TO SECTION 2I

3 views
Skip to first unread message

James V. Tayag

unread,
Mar 10, 2009, 9:32:49 AM3/10/09
to CE 2: Advance Software Application (Brokenshire College)
BC E-learning site is back, so you can now answer your assignments:
Finals Exer 4 and Finals Lab Performance. Pls do not copy the contents
on the notes that I posted. Deadline for the assignment will be on
March 17, 2009, Tuesday.

James V. Tayag

unread,
Mar 10, 2009, 10:20:21 AM3/10/09
to CE 2: Advance Software Application (Brokenshire College)
In case that the BC E-learning site is not accessible, just copy this
questions....this will be the last option if any problems may arise
before deadline.
FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
INNOVATIONS.

(pls do not copy the contents on the notes posted on this site)

Answer the following questions:

1. What is artificial intelligence?(10 points)

2. What is genetic engineering? (10 points)

3. What is Virtual Reality? (10 points)

4. What is Electronic commerce? (10 points)


FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES

1. What is the difference between plagiarism and copyright? 10 points

2. What is a computer crime? give 2 examples. 10 points

3. What is a computer virus? give 3 examples. 10 points.

4. Is working with computers for a long period of time can cause
various types of health problems? Why? give EXAMPLES 20 points

James V. Tayag

unread,
Mar 10, 2009, 10:21:37 AM3/10/09
to CE 2: Advance Software Application (Brokenshire College)


LAST OPTION: send your answers or your assignments through email.

nikko

unread,
Mar 16, 2009, 12:35:34 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
Nikko C. Makiling BSN2 I

On 10 Mar, 22:20, "James V. Tayag" <jamez...@yahoo.com> wrote:
> In case that the BC E-learning site is not accessible, just copy this
> questions....this will be the last option if any problems may arise
> before deadline.
> FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
> INNOVATIONS.
>
> (pls do not copy the contents on the notes posted on this site)
>
> Answer the following questions:
>
> 1. What is artificial intelligence?(10 points)
> Artificial Intelligence (AI) is the area of computer science focusing on creating machines that can engage on behaviors that humans consider intelligent.
> 2. What is genetic engineering? (10 points)
> Genetic engineering is the alteration of genetic material by direct intervention in genetic processes with the purpose of producing new substances or improving functions of existing organisms. It is a very young, exciting, and controversial branch of the biological sciences.
> 3. What is Virtual Reality? (10 points)
> A form of human-computer interaction in which a real or imaginary environment is simulated and users interact with and manipulate that world. Users travel within the simulated world by moving toward where they want to be, and interact with things in that world by grasping and manipulating simulated objects.
> 4. What is Electronic commerce? (10 points)
> Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.


> FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES
>
> 1. What is the difference between plagiarism and copyright? 10 points
> Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one's own original work while
Copyright is a form of intellectual property which gives the creator
of an original work exclusive rights for a certain time period in
relation to that work, including its publication, distribution and
adaptation; after which time the work is said to enter the public
domain. Copyright applies to any expressible form of an idea or
information that is substantive and discrete. Some jurisdictions also
recognize "moral rights" of the creator of a work, such as the right
to be credited for the work.



> 2. What is a computer crime? give 2 examples. 10 points
> Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.


> 3. What is a computer virus? give 3 examples. 10 points.
> A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user.
Examples:
>Boot sector viruses:
Boot sector viruses infect the boot sector or partition table of a
disk. Computer systems are most likely to be attacked by boot sector
viruses when you boot the system with an infected disk from the floppy
drive - the boot attempt does not have to be successful for the virus
to infect the hard drive. Also, there are a few viruses that can
infect the boot sector from executable programs- these are known as
multi-partite viruses and they are relatively rare. Once the system is
infected, the boot sector virus will attempt to infect every disk that
is accessed by that computer. In general, boot sector viruses can be
successfully removed.

>Macro viruses:
Macro viruses during the early 21st century are the most prevalent
viruses. Unlike other virus types, macro viruses aren't specific to an
operating system and spread with ease via email attachments, floppy
disks, Web downloads, file transfers, and cooperative applications.
Macro viruses are written in "every man's programming language" –
Visual Basic – and are relatively easy to create. They can infect at
different points during a file's use, for example, when it is opened,
saved, closed, or deleted.

>File infecting viruses:
File infecting viruses infect executable programs (generally, files
that have extensions of .com or .exe). Most such viruses simply try to
replicate and spread by infecting other host programs - but some
inadvertently destroy the program they infect by overwriting some of
the original code. There is a minority of these viruses that are very
destructive and attempt to format the hard drive at a pre-determined
time or perform some other malicious action. In many cases, a file-
infecting virus can be successfully removed from the infected file.
If the virus has overwritten part of the code, the original file will
be unrecoverable. health


> 4. Is working with computers for a long period of time can cause
> various types of health problems? Why? give EXAMPLES  20 points
>As far as I know yes working with computers for a long prtiod of time can cause various types of health problems because as we all know computers has tadiations that can cause damage to our health to much radeation can damage your eyes, can give stressors, back pain, headace etc.

moonjie

unread,
Mar 16, 2009, 12:50:35 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
Moolien Jane T. Arcena

On 10 Mar, 22:20, "James V. Tayag" <jamez...@yahoo.com> wrote:
> In case that the BC E-learning site is not accessible, just copy this
> questions....this will be the last option if any problems may arise
> before deadline.
> FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
> INNOVATIONS.
>
> (pls do not copy the contents on the notes posted on this site)
>
> Answer the following questions:
>
> 1. What is artificial intelligence?(10 points)
> It is the science and engineering of making intelligent machines, especially intelligent computer programs. It is related to the similar task of using computers to understand human intelligence, but AI does not have to confine itself to methods that are biologically observable.

