Thursday, November 17, 2011

Computer Network Security News

Read any computer network related articles from only the selected links below and prepare to share to the class your findings on



  • any social/ethical issues

  • stakeholders involved

  • Impact of the issues

  • one main problem and one suggested solution to the one problem.

http://www.topix.com/tech/computer-security


http://network-security.alltop.com/


http://topics.cnn.com/topics/computer_crime

Computer confluence online

Click on the link below for the online resource

http://wps.prenhall.com/bp_beekman_compconf_7/0,10008,1922315-,00.html

Monday, November 14, 2011

Computer Virus Activity

Read chapter 6 from Hacker High School in the pdf link http://www.hackerhighschool.org/lessons/HHS_en6_Malware.pdf on Malware and answer the following questions in the handout provided

Wednesday, November 2, 2011

Intellectual property: Ethical Issues

Intellectual property includes ideas, discoveries, writings, works of art, software, collections and presentations of data. Copyright, trademarks and patents exist to protect intellectual property. However, the easy and accurate duplication methods made available through IT can undermine such protection.
Task (Due date 11/11/2011)
Prepare and 3 minute video and upload the same in Youtube on intellectual property. Your Youtube video should include the following:
  • Definition of intellectual property and local examples

  • Few examples from research on intellectual property violations

  • Describe the different ways of protecting intellectual property

  • Briefly describe some IT tools, systems and methods that have been used to undermine such protection ( other words problems related)

  • Suggest at least four brief Information technology solutions

  • Appropriate instrumental music in the background uaed in the appropriate sections

  • Your own voice recording included in the appropriate sections

  • Apply most of the skills and techniques of the software of choice appriately and efficiently

  • Assessment rubric
    0-1: The techniques and skills used and the quality of information included in the uploaded video is of low standard.
    2-3: The techniques and skills used, the appropriateness, and the quality of information included in the uploaded video is of average standard.
    4-5: The techniques and skills used, the appropriateness, and the quality of information included in the uploaded video is of good standard.
    6-7: The techniques and skills used and the quality of information included in the uploaded video is of excellent standard.

    Tuesday, November 1, 2011

    Computer Networks Investigations

    Further to the work covered in the lesson use the links below to make additions to the notes written earlier.

    http://www.freewimaxinfo.com/computer-networks-types.html

    http://www.wifinotes.com/computer-networks/network-communication-devices.html


  • What is the definiton of computer network here?


  • Make any additional notes on LAN, MAN, WAN, VPN, PAN, SAN, CAN


  • Make additional notes on Internet, Extranet, Intranet, Uses of Intranet, and what are some advantages and disadvantages of intranets.


  • Distinguish between the following network devices: hub, switch, router, repeater, gateway, bridge.
  • Thursday, October 27, 2011

    From Porfolio to ITGS Paper 2

    For us to understand how ITGS paper 2 will look like, will need to understand first how portfolios were written. Please read briefly the news item and the portfolio in the links below:

    News item used to write the portfolio
    http://www.ericdigests.org/2001-1/laptop.html

    Portfolio piece
    http://www.bisnet.or.id/vle/file.php?file=%2F274%2FPortfolio_Examples%2FExample_one.doc

    Wednesday, October 26, 2011

    Word Processing & DTP

    Using Microsoft Publisher design a one-page publication called the Digital Warfare News. In the publication:

    • Include current important ICT technologies on warfare (+ related graphics )

    • Include a brief articles describing a recent technolgies relating to any Information technologies used in warfare (find a news item for this and include in bibliography)

    • Include benefits of the technologies

    • Include problems of using the technologies

    • Include few suggested solutions to the problems

    • Mention any future of the warfare technologies.

    • Include at least four sources in bibliography at the end of the publication.

    • Print and submit the publication.

    Assessment Criteria

    0-1
    The information used is scanty, poorly organized, and not informative. The publication is poorly formatted and with inappropriate images used and poorly positioned. The standard APA referencing is not applied.
    2-3
    The information used is meaningful, relatively organized,and informative. The publication is formatted and with appropriate images used and correctly positioned. The standard APA referencing is somewhat applied.
    4-5
    Good information used, organized, and clearly informative. The publication is well formatted applying some of the software techniques. Only relevant images are used and they are well positioned. The standard APA referencing is correctly applied.
    6-7
    Excellent information used, organized, and very informative. The publication is excellently formatted applying most of the software techniques. Only relevant and related images are used and they are well positioned. The standard APA referencing is correctly applied and well positioned.


