Friday, May 15, 2009

Welcome to London students

Welcome to our Intro to IT blog. This is your location to share comments and impressions. Be sure to check the course website and the course wiki linked here.

11 comments:

Emily said...

Chapter One- Why Computers Matter to You: Becoming Computer Literate

The first question presented in the book is focused around computer literacy. There are so many faucets of this adaptation to computers and also, many benefits in this area as well. At first, I wondered how much should an everyday computer user know? Of course, much of page four answered that for me. I think as well, the question of “How much do I really care about my own computer’s life and how do I want to perpetuate that life? If I don’t protect my computer, will it become overrun with virus after virus? Or, if I load it down so much with anti-this or anti-that will it still function properly?” Being that I specifically had no clue how viruses and hackers work, it is nice that I can learn basics; things I thought were upper division computer knowledge. I am also an education major, and it is quite interesting to see all the different jobs that truly need computer help. I know that computers are taking over the education field. From my own experience, I have noted that computers are essential in lower division education (for research and interactive learning), and a personal computer in a necessity in upper division school (again, for research and also for contacting a professor, etc.) Also, keeping in mind that I will be teaching students that want to fill other positions besides just English majors, I want to create a universal knowledge for students who are going to go into law enforcement, or the arts, or business. The concept of having a chip in one’s arm to verify identity is a little creepy. I must say that the intention is good, but how dangerous can that be? I understand it is for a person’s own benefit, but I am not quite sure that would give everyone freedom and equality to do what they want within themselves. Another question that is slightly bothersome is the concept of “Big Brother.” Is it right for the government to be able to control every move through an artificial consciousness? I believe that humans need breathing room to be as they are, good or bad. That is what continues life on Earth.

Emily said...

Chapter Two- Looking at Computers

This chapter was a great way to see the various inputs and output devices of the age. While most of this chapter was a basic review, I enjoyed brushing up on the actual parts of the computer and its workings. I would continue to expound on this chapter, but it is really quite basic. I think that the most interesting part of the chapter are the mice and “accessories” that have been created within this age.

Chapter Five- Using Software System

Often I have wondered, “What exactly is required for a computer to run and work?” Studying the punch cards are a good way to visually see an operating system, I believe. It was also interesting to see the break-down of Vista in this chapter. I have Vista on my own computer, and I want to know why it is better, and why would someone put in effort to replace XP? Also, the table on page two hundred and thirty-five is a wonderful tool for anyone. I have always wondered the relevance of the file name, and now I understand how ingenious this system has become. Within that context, I would like to understand more about an “.rtf” file. How does it become so passive?

Chapter Six: Understanding and Assessing Hardware

This book is wonderful for every type of computer user. I am more efficient than the first part of chapter six, but it is nice to have as a review. CPUs are the first subject at which was a new concept to learn. I think I have a Turion64 which has been enough for me so far. Is there a better choice for my next computer? Another part of this chapter that was most amusing was the memory discussion. How do they make memory smaller and smaller? Most of the questions presented in this chapter are part of what makes shopping for a computer so interesting, and what makes the computer market so diverse.

Emily said...

Chapter Three- Using the Internet

With the internet in mind, often times I think about hackers and invaders of privacy. I had no clue that the internet and web were two different things, although when you asses the actual word, it makes total sense. I was glad to see that the book breaks down the different parts to the internet and its different uses. Personally, research and limited communication are the two things I have used the internet for, but it is nice to see so many options available outside just this.

Emily said...

PolkaSpots was an awesome experience, and I would like to discuss some of my notes in class if we get a chance. Of course, today we will be discussing parts of the proposal for the final paper, but I would also like to talk about specific problems with computers. I know from Chapter Seven the difference between a worm and a time bomb, but it would be nice to hear more real life application of these issues. Are there any real issues with worms on a global scale? IS there a way to prevent all of these without having to buy every protection device in the store? Is there a way to manually get a virus off without having to take your computer to a store? Also, I would like to talk about the actual workings of antivirus software and quarantining. What are the best ones on the market? I hope to guard my own computer through these proactive programs.

Chapter Eight is based on the actual mobile devices that can be used in everyday life. I would like to know how to use these more efficiently. Napster would also be an interesting subject to discuss. Also, I would like to define the difference between legal and illegal file sharing.

aseller3 said...

I would just like to start off saying how much I loved the field trip yesterday! It really taught me a lot! At first I wasn't sure I was going to be able to understand the terms they were using but they made it actually very understanding to an ammateur. I understood the convrsation we had in class about security and hackers but I am still a bit skeptical about some of the software that is out there that is supposed to protect us from virus. I would like to learn a little bit more about that. Also some of the companies require fees, what exactly am I paying for them to do? As far as the mobile computing goes, I definetly know a lot about this considering my iphone is usually attached at the hip!

