Sunday, December 15, 2013
Final Blog :)
I am extremely happy that I decided to take this class as an honors and complete the blog. I have never made a blog and it was valuable to learn how to create one, and include pictures and videos. I would definitely create one again because it is fun to put everything I learned in one place! The class in general was very valuable to me and will not only help me now, but in the future as well.
Chapter 14 Enterprise Computing
For this chapter I just wanted to discuss the career in which I want to pursue. The job I would like to major in is Human Resource Management. HR is middle management which is responsible for implementing the strategic decisions of executive management. Human Resources is responsible for recruiting and hiring employees, maintaining employee records, evaluating employees, training employees, and managing employee benefits and compensation. This interests me because I am extremely organized, love working with people, and all of its duties would be something I would never get tired of doing.
Chapter 12 Information System Development
A system is a set of components that interact to achieve a common goal. A system development is a set of activities used to build an information system. System development activities can be grouped into larger categories called phases. The system development life cycle can contain five phases which are planning, analysis, design, implementation, and operation support and security. System development should involve representatives from each department in which the proposed system will be used. Some data and information gathering techniques are review documentation, observe, and survey. This chapter made me realize how much time and effort goes into creating things on the computer and Internet.
Chapter 11 Computer Security and Safety, Ethics, and Privacy
A computer security risk is any event or action that could cause loss of or damage to computer hardware. There are many different kinds of hackers and it can happen at any time one goes onto the Internet. There is a question on page 577 that asks if people should use a surge protector on electronic equipment, appliances, or even the entire house. I do not think that people should use a surge protector on everything in the house. A surge protector should only be used for important electronic equipment such as the television, or computer. There are many health concerns of computer usage. To name a few, repetitive strain injury, and carpel tunnel syndrome. Computer addiction occurs when the computer consumes someone's entire social life. I personally picture the cliché guy in the basement, eating his moms home cooked meal, and playing video games. Fortunately, computer addiction can be cured from therapy and support groups.
Chapter 10 Database Management
A database is a collection of data organized in a manner that allows access, retrieval, and use of that data. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. For example, you can type text on a keyboard, talk into a computer's microphone, and transfer photos taken on a digital camera to the computer. I have typed text on a keyboard, talked into a computer's microphone while skyping, and transferred photos numerous times from a camera to the computer.
Chapter 9 Communications and Networks
Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. For successful communications you must need a sending device, a communications channel, and a receiving device. A network is a collection of computers and devices connected together via communications and transmission data. A communications device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device. A router is a communications device that connects multiple computers or other routers together and transmits data to its correct destination on the network. For example, when I got WiFi at home we had to get a wireless router so we could have wireless throughout the house and more than one device could connect to the Internet.
Chapter 7 Storage
Storage holds data, instructions, and information for future use. A storage medium, also called secondary storage, is the physical material on which a computer keeps data, instructions, and information. Examples of storage media are hard disks, solid state drives, memory cards, USB flash drives, and smart cards. I personally choose to store all of my school work and music on a USB flash drive. I love doing that because it is extremely convenient but the problem is that it can be easily lost. Cloud storage is another storage option, in which the actual storage media is used transparent to the user. I have never stored anything personal on cloud storage. In high school I was Editor-in-Chief of the school newspaper and we were required to store the pictures and stories on the cloud. I thought it was rather difficult to get the hang of and I would have rather saved things on a flash drive.
Chapter 6 Output
Output is data that has been processed into a useful form. That is, computers process data to information. The form of output varies, depending on the hardware and software being used and the requirements of the user. While working with a computer, a user encounters four basic types of output: text, graphics, audio, and video. Examples of output that contain text are memos, letters, press releases, and reports. Many forms of output include graphics to enhance visual appeal and convey information. For audio, users download their favorite songs from iTunes to listen to music while on the computer. For example, I will download new music from iTunes to put on my iPhone and while I work on homework I like to turn on iTunes because it relaxes me. For video, websites will sometimes include a video for better understanding. Since I show cattle and every year we look online to for auctions, some of the websites allow for a user to watch a video of the calf.
This is a video that a farmer had posted for people to check out their cattle for sale.
Chapter 5 Input
Input is any data and instructions entered into the memory of a computer. An input device is any hardware component that allows users to enter data and instructions into a computer. There are numerous input devices but to name a few they are a keyboard, mouse, touch screen, game controller, microphone, and a scanner. The input device that I use most frequently is a game controller. Game controllers include gamepads, joysticks and wheels, light guns, dance pads, and a variety of motion-sensing controllers. I like to take a break from homework and play my best friend in Mario Kart Wii. It is nice to take a break and play a few games and get back to homework. We also will play PlayStation 2 Hockey because that is my best friends favorite sport to play. She might be able to beat me in that but I can beat any one in Mario Kart Wii. :)
Chapter 4 The Components of the System Unit
The system unit is a case that contains electronic components of the computer used to process data.