    Sample documents
    http://www.castwire.com/index.php?p=56&pp=0&i=#tops

    Wednesday, October 12, 2011

    Politics and Government: The millitary

    Ensure that your research is in a maximum of five pages inclusive of a bibliography.

    Investigate individually the following;
  • Cyberwarfare

  • Smart weapons

  • Espionage systems

  • Battlefield technology

  • In each of them
  • Mention any different types

  • Describe atleast how one of each technology works

  • Outline the some benefits of each

  • Describe some social / ethical issues related

  • Suggest some solutions to some related problems.

  • Email the work to serem@yahoo.com after the first lesson on Friday.

    Thursday, October 6, 2011

    Politics and Government: Immigration and Passport control

    This is individual work and it should be as brief as possible. Ensure that you post your findings in this blog

    Investigate any 3 I.T systems for law enforcement of immigration and passport control:

    For each system

    a) Describe how the technology work.
    b) The advantages and disadvantages.
    c) Social and ethical concerns arising from the technology
    d) Suggest one feasible solution to the one of the main problem of the technology.

    Monday, October 3, 2011

    System Utilities

    You have been assigned in pairs a task on system utilities. You have the liberty to choose how you will share your understanding of the utilities.

    Explain the following;

    Defragmentation;George & Jamal

    Disk Utility software:Jamil & Khalid

    Backup management system: Aasfa & Caleb

    Compression Utilities: Emmanuel & Solitei

    Decompression utilities: William & Mayur

    Colour synchronization:Fatema & Sadhu

    File Management: Sheehan & Barry

    Virus Scan: Sohail

    Privacy and Anonymity

    Read the following information on Privacy
    http://www.buzzle.com/articles/ethical-issues-of-internet-privacy.html



    Read the article in the link below
    http://www.msnbc.msn.com/id/34825225/

    http://news.bbc.co.uk/2/hi/technology/7434558.stm


    What are some of the questions that need answers from the article?

    Thursday, September 29, 2011

    Software News

    Read the following article and search for the two softwares office 365 and Googles apps.

    What do you think are the issues here?

    http://www.bbc.co.uk/news/technology-13943437

    Wednesday, September 28, 2011

    Politics and Government: Information storage and Updating

    The Smart City

    http://www-03.ibm.com/innovation/us/thesmartercity/index_flash.html?cm_mmc=agus_brsmartcity-20090929-usbrp111-_-p-_-smcityvan-_-smcityvan#/home/?menuid=transportation2

    There are many services that are offered by governments in terms of Access, information storage, processing and Updating

    Your task is to compare three countries: one in Africa, one in Asia and one in Europe by studying how the information is collected, stored, processed and updated

  • Online tax returns


  • Passport application and renewal


  • Medical records


  • Online police records


  • Social security information

    • Thursday, September 22, 2011

      Security: Social and ethical Significance

      Computer security is concerned with taking care of hardware, software and data. Data is only as secure as the system that it is held on and data security is concerned with keeping the data safe from the various hazards that could destroy it. There are a number of ways that system administrators can protect data.

      Task 1
      Read the any of the article below and discuss in pairs the questions following

      http://www.bbc.co.uk/news/world-us-canada-13740591

      http://www.bbc.co.uk/news/technology-13711528

      http://news.bbc.co.uk/2/hi/technology/7633402.stm

      http://www.allbusiness.com/technology/computer-networking-network-security/628452-1.html

      Answering social impacts and ethical issues

      a) Who are the stakeholders in each of the above article?

      b) What is the impact on human life in each case?

      c) Who is responsible for the problem in each case

      d) Suggest some solutions to each case

      ITGS Subject Guide

      Find below the link to the ITGS Subject Guide for first examination in 2012 onwards

      http://gandhijkt.org/blog/wp-content/uploads/2011/01/ITGS-lates-guide_first-exam2012.pdf