Emily said...

Chapter Four- Application Software

I must admit that I am quite out of the loop when it comes to the concept of software. I understand that it helps with the running of a computer, but how does one know which program is the best? For businesses, how do they know what is best? Is there some type of computer software magazine full of the newest software adverts, to which only they "techies" subscribe? How do adverts get across the globe? Understandably, there is the WWW to help with the advertising, but that does not give anyone the actual experience of the software.
There are many different types of software online. What happens if the online servers breakdown? Would it be the responsibility of that software provider to help with the refund of the lost information and data, or would the consumer just be out of luck?
It is interesting to think that the whole time I have been using a computer, which is much of my life, that I have not questioned this use of software. Am I using the right software? Is the software that I am using working hard enough, or is there one that would suit my needs better? Many of these questions ran through my mind while reading about the software used in every day life. It will be a great discussion.

aseller3 said...

Chapter 4

I had no clue that microsoft word and excel werent grouped in the category. I would have just said they were all software because the fact that they both hold and store some sort of written information.My favorite section from this chapter would be the part about digitally altering images on a computer. I find this software to be amazing because you can do so much editing with a photograph and complete change it. I also was curious about the MP3 editing software. I had no idea this was available and could actually be done! It was exciting to read about things like shutterfly and flikr because I use both of them as well. Another great entry was the side note about "How to Open the Unknown". I can't even begin to tell you how many times this happens to me and how frustrated it makes me. Now I want it to happen so I can do the 5-steps I learned from this chapter! I agree with a lot of the questions you have Emily such as the software I'm using and if it is the right one for my computer based on the interest I have and what I use my computer for.

Emily said...

Chapter 9- Behind the Scenes of System Hardware
I am so glad to finally be discussing binary again, in dept. With our trip to Bletchley so recent, it is nice to tie in how the whole process worked with “ones and nots.” I must assume that the valves that we saw and I now posses (hehehee ) are considered switches by this text book. It is interesting that the book talks nothing of the Colossus using these tubes, but rather calls ENIAC the first digital computer. Why is this true? Also, the discussion of CPUs is back! I know that I am supposed to understand the workings of this machine, but why so many different types? It is also interesting to read up on the “pipelining” concept which increases the CPUs speed. Can we visually discuss this? The cache memory seems to be an important part of computer memory. It this what controls “document recovery?”

Chapter Ten- Building Applications
Alright, here is the techie side of things. I have always used applications, which has become a common word thanks to Apple iPods, but now they teach us the workings. I am curious to know if applications are like inventions. When someone thinks up an idea for an application, do they get it patented to protect the idea from large corporations? How does this all work legalistically? It is interesting that they test the applications on consumers, as well. Is there a techie mailing list that apps creator can use to send out for application testing?

Emily said...

Chapter 11- Data Bases and Information Systems

I realize that Databases are important to those that are so influenced by organization. However, what if you want to share a database that is quite large? Like, if Microsoft wanted to share their customer information database with a computer company? How would that work? There are many different types of databases. Which one is the best type, and how does one what is the best? The question of a query language is also important. Can you explain the actual language, or is it like any other program language? Within the concept of relational databases, how does the computer know which relates to the other? Is it a simple recognition of the language, or is it programmed to actually compare the information given by two different sources? There are data bases to record everyday workings of businesses. Is this also monitoring the internet access, what each employee is looking at while on the clock? Data mining seems to be a wonderful concept to create efficiency within an office, or at least the trends. What are other ways data mining can be used in the world?

Emily said...

Chapters 12&13
Again today, we will be discussing computers in a business setting. Due to networking, there is the possibility of sharing software on a business’s computers, instead of installing a program per computer. Are their drawbacks to this system of setup? Is it legal? Also, discussing Internet in the workplace, why did the creator decide to go global with it, it seems like a wonderful tool for military purposes. Can we discuss the client/server networks? I realize that WANs are larger than LANs but does that make them better? What is the cost difference for a company wanting WANs verses LANs? Again, with visual learning, can we construct the components for a client/server network? Is there a legal issue about using a vast amount of computers to one system? What if an employee taps into their work server at home; is that possible? Is it really possible for anyone person to “own” the internet? I am glad to see that we are diving into the workings of the internet. Can we go from small to large components of the internet, in order to understand the transaction and workings taken place? FTP seems essential in the use of the internet, how is it regulated, or does it need to be? Is every email stored for security reasons, is it possible to do so? How do internet traffic controllers know what to look for as far as security goes? Basically, what sends up a red flag for them?

kering said...

to some extend i can say iam a computer literate.inmy understanding a computer is any device with input process and output. so i have found myself using devices everyday without much problem.hopefully this clas will help me improve.