> 2. What is genetic engineering? (10 points)
> Genetic engineering, recombinant DNA technology, genetic modification/manipulation (GM) and gene splicing are terms that apply to the direct manipulation of an organism's genes. Genetic engineering is different from traditional breeding, where the organism's genes are manipulated indirectly. Genetic engineering uses the techniques of molecular cloning and transformation to alter the structure and characteristics of genes directly. Genetic engineering techniques have found some successes in numerous applications. Some examples are in improving crop technology, the manufacture of synthetic human insulin through the use of modified bacteria, the manufacture of erythropoietin in hamster ovary cells, and the production of new types of experimental mice such as the oncomouse (cancer mouse) for research

> 3. What is Virtual Reality? (10 points)
> Virtual reality is an artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment. On a computer, virtual reality is primarily experienced through two of the five senses: sight and sound. The simplest form of virtual reality is a 3-D image that can be explored interactively at a personal computer, usually by manipulating keys or the mouse so that the content of the image moves in some direction or zooms in or out. More sophisticated efforts involve such approaches as wrap-around display screens, actual rooms augmented with wearable computers, and haptics devices that let you feel the display images.

> 4. What is Electronic commerce? (10 points)
> Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail as well.


> FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES
>
> 1. What is the difference between plagiarism and copyright? 10 points
> Plagiarism is using someone else's work without giving proper credit - a failure to cite adequately while Copyright is using someone else's creative work without getting the person's permission, which can include a song, a video, a movie clip, a piece of visual art, a photograph, and other creative works, without authorization or compensation, if compensation is appropriate.

> 2. What is a computer crime? give 2 examples. 10 points
> Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.


> 3. What is a computer virus? give 3 examples. 10 points.
> A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. examples of computer virus are:

a.Direct Action Viruses
The main purpose of this virus is to replicate and take action when it
is executed. When a specific condition is met, the virus will go into
action and infect files in the directory or folder that it is in and
in directories that are specified in the AUTOEXEC.BAT file PATH. This
batch file is always located in the root directory of the hard disk
and carries out certain operations when the computer is booted.

b.Boot Virus
This type of virus affects the boot sector of a floppy or hard disk.
This is a crucial part of a disk, in which information on the disk
itself is stored together with a program that makes it possible to
boot (start) the computer from the disk.

c.Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way
(using different algorithms and encryption keys) every time they
infect a system.


> 4. Is working with computers for a long period of time can cause
> various types of health problems? Why? give EXAMPLES  20 points

In the world today computers run rampant. Everyone has something,
ranging anywhere from a laptop to a desktop or a cell phone.
Technology is taking over. If some one is working on a computer all
day long they could end up with problems like loss of hearing,
computer vision syndrome, E-thrombosis, generalized anxiety disorder,
and back problems.
Studies show that long-term exposure to radiation increases the risk
of all forms of cancer, tumors, blood disorders, miscarriage,
headaches, insomnia, anxiety, aging of the skin, skin burn, etc.

Radiation exposure over time can cause skin burn, dry wrinkled skin
and photo aging. This skin damage is identical to sun damage and
causes the same health problems. Many electronic products that we use
on a daily basis expose us to harmful radiation.



lai xah

unread,
Mar 16, 2009, 2:38:45 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
INNOVATIONS.
Answer the following questions:

1. What is artificial intelligence?(10 points)
> Artificial intelligence is the intelligence of machines and the branch of computer science which aims to create it. It is also the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success. It is the capability of a device to perform functions that are normally associated with human intelligence, such as reasoning and optimization through experience.

2. What is genetic engineering? (10 points)
> It is also known as genetic modification. Genetic engineering is the deliberate, controlled manipulation of the genes in an organism with the intent of making that organism better in some way. This is usually done independently of the natural reproductive process. The result is a so-called genetically modified organism (GMO). Genetic engineering carries potential dangers, such as the creation of new allergens and toxins, the evolution of new weeds and other noxious vegetation, harm to wildlife, and the creation of environments favorable to the proliferation of molds and fungi (ironically, in light of the purported advantage in that respect). Some scientists have expressed concern that new disease organisms and increased antibiotic resistance could result from the use of GMOs in the food chain. The darkest aspect of genetic engineering is the possibility that a government or institution might undertake to enhance human beings by means of genetic engineering. Some see the possibility of using this technology to create biological weapons.

3. What is Virtual Reality? (10 points)
>It is an artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment. On a computer, virtual reality is primarily experienced through two of the five senses: sight and sound.

4. What is Electronic commerce? (10 points)
>It is the buying and selling of products and services by businesses and consumers over the internet. It is commonly known as e-commerce. E-commerce is the online transaction of business, featuring linked computer systems of the vendor, host, and buyer. Electronic transactions involve the transfer of ownership or rights to use a good or service.

FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES

1. What is the difference between plagiarism and copyright? 10 points
>The difference of plagiarism and copyright is that plagiarism is the using of ideas, plots, text and other intellectual property developed by someone else while claiming it is your original work while copyright is the ownership of an intellectual property within the limits prescribed by a particular nation's or international law. Copyright is provided automatically to the author of any original work covered by the law as soon as the work is created. The author does not have to formally register the work, although registration makes the copyright more visible.