      Tuesday, September 13, 2011

      Theme: Politics and Governement: Strand 2 (Period 4 Thurs 15/09/11)

      The importance of I.T is becoming increasingly evident in political compaigns and other governmental operations. The task below will focus on I.T as used in Political processes

      Task1
      You have been assigned a specific area of research. Your task is to prepare a powerpoint presentation that will be presented in our 6th lesson on 20th Sept 2011. Your Powerpoint presentation should be neat, attractive and focused. You will be allowed to include appropriate images where possible. In the powerpoint you will ;

      a) Describe the technology in relation to Political processes.
      b) State the I.T developments that have contributed to the existence of this technology.
      c) state the advantages and disadvantages of the technology with evidence from research.
      c) Describe atleast three social /ethical impacts that can result from the technology with specific examples from research.
      d) For any problems associated with the technology suggest any three viable solutions
      e) Cite all your sources using the APA standard format.

      George, Fatema & Mayur: Online campaign
      Jamal & William: Online voting
      Jamil & Solitei:Online lobbying
      Khalid & Sheehan:Online fundraising
      Sohail & Aasfa:Open Government
      Caleb & Sadhu: Online advertising
      Barry& Emanu: Online vetting

      Assessment Rubric
      0-2
      The powerpoint presentation is fairly designed and presented. The technology is described partially with limited linking to political processes and the I.T development is not clearly stated. The impacts of the technology is superficial and the social issues are stated with limited evidence from research. The solutions suggested are fairly viable and the referencing partially meets the APA standard formatting.
      3-4
      The powerpoint presentation is properly designed and presented. The technology is described well with some link to political processes and I.T development is partially stated. The impacts of the technology is good and the social issues are explained with some evidence from research. The solutions suggested viable and the referencing meets some the APA standard formatting.
      5-6
      The powerpoint presentation is well designed and presented. The technology is described good and linking to political process and the I.T development is clearly stated. The impacts of the technology is clear and the social issues are stated with some evidence from research. The solutions suggested are viable and the referencing meeting in the most part the APA standard formatting.
      7
      The powerpoint presentation is thoroughly designed and presented. The technology is described clearly with clear link to political process. The I.T development is clearly stated. The impacts of the technology is thorough and the social issues are stated with extensive evidence from research. The solutions suggested are laudable and the referencing meets the APA standard formatting.

      Monday, September 12, 2011

      Integrity

      Task 1
      Integrity refers to safeguarding the accuracy and completeness of stored data. Data lacks integrity when it has been changed accidentally or tampered with. Examples of data losing integrity are where information is duplicated in a relational database and only one copy is updated or where data entries have been maliciously altered

      Read the articles in the link below and answer questions following

      1. http://edition.cnn.com/2009/TECH/11/10/facebook.groups.hacked/index.html

      2. http://www.informationweek.com/news/security/attacks/231601110

      3. http://www.pcgamer.com/2011/05/02/sony-online-entertainment-databases-were-hacked-players-credit-card-and-bank-information-stolen/
      Answering social impacts and ethical issues
      a) Who are the stakeholders in each of the above article?
      b) What is the impact on human life in each case?
      c) Who is responsible for the problem in each case
      d) Suggest some solutions to each case



      Some Technology reading sources
      http://www.wired.com/, http://www.cnn.com/, http://www.zdnet.com/, http://www.bbc.co.uk/, http://www.bbcworld.com/, http://www.msnbc.com/ ,http://www.npr.org/ ,http://www.techreview.com/, http://www.nytimes.com/, http://www.worldpress.org/,
      http://www.webpronews.com/

      Wednesday, September 7, 2011

      Computer Input/Output Devices

      Task1

      Read and make notes where possible of computer input devices.

      You may use the link below:

      http://www.computerhope.com/jargon/i/inputdev.htm

      Describe any unique input devices used in different IT systems in any of the application scenarios.