This is a labeled system unit. In class we also had to draw and label the components of the system unit ourselves. For every instruction, a processor repeats a step of four basic operations, which comprise a machine cycle. The steps are fetching, decoding, executing, and if necessary storing. In this chapter there is a question from Ethics and Issues that ask if computers and devices should be banned from the classroom. I do think that computers and devices should be banned from the classroom. They should be banned because students these days are using devices to cheat, and text which are a distraction from the teacher. A computer should only be allowed if it is for note taking, but there should be a computer lab in each school which students can go to instead of using them in the classroom.
This is a labeled system unit. In class we also had to draw and label the components of the system unit ourselves. For every instruction, a processor repeats a step of four basic operations, which comprise a machine cycle. The steps are fetching, decoding, executing, and if necessary storing. In this chapter there is a question from Ethics and Issues that ask if computers and devices should be banned from the classroom. I do think that computers and devices should be banned from the classroom. They should be banned because students these days are using devices to cheat, and text which are a distraction from the teacher. A computer should only be allowed if it is for note taking, but there should be a computer lab in each school which students can go to instead of using them in the classroom.
Chapter 8 Operating Systems and Utility Programs
System Software consists of the programs that control or maintain the operations of the computer and the devices. System software serves as the interface between the user, the application software, and the computer's hardware The two types of system software are operating systems and utility programs. An operating system is a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources. Most operating systems perform similar functions that include starting and shutting down a computer, providing a user interface, managing programs, managing memory, and many others. This chapter also discusses a virus. A virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way a computer works without the users knowledge. While enrolled in this class, my home laptop got injected with a virus. The virus made my computer extremely slow, caused a lot of pop ups, and got to the point where I could not even connect to the Internet. I took my computer to Best Buy and had them download the best virus protection one could buy, and since then I have not had a problem with my computer.
Chapter 3 Application Software
Application software consists of programs designed to make users more productive and/or assist them with personal tasks. The four categories of application software are graphics and multimedia, business, home/personal/educational, and communications. I use almost every category of applications software every day. For the business software I use word processors to complete assignments. For the communications software I use email and instant messaging to talk to my professors about assignments and instant messaging for quicker conversation.
Chapter 2 The Internet and WWW
One of the major reasons home, business, and other users purchase computers is for Internet use. The book says that today more than one billion home and business users around the world access a variety of services on the Internet. The Internet has its roots in a networking project started by The Pentagon's Advanced Research Projects Agency, an agency of the US Department of Defense. Chapter 2 also covers searching the Web, major search engines, and browsing the Web.
This graph shoes the most common search engines and the ones that are used most frequently. A term that I found most important out of this chapter is netiquette. It is short for Internet etiquette and is the code for acceptable behaviors users should follow while using the Internet.
This graph shoes the most common search engines and the ones that are used most frequently. A term that I found most important out of this chapter is netiquette. It is short for Internet etiquette and is the code for acceptable behaviors users should follow while using the Internet.
Thursday, December 12, 2013
Chapter 1 Intro to Computers
Computers are everywhere: at work, at school, and used at home. Whiles some computers sit on top of a desk or on the floor, mobile computers and mobile devices are small enough to carry. Mobile devices, such as cellphones, often are classified as computers. For example, instead of getting on my computer to check grades it is more convenient to load them on my phone and check them. I work at Steak N' Shake and I use a computer there to ring in orders, and pay for orders. Without the computers it would be extremely difficult to add up the prices and taxes for the order and give people the correct change. I use the Internet to communicate with people, shop, bank, download music, and share photos. The mobile computers and devices I use are notebook computers, smartphones, media players, and digital cameras. I also use a lot of game consoles such as Nintendo Wii, PlayStation, and a Gameboy Advance. A graph on page 29 shows how many households do not use the Internet or related technologies. 30% of households have never used a computer to create a document and 20 % of people have never sent or received an email. This statistic surprises me because that is a large number who have a lack of experience with technology. I checked out an article that was listed under chapter 1 titled "6 Things You Should Never Reveal on Facebook." The one I found most interesting was that you should not reveal birth date and place. The article said one should not do that because if you provide the year and where you were born, you've just given identity thieves a key to stealing your financial life. study done by Carnegie Mellon showed that a date and place of birth could be used to predict most, and sometimes all, of the numbers in your Social Security number.
Wednesday, November 6, 2013
My first very own blog..
So it's my first very own blog. Not really sure what I am doing here.. but I'll figure it out.Throughout this entire site I plan on including what I am learning in class, how it will help me in the future, and how technology has changed our lives. I am sure this outline change as I go, but this is just a rough outline on what I want to include! I think it would be awesome to take polls around KCC to see how many people have iPhones vs. Droids and to see if they would ever switch. I think that would be very interesting because I know that with technology advancing more and more every day, I would like to know what kind of cell phone they are using! I would like to include how many people have taken an online class here at KCC. Since I am taking my first online class next semester, it will be interesting to know how popular they are. Of course I am going to have lots of writing throughout this site, but I want to post a lot of pictures and graphs. Finally, I want to personalize the entire blog. Relate things to myself, show more about me and what interests me. So after my first very own blog is done, lets get this party started! :)
Subscribe to:
Posts (Atom)