2. What is a computer crime? give 2 examples. 10 points
>A computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk.

Examples of a computer crime are as follows:
-Spamming wherever outlawed completely or where regulations
controlling it are violated.
-Intellectual property theft, including software piracy.

3. What is a computer virus? give 3 examples. 10 points.
>A computer virus is a man-made computer program that infects a file or program on our computers. Each time the infected program is run, the virus is also triggered. It replicates or spreads itself by infecting other programs on the same computer. Viruses range from harmless pranks that merely display an annoying message to programs that can destroy files or disable a computer altogether. Whether they're considered malicious or malevolent, all viruses spread rapidly.

Examples of computer viruses are as follows:
a) Different malware types - Malware is a general name for all
programs that are harmful; viruses, trojan, worms and all other
similar programs
b) Macro Virus - Macro viruses spread from applications which use
macros. The macro viruses which are receiving attention currently are
specific to Word 6, WordBasic and Excel. However, many applications,
not all of them Windows applications, have potentially damaging and
infective macro capabilities too.
c) Polymorphic virus - Uses encryption to foil detection, so that it
appears differently in each infection. It destroys or alters programs
and data.

4. Is working with computers for a long period of time can cause
various types of health problems? Why? give EXAMPLES 20 points
>Working with computers for a long period of time can cause various health problems. First is the Eye Disease. It’s the first what occur to us, when we talk about computer harm. Prolonged computer use could be linked to glaucoma, especially among those who are short-sighted. Our eyes are very badly affected by how long you stare at that bright screen. We stop blinking and start staring which makes our eyes strain and dry out. Make sure you look away from the screen and close them for a few seconds every few minutes. Second, Bad Posture. Bad posture is enemy number one. You should be able to reach the keyboard and mouse whilst bending your elbows at 90 degrees, with your shoulders relaxed. If you are stretching, this could cause problems. Your back should be straight and the top of the monitor should be just below eye level. If your monitor is to the left or right of your keyboard you are putting strain on your neck. Long periods of time at the computer while blogging, working or reading often leads to pain in the lumbar region of the back. Neck and shoulder problems also result from poor seating and the poor organization of equipment on the desk (stretching for the telephone or files etc). Third, Hurting Hands. Your hand and wrist ache after working at the computer all day, and they sometimes start feeling numb. Research in recent years has found that things like typing and sewing rarely cause carpal tunnel. Wear splints while you work to keep your wrists from bending too high or low, and use a keyboard tray or adjust your chair so the keyboard and mouse are below your elbows and your wrists are level. It is really important to give your fingers, wrists and hands a break from resting on the keyboard all day. A tennis ball is a great way to do this. Every time you need to think you should grab the ball and give it a few quick squeezes. This will do wonders for your joints and muscles. Fourth, Computer Stress Injuries. Many people suffer from structural problems related to the physical stress of sitting incorrectly, or for too long in front of their computers. So there are chances you’ve experienced a fair amount of computer stress, from minor frustrations here and there to a virtual visit to computer hell. High levels of stress can kill you, don’t make mistakes! Highly stressful workers have a higher risk of developing heart diseases and even cancer. So make sure that you can manage your stress. Start making something to reduce it, don’t wait till computer stress will be the main problem in your life. Taking frequent breaks is an important step in preventing repetitive computer stress injuries.

Thus, it shows up that there are several problems that occur with
prolonged computer use. It is also clear, however, that if certain
rules of using computer are observed the risk of any of these problems
can be minimized and computer users affected with computer related
disorders can avoid or treat them. People should have active lifestyle
and an ergonomic computer work station, thereby even hardly computer
working can’t affect their health.

lai xah

unread,
Mar 16, 2009, 2:41:20 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
INNOVATIONS
Answer the following questions:

1. What is artificial intelligence?(10 points)
> Artificial intelligence is the intelligence of machines and the branch of computer science which aims to create it. It is also the study and design of intelligent agents where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success. It is the capability of a device to perform functions that are normally associated with human intelligence, such as reasoning and optimization through experience.

2. What is genetic engineering? (10 points)
> It is also known as genetic modification. Genetic engineering is the deliberate, controlled manipulation of the genes in an organism with the intent of making that organism better in some way. This is usually done independently of the natural reproductive process. The result is a so-called genetically modified organism (GMO). Genetic engineering carries potential dangers, such as the creation of new allergens and toxins, the evolution of new weeds and other noxious vegetation, harm to wildlife, and the creation of environments favorable to the proliferation of molds and fungi (ironically, in light of the purported advantage in that respect). Some scientists have expressed concern that new disease organisms and increased antibiotic resistance could result from the use of GMOs in the food chain. The darkest aspect of genetic engineering is the possibility that a government or institution might undertake to enhance human beings by means of genetic engineering. Some see the possibility of using this technology to create biological weapons.

3. What is Virtual Reality? (10 points)
>It is an artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment. On a computer, virtual reality is primarily experienced through two of the five senses: sight and sound.

4. What is Electronic commerce? (10 points)
>It is the buying and selling of products and services by businesses and consumers over the internet. It is commonly known as e-commerce. E-commerce is the online transaction of business, featuring linked computer systems of the vendor, host, and buyer. Electronic transactions involve the transfer of ownership or rights to use a good or service.

FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES

1. What is the difference between plagiarism and copyright? 10 points
>The difference of plagiarism and copyright is that plagiarism is the using of ideas, plots, text and other intellectual property developed by someone else while claiming it is your original work while copyright is the ownership of an intellectual property within the limits prescribed by a particular nation's or international law. Copyright is provided automatically to the author of any original work covered by the law as soon as the work is created. The author does not have to formally register the work, although registration makes the copyright more visible.

