the patient could easily die. There are more smaller concerns as well. Being a doctor, they must have great control of their hands and not miss place the knife and accidently cut a vein, or tendon. also the input device being a joy stick, does not have nearly the control of hands. this effects the reliably because it seems that these sort of surgeries would not be as reliable as with a doctor.

Another concern would also be even with all of the protection and security, the transfer of information from the doctor to the patient must take place online which means the connection could be lost or someone could hack into maliciously. and potentially kill the patient. this is a great concern because there are people with great hacking abilities.

With all of these concerns taken into consideration, it seems like there are too many concerns to the benefits. As stated above money can be re-earned, but when someone's life/health/ and well being is on the line then the money should be spent in order to insure a surgery by a doctor doing the work is done.

Monday, March 15, 2010

Simulation Pratice

ITGS SL1/HL2

Modeling/Simulations Practice

1. When customers visit a supermarket, they do not expect to wait in checkout queues for too long, however the supermarket manager cannot afford to have all the checkouts open all of the time.

In an attempt to solve the problem the supermarket manager may decide to make a computer model using a spreadsheet to calculate the optimum number of checkouts that should be open at any time. N07P1

(a) Define the term computer model. (2)

Computer model is a simulation of a real life situation like a check out line a grocery store that allows variables to be changed in order to receive the most possible productivity.

(b) Describe two inputs into the model that would be needed in order to calculate the best number of checkout operators. (4)

Two different inputs that could be used could be, a key board for alternating the data also sensors which automatically collect data from the check out machines.

(c) Explain why this or any other computer model may not give accurate results. (4)

This and other computer models like it could potentially not give accurate results because there are going to be other variables that can not be accounted for. this would cause the rate of costumers to change and then the amount that the grocery store opens would not be correct. Another way that the table could not work completely is because the grocery store can account for holidays but there are other holidays and special events that they will not be able to calculate, there might be a big local game so everyone goes to the store that night or something along those lines.

2. Computer models and computer simulations are often used by businesses to test and train staff. One situation where a computer simulation is used is in the training of airline pilots. M07P1

(a) Define the term computer simulation. (2)

Computer simulation is a situation that is completely simulated- pilots are often trained using this sort of technology.

(b) Describe two input devices that would be used in a pilot training computer simulation. (4)

Two input devices that a pilot uses are the joy stick thing that they use to steer the plane and also another input device would be all of the buttons in which control the wings, wheels, air pressure, and others as well.

(c) Explain one benefit and one problem associated with training pilots on simulators instead of using real planes. (4)

One benefit to training pilots in simulations instead of real life is that they are not liable for the really expensive planes if they do "crash" while they are learning. One draw back is that it is a simulation, yes if it is good enough to train people with it must have a lot of the different variables connected into it, but there is nothing like first hand experience, and truly learning how to fly the plane and how it feels like.

Monday, March 8, 2010

Vocab

model- a computer design that can "predict the future"
simulation- a computer model that is designed to copy a real situation and teach people to work with it, ie, the way that pilots are trained.
feedback loop-A feedback loop (FBL), sometimes called a complaint feedback loop, is an inter-organizational form of feedback by which an internet service provider (ISP) forwards the complaints originating from their users to the sender's organizations
tutorial software- Software that shows the user how to run the program
training software- software that tells the user how to run the program
wizards and assistants- Software that helps with a specific task (normally recognizes the task then helps with it ie, completing the date)
help menu and help features- Helps the user search for and then complete specific tasks,
“Read Me” files-A file meant to be read before taking any significant action with the items in its directory

Monday, March 1, 2010

Class work

4.5 reading and questions

There was not enough time to finish

4.25 Fire departments often do "controlled burns:" that is, they carefully burn areas of brush to prevent a destructive wildfire from starting alter. some departments use a computer model to tell when it is safe to do a burn. A fire department official with 25 years experience believed the computer model was not very good. He ignored the model, used his own judgement, and did a burn safely with no problems. But he was reprimanded by his boss for ignoring the computer. Give an argument in his defense. Give an argument in support of his boss.