      Task 2
      Research on the assigned input/output device below and post your findings on this blog. In your research
      i) Describe how the device works or how it is used
      ii) Outline areas where the device is commonly used
      iii) Name any different types or categories of the device if any

      Fatema: MICR readers
      George:mouth wands
      Barry:Smart Card readers
      Caleb:radio frequency identification (RFID)
      Sohali: Sensors readers
      Emmanuel: Plotters
      William: Printers
      Solitei:Projectors
      Khalid:MFP printers
      Mayur: Eyegaze System
      Jamil:blow pipe systems
      Jamal:Braille keyboards
      Sadruddin:VR goggles
      Sheehan:Magnetic stripe Readers










      Monday, September 5, 2011

      Reliability: Social & Ethical Consideration

      Reliability refers to the ability of hardware or information systems to function without failure.

      a) Give examples of situations where you computer has been unreliable.

      b) Why are computers more unreliable?

      c) How do we make hardware and IT system reliable?

      Read the article in the link below an answer the questions following in your note book;

      http://www.kellyhs.org/itgs/ethics/reliability/THERAC-25.htm

      c) Why was the software controlled machine more dangerous that the previously mechanical Therac?

      d) Why would they choose to use software instead of mechanical devices when building the new Therac?

      e) What changes in the development of the machine could have prevented the failures?


      Research Activity

      Research for any IT hardware or IT system that proved unreliable in any of the listed ITGS applications to specific scenarios.

      Thursday, September 1, 2011

      The Motherboard

      Task 1 (Write brief notes on this)






    • What is a motherboard?





    • What is housed in the computers' motherboard?








      • Task 2






      • Computers harddisk space size: How is it measured?


        • Use the link below and write down brief notes on the different storage size measurements.




          http://www.whatsabyte.com/

          Task 3

          The ASCII codes; What are they? How is it different from binary?

          Refer to the ASCII table in the link below

          http://www.asciitable.com/

          Further readings;



          http://www.technewsworld.com/story/73165.html?wlc=1314953540


          http://www.vita.virginia.gov/about/default.aspx?id=12596


          http://www-03.ibm.com/press/us/en/pressrelease/35111.wss


          http://encyclopedia2.thefreedictionary.com/disk+grooming




          Sunday, August 28, 2011

          Computer Hardware 29/08/2011

          Task1 (Computer hardware notes)

          Make brief notes in your notes book from the presentation in the link below; Focus only upto the types of processors.

          http://www.authorstream.com/Presentation/MissBenjamin-112909-computer-hardware-introduction-input-output-devices-software-system-education-ppt-powerpoint/



          Task 2

          •Search the basic configurations and prices of the following CPUs. Ensure information on current CPU's are included.

          •Please complete the TABLE provided and stick it in your notes book.

          Task 3



          Find out any one organization / company that uses supercomputers, mainframe computer, mini computer and microcomputer. For each




          - Write down the name of the computer




          - Provide the specs of the supercomputer in terms of Processor speed, Memory size, storage size.




          - Describe briefly its functions






          Further readings on CPU

          http://ask-leo.com/whats_the_difference_between_i3_i5_and_i7_processors.html

          http://kb.wisc.edu/showroom/page.php?id=4927


          http://www.bbc.co.uk/news/technology-14574747




          Thursday, August 25, 2011

          Social and Ethical Issues.

          Task 1
          Read the news article in the link below

          http://www.bbc.co.uk/news/science-environment-12507034

          Try to answer the following questions in your note book.

          Under strand 1
          - What social/ethical issues do you forsee arising form the IT technology?

          Under strand 2
          - Which application scenarios would be addressed by the IT development (Refer to the Course outline document).

          Under Strand 3
          - What new concepts and terminologies have been introduced?

          Task 2

          Read out the next news item

          http://www.pcpro.co.uk/news/369301/police-plan-facial-recognition-for-olympic-venues

          Try to answer the following questions in your note book.

          Under strand 1
          - What social/ethical issues do you forsee arising form the IT technology?

          Under strand 2
          - Which application scenarios would be addressed by the IT development (Refer to the Course outline document).

          Under Strand 3
          - What new concepts and terminologies have been introduced?

          Task 3

          Read the article in the link below and answer the question following

          http://www.bbc.co.uk/news/technology-14629058


          Answer the following questions in your note book.

          Under strand 1
          - What social/ethical issues do you forsee arising form the IT technology?

          Under strand 2
          - Which application scenarios would be addressed by the IT development (Refer to the Course outline document).