2. What is a computer crime? give 2 examples. 10 points
>A computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk.

Examples of a computer crime are as follows:
-Spamming wherever outlawed completely or where regulations
controlling it are violated.
-Intellectual property theft, including software piracy.

3. What is a computer virus? give 3 examples. 10 points.
>A computer virus is a man-made computer program that infects a file or program on our computers. Each time the infected program is run, the virus is also triggered. It replicates or spreads itself by infecting other programs on the same computer. Viruses range from harmless pranks that merely display an annoying message to programs that can destroy files or disable a computer altogether. Whether they're considered malicious or malevolent, all viruses spread rapidly.

Examples of computer viruses are as follows:
a) Different malware types - Malware is a general name for all
programs that are harmful; viruses, trojan, worms and all other
similar programs
b) Macro Virus - Macro viruses spread from applications which use
macros. The macro viruses which are receiving attention currently are
specific to Word 6, WordBasic and Excel. However, many applications,
not all of them Windows applications, have potentially damaging and
infective macro capabilities too.
c) Polymorphic virus - Uses encryption to foil detection, so that it
appears differently in each infection. It destroys or alters programs
and data.

4. . Is working with computers for a long period of time can cause
various types of health problems? Why? give EXAMPLES 20 points

charisse tabarno

unread,
Mar 16, 2009, 3:07:23 AM3/16/09
to james tayag, ce-2-advance-software-appl...@googlegroups.com
Charisse Anne F. Tabarno
BSN 2-I


1. What is artificial intelligence?

Artificial intelligence (AI) is the intelligence of machines and the branch of computer science which aims to create it. Major AI textbooks define the field as "the study and design of intelligent agents,” where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success, John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines”.


2. What is genetic engineering?  

Genetic engineering, recombinant DNA technology, genetic modification/manipulation (GM) and gene splicing are terms that apply to the direct manipulation of an organism's genes. Genetic engineering is different from traditional breeding, where the organism's genes are manipulated indirectly. Genetic engineering uses the techniques of molecular cloning and transformation to alter the structure and characteristics of genes directly. Genetic engineering techniques have found some successes in numerous applications. Some examples are in improving crop technology, the manufacture of synthetic human insulin through the use of modified bacteria, the manufacture of erythropoietin in hamster ovary cells, and the production of new types of experimental mice such as the oncomouse (cancer mouse) for research.


3. What is Virtual Reality?  

Virtual Reality is a computer simulation of a real or imaginary system that enables a user to perform operations on the simulated system and shows the effects in real time.It is also, a form of human-computer interaction in which a real or imaginary environment is simulated and users interact with and manipulate that world. Users travel within the simulated world by moving toward where they want to be, and interact with things in that world by grasping and manipulating simulated objects. In the most successful virtual environments, users feel that they are truly present in the simulated world and that their experience in the virtual world matches what they would experience in the environment being simulated. This sensation is referred to as engagement, immersion, or presence, and it is this quality that distinguishes virtual reality from other forms of human-computer interaction. When a user interacts with a virtual environment, the computer-generated graphics display must be updated with each turn of the head or movement of the hand. The virtual environment must be able to generate and display realistic-looking views of the simulated world quickly enough that the interaction feels responsive and natural.


4. What is Electronic commerce?

Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. A wide variety of commerce is conducted in this way, spurring and drawing on innovations in electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. Modern electronic commerce typically uses the World Wide Web and it can encompass a wider range of technologies such as e-mail as well.


FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES

1. What is the difference between plagiarism and copyright?

Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one's own original work. On the other hand, Copyright is a form of intellectual property which gives the creator of an original work exclusive rights for a certain time period in relation to that work, including its publication, distribution and adaptation; after which time the work is said to enter the public domain. Copyright applies to any expressible form of an idea or information that is substantive and discrete. Some jurisdictions also recognize "moral rights" of the creator of a work, such as the right to be credited for the work.


2. What is a computer crime?

Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. Additionally, although the terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important.
 
Examples:


1. Drug trafficking

Drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms. The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away. Furthermore, traditional drug recipes were carefully kept secrets. But with modern computer technology, this information is now being made available to anyone with computer access. 

2. Cyberterrorism

Government officials and IT security specialists have documented a significant increase in Internet probes and server scans since early 2001. There is a growing concern among federal officials that such intrusions are part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. At worst, cyberterrorists may use the Internet or computer resources to carry out an actual attack.As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.


3. What is a computer virus?

A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

1.The “I Love You” virus

The "I Love You" menace clogged up Web servers, manipulated personal files and caused IT System Managers to shut e-mail systems off the network. (The author was one of these IT Managers - we saw the email proliferating and as fast as we shut subsystems down, the faster the menace came flooding inwards. In the end, we had to completely shut the network off from the outside world. We examined the code of "I Love You" on a PC that was isolated for the purpose of examining viruses, and found 15 pages of Visual basic (.VBS) code!) If you look at the VBS code you will see that it corrupts MP3 and JPEG files on users' hard drives, as well as mIRC, a version of Internet Relay Chat. It also appears to reset the default start page for Internet Explorer. The thing which really piqued me was the first two lines of code: "I hate go to school..." 