The worker would say that when he started working as a fire fighter, they did not have the option of this software, he learned by using reason. also he would say that his brain can take into effect all of the conditions, and really have a better understanding of what is going on. The boss would say that the company has standardized on the modeling software so he should participle in effort, the old guy does not get spacial treatment just because he is old.

4.26 suppose there are three companies that make a similar product. One does physical tests to check the safety of the product. one uses only computer simulations. the third will not disclose the testing methods it uses. suppose ou are on jury for a case where someone's is suing on of the companies because of an injury received from the product.
a. would your decision about awarding money to the plaintiff be be affected by the company's policy about testing? if so how? if not, what factors are more important to you?
b. suppose reliable data show that the injury for the product is almost identical for all three companies. With that additional information, would your decision be affected by the company's testing policy.

a. My decision about awarding money would be affected by the policys about the testing, the one company that will not release their information seem very questionable. I feel most comfortable with the physical testing and then the computer modeling close behind, and very uncomfortable with the one that is not mentioned.

b. with the second information, i would want to compare all of the testing results. If all of the different companies had the same problem then it was something that all three companies were looking over.

4.27 An article in the magazine in 1993 stated that "since the 1960's more than 100 separte studies have confirmed that doubling of the CO2 concentration would raise average surface temperatures by one to four degrees centigrade." was this an accurate statement? Explain your answer.
  • I agree with this statement but in the reading it refers to an idea of a potential new ice age, this is obvisoly incorrect and it shows that computer modeling is not always correct. This is correct because all of these different studies used computer models, The models use past knowledge and then create a hypothesis for the future based on what was entered into the computer model.
4.28 which of the following models do you think would produce very accurate results? which do you think would be less reliable?

Reliable
  • Income tax- that is forumal based
  • moon- science based
  • co2 science based
Not reliable
  • optical fiber- 30 years is a long time
  • speed of a boat- conditions are always different

4.29 suppose you have the following data:
  • The number of tons in the known reserves of an important natural resources say copper
  • the average amount of the resource used per person (worldwide) per year
  • the total population of the world.
Suppose a computer program uses these data to determine in how many years the resource will run out. it also uses and ..... Out of time....


Friday, February 26, 2010

notes

Spreadsheets can contain
  • Values such as numbers and dates
  • Labels such as column and report headings that explain what the values mean
Relative, so they refer to different cells when they are copied
Absolute so the formula references never change when they are copied
automatic updates
Functions-automate complex calculations
Macros store keystokes and commands so they can be played back automatically
templates offer ready-to-use worksheets with labels and formulas already entered