          Under Strand 3
          - What new concepts and terminologies have been introduced?

          Wednesday, March 30, 2011

          Monday, March 14, 2011

          Science and Environment:

          Respond to the question below individually and post your responses to this blog.

          Data Logging
          1. Describe what is meant by the term 'Data Logging'
          2. Describe the hardware and software required to perform data logging.
          3. Brainstorm and create a table of the advantages and disadvantages of data logging.
          4. Discuss the use of data logging used by Science Teachers and Scientist doing research and development.

          Quizz on data logging;

          http://www.teach-ict.com/gcse/software/datalogging/students/shome_datalogging.htm

          You can use the following;

          Examples of logging in school:
          http://www.hitchams.suffolk.sch.uk/datalogging/examples.htm

          http://www.bbc.co.uk/schools/gcsebitesize/ict/measurecontrol/3dataloggingrev1.shtml

          http://armsitgs.wetpaint.com/page/Data+Logging

          Sunday, March 6, 2011

          HL AEL area of Impact

          Read and find out more on the topic assigned.Then share how the topics links to AEL and what are the ethical / social issues are raised.

          Tasin (Stereolithography)
          http://armsitgs.wetpaint.com/page/Stereolithography.

          Gary(Digital radio and Television)
          http://armsitgs.wetpaint.com/page/Digital+Radio+and+Television

          Atiya (online games)
          http://armsitgs.wetpaint.com/page/Online+Gaming

          Immaculate & Sajni( Virtual gaming, 2nd life, avatars)
          http://armsitgs.wetpaint.com/page/Virtual+Gaming-2nd+Life

          Thursday, February 17, 2011

          Case mid-term Activity

          Task 1
          Over the break ensure that you identify any online business around Mombasa and obtain the following information; on how the business setup; what software and hardware was used; which advertising techniques are used; what payments methods are used to pay for the services; what are some security faced; what other challenges are there;what are some to solutions applied to the problems identified.

          Task 2
          Research on the assigned task and post your finding in the blog.

          What challenges are associated with the following and what are some suggested solutions?

          Tasin
          a) Informing customers and potential customers of new products and offers through the web site or other e-marketing techniques.

          b) Applying the correct project management techniques to develop the new web site.

          Sajni
          a) Using the different range of multimedia features effectively integrated on the web site.

          b) Using and applying and use of an appropriate shopping cart service.

          Atiya

          a)Choosing appropriate methods of payment for goods (and delivery) purchased and using the shopping cart, such as PayPal, credit card payments and direct deposit to account.

          b) setting an appropriate privacy and other policies for the web site.

          Immacualte
          a) Using a search engine optimization so that the web site appears on the first page of results.

          b)the role of web site traffic analysis.

          Gary
          a)techniques that can be used to secure a web site.

          b)the features offered by a range of web-hosting services

          Tuesday, February 15, 2011

          Artificial Intelligence System

          A.I and Chess game

          http://www.free-chess.net/


          Fuzzy Logic examples.

          Click on the following links to see how fuzzy logic is applied.

          http://www.intelligent-systems.info/classes/ee509/homework_examples.htm

          Take the Quiz below

          http://www.proprofs.com/quiz-school/story.php?title=QUIZ-ON-FUZZY-INFERENCE-SYSTEMSMAMDANIS-METHODSFUZZY-LOGIC-TOOLBOX-1

          Questions and Answers

          http://itgsrevision.blogspot.com/2008/11/q-about-ia.html

          Answer the following question

          Explain what is meant by fuzzy logic. What progress has been made in the application of this concept to AI?


          What is inference Engine as used in Artificial intelligence ?

          Monday, January 24, 2011

          Portfolio Extension Checklist

          Refer to the following for the portfolio extension

          http://sh.horrycountyschools.net/UserFiles/Servers/Server_1037651/File/ITGS/Portfolio%20HL%20Checklist.pdf

          Case Study

          Click on the link below and prepare a 8 minutes presentation on any of the topics related to the Case study research in the table of content. Ensure that no one presents the same topic.

          http://www.managementhelp.org/infomgnt/e_cmmrce/e_cmmrce.htm