2.Melissa

It comes via an e-mail with an attached Microsoft Word document. When this message is opened, the virus is activated and infects the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail to the first 50 contacts from the catalog of Outlook Express.
3.Codered

It attacks the Microsoft IIS 4.0 and 5.0 modifies the main page with the message "Welcome to http:// www.worm.com ! Hacked By Chinese!" and also programs the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).

4. Is working with computers for a long period of time can cause
various types of health problems? Why? give EXAMPLES

As computer usage has increased, so have related vision problems. One reason is because your eyes need to work harder to focus on the computer screen for a prolonged period. Computers are more visually demanding than printed material because the image on a monitor is not stable like printed text in a book. It is composed of pixels of light that are continually being refreshed. Therefore, your eye muscles must constantly adjust to keep the flickering screen in focus. Because of this intense focusing demand, even low amounts of uncorrected astigmatism or farsightedness make your eye muscles work harder. Studies have shown that prescription glasses, designed specifically for computer use, will decrease eyestrain and physical fatigue, and improve productivity.Muscles that control eye movement and eye coordination, also get a workout at the computer as you scan the screen or surf the web for hours. Inefficient eye tracking can make it difficult for you to analyze spreadsheets and keep your eyes on the lines of text. Poor eye coordination can slow you down while reading the screen. Eyes that tend to drift apart create symptoms such as eyestrain, intermittent double images and headaches.Another cause of computer-related eyestrain is dry eyes. We tend to blink less frequently while concentrating which diminishes eye lubrication. Dry eye symptoms include burning, itching, intermittent blur, or a "heavy eyes" sensation. This can usually be improved by using artificial tears, a humidifier , or nutritional supplements to increase tear production.Working with computers for a long period of time can cause various types of health problems like headache,eyestrain, irritated eyes, blurred vision, slow to refocus on objects around the room after prolonged exposure to computer, difficulty seeing clearly at distance after prolonged computer use, vision goes in and out of focus, words appear to move on the screen, frequent loss of place when looking between copy and screen, double vision at any time, neck ache or blurry vision with current prescription, frequent visual mistakes i.e. inverting letters or numbers, or while proofreading. 

Bem Orias

unread,
Mar 15, 2009, 11:53:07 PM3/15/09
to ce-2-advance-software-appl...@googlegroups.com, bemo...@yahoo.com.ph
1.Artificial intelligence (AI) is the intelligence of machines and the branch of computer science which aims to create it. Major AI textbooks define the field as "the study and design of intelligent agents, where an intelligent agentsis a system that perceives its environment and takes actions which maximize its chances of success.John McCarthy, who coined the term in 1956 defines it as "the science and engineering of making intelligent machines." 

The field was founded on the claim that a central property of human beings, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. Artificial intelligence has been the subject of breathtaking optimism, has suffered stunning setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science

.

2.Genetic Engineering-the word gene comes from the Greek word Genea meaning "breed, kind, and genesis "descent, origin".Genetic engineering means direct intervention in the genetic make-up a living being, the replacement of genes or the addition of new genes to the genetic "code" or "blueprint" of an organism. In other words, Genetic Engineering involves the whole process of altering genes, the building blocks of life, in order to achieve either a radically, or a completely new, human being.

                           Genetic Engineerinf according to its advocates, is more human than the biological process, insofar as it is willed-planned and systematically organized. The biological  process is left to chance, accident. and to the blind forces of nature; whereas genetic engineering is willed and scientifically designed by man for thereapeutic and eugenic reasons.

 

3.Virtual reality (VR) is a technology which allows a user to interact with a environment, whether that environment is a simulation of the real world or an imaginary world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer-screen or through special ostereoscopic displays , but some simulations include additional sensory information, such as sound through speakers or headphones.

 Virtual Reality is often used to describe a wide variety of applications, commonly associated with its immersive, highly visual, 3D environments. The development of CAD software, graphics hardware acceleration, head mounted displays, database gloves and miniaturization have helped popularize the notion. In the book The Metaphysics of Virtual Reality,Michael Heim identifies seven different concepts of Virtual Reality: simulation, interaction, artificiality, immersion, telepresence, full-body immersion, and network communication. The definition still has a certain futuristic romanticism attached.

 

4.Electronic commerce, commonly known as e-commerce or eCommerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with wide-spread Internet usage. Modern electronic commerce typically uses the World Wibe Web at least at some point in the transaction's lifecycle, although it can encompass a wider range of technologies such as e-mail  as well.Electronic commerce that is conducted between businesses is referred to as business-to-business  or B2B.

Electronic commerce is generally considered to be the sales aspect of e-business. It also consists of the exchange of data to facilitate the financing and payment aspects of the business transactions.

 

 

 

 

 

 

1.Plagiarism-is the act of taking someone else's words and/or ideas and passing them off as your own.  For example, copying as little as part of a sentence can be plagiarism, particularly if the original author has used words or structure in unusual ways.  Plagiarism can also extend to taking the overall structure or ideas of a work and claiming them as your own.  The original source does not need to be published or copyrighted for plagiarism to occur, and plagiarism is not limited to words--data, charts, graphs, and images that other people have created are works that should not be passed off as your own.  (These can be copyright violations as well.)

 

Copyright- is a legal right authors have over their works.  Copyright is a legal and political concept, and changes due to international and commercial influences.  Material under copyright can only be used under certain “fair use” exceptions or with the permission of the copyright holder.  The MSU Extension Copyright Guideline has details on fair use.  Even if a use falls under the “fair use” exceptions, you must provide appropriate references for the source, or it is plagiarism.  (Most works copyrighted after 1922 or so are still protected, but works originating in the US prior to this date are now in the public domain and can be used, with proper credit, without limitation.)