Tuesday, January 12, 2010

A Gift of Fire Class Questions

6.8 Describe two things the entertainment industry has done to protect its copyrights. For each, ell whether you think its justified.
Two things that entertainment industry has done is to make it difficult for DVD's to be uploaded to computers. DVD companies also realizes DVDs to Online costumers and sellers later one. Another thing that has been done is they watch what is going on online. For example on Youtube, when TV shows are published onto Youtube they are soon taken down because of copyright violations.
6.11 This book, like many others, includes short quotations from other people's work at the beginning of many sections. Such quotes are are almost always used without explicit permission. Explain why they are fair uses.
They are done under fair use because the quotes are properly cited and they give credit to where it is deserved. Also this book uses footnotes which are also a very good way to cite information and to give credit to where it is rightfully deserved.
6.13 A political group organized a forum on its Web site where people were encouraged to post and comment on individual newspaper articles relevant to political issues of concern to the group. Other participants added their comments, and debate and discussion of the articles continued. Two newspapers sued, arguing that posting the articles violated their copyrights. Analyze the case. How do the fair-use guidelines apply? Who should win?
I think that the newspapers should win. I think that it is wrong for the people to post whole articles online with no permission and also no citations to the original source.
6.14. You are a teacher. You would like your students to use a software package, but the school's budget does not include enough money to buy copies for all the students. Your school is in a poor neighborhood, and you know most of the parents cannot afford to buy the software for their children
a. List some ways you could try to obtain the software without making unauthorized copies.
One way that I think would work is writing them a letter asking if you can get more licenses for the software. I think that if the company knows the situation then they will be understanding, and give the licenses.
b. Suppose none of the methods you try work. WIll you copy the software or decide no to use it? Give some arguments for and against your positing. Explain why you think the arguments are on your side are stronger.
I do not think that the question can be answered with the information that has been given. I that that it would really matter how old the kids are that are using the software, and if it is a software that will only be used for school. I mean that they will not be using it on their own for recreational use. If they are using it on their own then I think that the copies should not be made, because then thats bad if they are getting something that they want, illegally. But if it is something that is not important, and that the students will not be tempted to buy on their own then I think that it is fine. This argument that if they are not going to buy it anyway then it is fine is a better argument because if this is the case then the company is really not loosing out on that much money, and even if the class still felt it was wrong then the lesson plan could just be changed.

Monday, January 11, 2010

Vocab

formatting-line spacing, text size, margin size,
template- a pattern used to create more documents.
spell check- To verify the spelling in a document using a program
grammar check- A program on the computer that attempts to verify the grammar. (does not work)
ASCII/unicode-ASCII- binary code in 8-bit bytes Unicode- allows for more characters- both how the computer works with use of 1 and 0's
animation-The rapid display of 2D or 3D images to create the allusion of movement
bit-map versus vector graphics Bit Mapped graphics have more control but they tend to look grainy when blown up. on the other hand vector graphics or object oriented graphs are better for creating computer things, like logos, charts and graphs. And the lines are smother.
object-oriented- When the images that are created using the computer are made with vectors and not pixels.
clip art Images on the computer that are made to be used as logos and such, and are made with vector graphics so that the client can resize the graphic to any size that they want.
CAD-Computer aided design software-it is cheep and quick-can help business make designs of what their prototypes will look like.
hypermedia- A hypermedia system connects all different and related forms of information(media) in one place so that it can all be presented together.
hypertext- Text on a document/webpage (only on the computer) and this text has links imbedded in it so that it can take you to another place.
pixel- For computers and science, the smallest part of a picture, and they appear grainy if the image is blown up.
resolution- the number of pixels per square inch in a computer display.
MP3- MPEG-1 Audio Layer 3, an audio file using lossy file compression so it gets rid of the sounds that we can not hear, so this way there is no space on the CD that we can not hear.
MIDI-Musical instrument design interface- the protocol for communications between musicians and computers.
morph- A change of shape in computer design images.


PDF-Pros Free access to doc (portable);can include images/graphics.
Cons- Not everyone can edit it; potentially large files

Text-Pros-Simple;portable; tiny files
-Con-Simple; only text; No Unicode

RTF (rich text format) (blogger)-Pros- Portable;allows formatting
Cons-potential conflict with html; no unicode

MSWord-Pros-allows vast formatting;allows graphics/images; easy to edit
-Cons- Not portable; expensive