 

2.Generally Computer crime encompass a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

Examples of computer crimes are:

Spam- or the unsolicited sending of bulk email for commercial purposes, is unlawful to varying degrees. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited electronic communications have existed in some forms for some time.

Fraud-is any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:

  • altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
  • altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;

3.A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or even delete everything on the hard disk.
Examples of viruses:

 

Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

 

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

 

Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

 

4.Doctors seem to encounter more and more musculoskeletal affections caused by using the keyboard for too long. Here are some of the affections you might develop if you work a lot on your computer, by especially using the keyboard: synovitis, tendonitis, chronic arthritis and epicondylitis.

Even though these affections might not ring any bell to you, consider the fact that they might leave you incapable to work after developing them. Some studies say that in the US, such affections caused by the inadequate use of keyboards lead to a loss of 1.3% of the internal profit. The wrong body posture at the working place, the tension that accumulates in the joints and muscles when typing excessively, the stress that causes lesions in the blood vessels, muscles, ligaments and even bones can be considered triggering factors for the previously mentioned affections.

People who observe these changes in their hand’s joints should address the doctor as soon as possible. Do not postpone your visit to the doctor for months as this is not a solution. If you act fast the only treatment you might need would be a couple of physiotherapy sessions, and certain anti-inflammatory drugs; and of course the indication of replacing your keyboard with a medical one as soon as possible. In case you neglect the symptoms of a joint affection you might even get to surgery in order to recover your hand mobility as it was.

 

 

 

 

 



How do you prepare for your first job interview?
Discover the different ways in Yahoo! Answers!

ssObisHa25

unread,
Mar 16, 2009, 10:27:27 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
ISHA JOY V. BUSTAMANTE BSN2-I

Sir, i submitted the FINAL EXER4 at the e-learning website..

FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES

1. What is the difference between plagiarism and copyright? 10 points
Plagiarism is the use or close imitation of the language and ideas of
another author and representation of them as one's own original work
while Copyright is a form of intellectual property which gives the
creator of an original work exclusive rights for a certain time period
in relation to that work, including its publication, distribution and
adaptation; after which time the work is said to enter the public
domain.

2. What is a computer crime? give 2 examples. 10 points
Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime
generally refers to criminal activity where a computer or network is
the source, tool, target, or place of a crime. These categories are
not exclusive and many activities can be characterized as falling in
one or more category.

EXAMPLES:
1.) SPAM or the unsolicited sending of bulk email for commercial
purposes, is unlawful to varying degrees.
2.) Computer FRAUD is any dishonest misrepresentation of fact
intended to induce another to do or refrain from doing something which
causes loss.

3. What is a computer virus? give 3 examples. 10 points.
A computer virus is a computer program that can copy itself and infect
a computer without the permission or knowledge of the user. The term
"virus" is also commonly but erroneously used to refer to other types
of malware, adware and spyware programs that do not have the
reproductive ability.

EXAMPLES:
1.)Polymorphic Viruses - Polymorphic viruses change characteristics as
they infect a computer.
2.)Stealth Viruses - Stealth viruses actively try to hide themselves
from anti-virus and system software.
3.)Fast and Slow Infectors - Fast and Slow viruses infect a computer
in a particular way to try to avoid being detected by anti-virus
software.

4. Is working with computers for a long period of time can cause
various types of health problems? Why? give EXAMPLES  20 points

Yes, because long usage of computers can cause glaucoma, our eyes is
affected by the bright screen and can make our eyes strain and dry
out. It can also lead to a syndrome where the wrist will ache when
moved due to lack of B-complex.

kitZ

unread,
Mar 16, 2009, 10:40:18 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)
Crestine G. Pelaez BSN II I



1. Artificial Intelligence (AI) is the area of computer science
focusing on creating machines that can engage on behaviors that humans
consider intelligent. The ability to create intelligent machines has
intrigued humans since ancient times, and today with the advent of the
computer and 50 years of research into AI programming techniques, the
dream of smart machines is becoming a reality. Researchers are
creating systems which can mimic human thought, understand speech,
beat the best human chessplayer, and countless other feats never
before possible. Find out how the military is applying AI logic to its
hi-tech systems, and how in the near future Artificial Intelligence
may impact our lives.

2. Genetic engineering, also known as recombinant DNA technology,
means altering the genes in a living organism to produce a Genetically
Modified Organism (GMO) with a new genotype. Various kinds of genetic
modification are possible: inserting a foreign gene from one species
into another, forming a transgenic organism; altering an existing gene
so that its product is changed; or changing gene expression so that it
is translated more often or not at all. Genetic engineering is a very
young discipline, and is only possible due to the development of
techniques from the 1960s onwards. Watson and Crick have made these
techniques possible from our greater understanding of DNA and how it
functions following the discovery of its structure in 1953. Although
the final goal of genetic engineering is usually the expression of a
gene in a host, in fact most of the techniques and time in genetic
engineering are spent isolating a gene and then cloning it. This table
lists the techniques that we shall look at in detail.