Wednesday, January 6, 2010

1-6-10 notes/homework

Intellectual Property-
What the creator of the work is allowed to do.
  • To Make Copies of the work
  • To produce derivate works, such as translation into other languages or movies based on books
  • To distribute copies
  • to perform the work in public
  • to display the work in public
Problems from new technologies
  • Storage of all sorts of information (text sound graphics) in standard digitized formats
  • High-volume, relatively inexpressive Digital storage media, such as hard disks, CD-ROMs and DVDs (digital versatile dishes, also called digital video disks)
  • character scanners and image scanners, which simplify converting printed text, photos, and artwork to digitized electronic form
  • compression formats, such as MP3 and Div X, that make music and movie files small enough to download, coy and store
  • the ease of copying digitized material and the fact that each copy is a perfect copy
  • the ease of distributing digitized material over computer networks
  • the World Wide Web which makes it easy to find and download material and
  • peer-to-peer technology, which permits easy transfer of files by large numbers of strangers over the Internet without any centralized system or service
The fair use doctrine allows uses of copyrighted material that contribute to the creation of new work (such as reviews that quote part of a copyrighted material that work) and uses that are not likely to deprive authors or publisher of income of their work.
  1. the purpose of nature of the use, including whether it is for commercial purposes or nonprofit educational purposes ( copyright for commercial purposes is less likely to be fair use.)
  2. The nature of the copyrighted work( creative work has more protection that a factual work.)
  3. the amount and significance of the portion used.
  4. The effect of the use on the potential market for or values of the copyrighted work ( uses that educe sales of original work that less likely to be considered fair.)
Questions
6.6 Describe two technical means of protecting copyright of intellectual property on the web, and two management solutions.

Two technical means for protecting intellectual property on the web is the way that they set DVDs up so that you must have special software to copy the DVD onto your computer. Another thing that they do to protect intellectual property is that on software it has to be registered so that the company knows where the software is going.

Tuesday, January 5, 2010

notes 1-6-10

Painting Bitmapped Graphics
Painting Software.
  • paint pixels on the screen with a pointing device
  • pointer movements are translated into lines and patterns on the screen
  • Stores an image at 300 dots per inch or higher.
Pixels: tiny dots of white, black, or color that make up images on the screen

The Palette of tools mimics real-world painting tools
  • Also contains other tools that are unique to computers
Bitmapped Graphics (or raster graphics): pictures that show how the pixels are mapped on the screen.

Color Depth: the number of bits devoted to each pixel

Resolution: the density of the pixels

Digital Photo Management software programs such as Apple Iphoto and and Microsoft Picture IT! simplify and automate common tasks associated with capturing, organizing, editing, and sharing digital images

Drawing software stores a picture as a collection of lines and shapes (called object-oriented or vector graphics)

Memory demands on storage are not as high as for bit-mapped images

Many drawing tools-LIne, shape and text tools are similar to painting tool in bitmapped programs.

Bit-mapped painting (pixels) gives you these advantages:
  • More control over textures, shading and fine detail
  • Appropriate for screen displays simulation natural paint media and emellishing photgraphs.
Object oriented drawing gives you these advantages:
  • Better for creating printed graphs, charts, and illustrations
  • Lines are cleaner and shapes are smoother.
Computer Aided Design (CAD) software
  • Allows engineers, designers, and architects ot create designs on screen for products ranging from computer chips to public building
  • Can test products prototypes
  • Cheaper, Faster, and more accurate than traditional design-by-hand techniques
Computer aided manufacturing (CAM) is the process by which data related to the product designs are fed into a program that controls the manufacturing of parts

Computer Integrated Manufacturing (CIM) refers to the combination of CAD?CAM and is a major step toward a fully automated factory.

Rules of Thumb: Making Powerful Presentations
  • Remember your goal
  • Remember your audience
  • outline your ideas
  • be stingy with words
  • keep it simple
  • Use a consistent design
  • Be Smart with Art
  • Keep each slide focused
  • Tell them what you going to tell them, then tell them, then tell them what you told them.
Dynamic Media: Beond the printed Page
Desktop Video:computer, Film and Tv
Analog and digital Video
  • A video digitizer can convert analog video signals for a tv broadcast or videotape into digital data.
Many video digitizers can import signals from tv, videotaps, video caameras, and other sources
  • Signals displayed on the computers screen in Real Time- at the same time they're created or imported
Digital video cameras capture footage in digital

Digital vide can be copied, edited, stored, and played back without any loss of quality

Digital vido will soon replace analog video for the most applications