3. Virtual reality (VR) is a technology which allows a user to
interact with a computer-simulated environment, whether that
environment is a simulation of the real world or an imaginary world.
Most current virtual reality environments are primarily visual
experiences, displayed either on a computer screen or through special
or stereoscopic displays, but some simulations include additional
sensory information, such as sound through speakers or headphones.
Some advanced, haptic systems now include tactile information,
generally known as force feedback, in medical and gaming applications.
Users can interact with a virtual environment or a virtual artifact
(VA) either through the use of standard input devices such as a
keyboard and mouse, or through multimodal devices such as a wired
glove, the Polhemus boom arm, and omnidirectional treadmill. The
simulated environment can be similar to the real world, for example,
simulations for pilot or combat training, or it can differ
significantly from reality, as in VR games. In practice, it is
currently very difficult to create a high-fidelity virtual reality
experience, due largely to technical limitations on processing power,
image resolution and communication bandwidth. However, those
limitations are expected to eventually be overcome as processor,
imaging and data communication technologies become more powerful and
cost-effective over time.Virtual Reality is often used to describe a
wide variety of applications, commonly associated with its immersive,
highly visual, 3D environments. The development of CAD software,
graphics hardware acceleration, head mounted displays, database gloves
and miniaturization have helped popularize the notion. In the book The
Metaphysics of Virtual Reality, Michael Heim identifies seven
different concepts of Virtual Reality: simulation, interaction,
artificiality, immersion, telepresence, full-body immersion, and
network communication.

4. Electronic commerce, commonly known as e-commerce or eCommerce,
consists of the buying and selling of products or services over
electronic systems such as the Internet and other computer networks.
The amount of trade conducted electronically has grown extraordinarily
with wide-spread Internet usage. A wide variety of commerce is
conducted in this way, spurring and drawing on innovations in
electronic funds transfer, supply chain management, Internet
marketing, online transaction processing, electronic data interchange
(EDI), inventory management systems, and automated data collection
systems. Modern electronic commerce typically uses the World Wide Web
at least at some point in the transaction's lifecycle, although it can
encompass a wider range of technologies such as e-mail as well..
Electronic commerce that is conducted between businesses is referred
to as business-to-business or B2B. B2B can be open to all interested
parties (e.g. commodity exchange) or limited to specific, pre-
qualified participants (private electronic market). Electronic
commerce that is conducted between businesses and consumers, on the
other hand, is referred to as business-to-consumer or B2C. This is the
type of electronic commerce conducted by companies such as Amazon.com.
Electronic commerce is generally considered to be the sales aspect of
e-business. It also consists of the exchange of data to facilitate the
financing and payment aspects of the business transactions.

Finals lab:

1. Plagiarism is the use or close imitation of the language and ideas
of another author and representation of them as one's own original
work.Within academia, plagiarism by students, professors, or
researchers is considered academic dishonesty or academic fraud and
offenders are subject to academic censure. In journalism, plagiarism
is considered a breach of journalistic ethics, and reporters caught
plagiarizing typically face disciplinary measures ranging from
suspension to termination. Some individuals caught plagiarizing in
academic or journalistic contexts claim that they plagiarized
unintentionally, by failing to include quotations or give the
appropriate citation. While plagiarism in scholarship and journalism
has a centuries-old history, the development of the Internet, where
articles appear as electronic text, has made the physical act of
copying the work of others much easier, simply by copying and pasting
text from one web page to another.

Copyright is a form of intellectual property which gives the creator
of an original work exclusive rights for a certain time period in
relation to that work, including its publication, distribution and
adaptation; after which time the work is said to enter the public
domain. Copyright applies to any expressible form of an idea or
information that is substantive and discrete. Some jurisdictions also
recognize "moral rights" of the creator of a work, such as the right
to be credited for the work.
An example of the intent of copyright, based in the United States
Constitution, is simply to promote the progress of science and arts by
securing for limited times the exclusive right of the creator.

2. Computer crime, cybercrime, e-crime, hi-tech crime or electronic
crime generally refers to criminal activity where a computer or
network is the source, tool, target, or place of a crime. These
categories are not exclusive and many activities can be characterized
as falling in one or more category. Additionally, although the terms
computer crime and cybercrime are more properly restricted to
describing criminal activity in which the computer or network is a
necessary part of the crime, these terms are also sometimes used to
include traditional crimes, such as fraud, theft, blackmail, forgery,
and embezzlement, in which computers or networks are used. As the use
of computers has grown, computer crime has become more important.

Examples: a) Spam- or the unsolicited sending of bulk email for
commercial purposes, is unlawful to varying degrees. As applied to
email, specific anti-spam laws are relatively new, however limits on
unsolicited electronic communications have existed in some forms for
some time.

b) Fraud- Computer fraud is any dishonest misrepresentation of fact
intended to induce another to do or refrain from doing something which
causes loss.[citation needed] In this context, the fraud will result
in obtaining a benefit by:altering computer input in an unauthorized
way. This requires little technical expertise and is not an uncommon
form of theft by employees altering the data before entry or entering
false data, or by entering unauthorized instructions or using
unauthorized processes;

3. A computer virus is a computer program that can copy itself and
infect a computer without the permission or knowledge of the user. The
term "virus" is also commonly but erroneously used to refer to other
types of malware, adware and spyware programs that do not have the
reproductive ability. A true virus can only spread from one computer
to another (in some form of executable code) when its host is taken to
the target computer; for instance because a user sent it over a
network or the Internet, or carried it on a removable medium such as a
floppy disk, CD, DVD, or USB drive. Viruses can increase their chances
of spreading to other computers by infecting files on a network file
system or a file system that is accessed by another computer.

Examples:
a) Nonresident viruses can be thought of as consisting of a finder
module and a replication module. The finder module is responsible for
finding new files to infect. For each new executable file the finder
module encounters, it calls the replication module to infect that
file.

b) Resident viruses contain a replication module that is similar to
the one that is employed by nonresident viruses. However, this module
is not called by a finder module. Instead, the virus loads the
replication module into memory when it is executed and ensures that
this module is executed each time the operating system is called to
perform a certain operation. For example, the replication module can
be called each time the operating system executes a file. In this
case, the virus infects every suitable program that is executed on the
computer.

4. As a result, working at a computer for a long period of time
without breaks can cause unnatural strain on us that can result in a
condition called “computer fatigue syndrome”. Computer users have
shown to have a reduced average blinking time while using computers,
which, according to Japanese investigators, causes a major risk of
developing transient, or short-term dry eyes.

Over a period of time, excessive computer use can have cumulative
negative effects on the user including the worsening of
farsightedness, nearsightedness, astigmatism, eye-focusing disorders
and poor eye coordination. In addition, constant working from a set
position can cause neck and shoulder stiffness, as well as stress
headaches, which can then cause pain in the jaw (referred to TMJ or
temporomandibular joint).

Symptoms:

-Eyestrain
-Blurred vision
-Dizziness or nausea
-Headaches
-Change in colour perception
-Increase in nearsightedness
-Red, dry or burning eyes
-Slow refocusing
-Excessive fatigue
-Neck, shoulder and back pain
-Eye-teaming problems and/or occasional double vision

Causes:

-Extending short distance focusing
-Reduced average blinking time
-Poor lighting
-Poor Posture
-Excessive glare
-Starchy Diet











vic

unread,
Mar 16, 2009, 11:50:43 AM3/16/09
to CE 2: Advance Software Application (Brokenshire College)


On 10 Mar, 22:20, "James V. Tayag" <jamez...@yahoo.com> wrote:

> FINALS EXER 4:TOPIC: SCIENTIFIC DISCOVERY AND TECHNOLOGICAL
> INNOVATIONS.
>
> (pls do not copy the contents on the notes posted on this site)
>
> Answer the following questions:
>
> 1. What is artificial intelligence?(10 points)
In the modern world of today, it is the reign of the complex
technologies and this comes the influence of artificial intelligence
that makes the world more eminent in their studies. Artificial
intelligence allows computers to learn from experience, recognize
patterns in large amounts of complex data and make complex decisions
based on human knowledge and reasoning skills. Artificial intelligence
has become an important field of study with a wide spread of
applications in fields ranging from medicine to agriculture.
Artificial Intelligence (AI), the study and engineering of intelligent
machines capable of performing the same kinds of functions that
characterize human thought. The concept of AI dates from ancient
times, but the advent of digital computers in the 20th century brought
AI into the realm of possibility. AI was conceived as a field of
computer science in the mid-1950s. The term AI has been applied to
computer programs and systems capable of performing tasks more complex
than straightforward programming, although still far from the realm of
actual thought. While the nature of intelligence remains elusive, AI
capabilities currently have far-reaching applications in such areas as
information processing, computer gaming, national security, electronic
commerce, and diagnostic systems.
>
> 2. What is genetic engineering? (10 points)
Genetic engineering is the alteration of genetic material by direct
intervention in genetic processes with the purpose of producing new
substances or improving functions of existing organisms. It is a very
young, exciting, and controversial branch of the biological sciences.
On the one hand, it offers the possibility of cures for diseases and
countless material improvements to daily life. A scientific
alteration of the structure of genetic material in a living organism.
It involves the production and use of recombinant DNA and has been
employed to create bacteria that synthesize insulin and other human
proteins.
>
> 3. What is Virtual Reality? (10 points)
Virtual Reality is not just a tool; it is at once technology, medium,
and engine of social relations. It not only structures social
relations, it is the space within which the relations occur and the
tool that individuals use to enter that space. It is more than the
context within which social relations occur, for it is commented on
and imaginatively constructed by symbolic processes initiated and
maintained by individuals and groups. Moreover, it is a technology
which allows a user to interact with a computer-simulated environment,
whether that environment is a simulation of the real world or an
imaginary world.
> 4. What is Electronic commerce? (10 points)
Electronic Commerce is doing business online, typically via the Web.
It is also called "e-business," "e-tailing" and "I-commerce." Although
in most cases e-commerce and e-business are synonymous, e-commerce
implies that goods and services can be purchased online, whereas e-
business might be used as more of an umbrella term for a total
presence on the Web, which would naturally include the e-commerce
(shopping) component. E-commerce may also refer to electronic data
interchange (EDI), in which one company's computer queries and
transmits purchase orders to another company's computer.
>
> FINALS LAB PERFORMANCE: TECHNOLOGICAL ISSUES
>
> 1. What is the difference between plagiarism and copyright? 10 points
Plagiarism is stealing somebody's work or idea: the process of copying
another person's idea or written work and claiming it as original wile
copyright is the legal ownership of a "work," which can take any of
the following forms: written text, program source code, graphics
images, sculpture, music, sound recording, motion picture, pantomime,
choreograph and architecture.
>
> 2. What is a computer crime? give 2 examples. 10 points
Computer crime is a crime using computers: illegal activities carried
out on or by means of a computer. Computer crime includes criminal
trespass into another computer system, theft of computerized data, and
the use of an on-line system to commit or aid in the commission of
fraud.
> The best two examples are hacking and internal and external threats
> 3. What is a computer virus? give 3 examples. 10 points.
It is a computer program that is designed to replicate itself by
copying itself into the other programs stored in a computer. It may be
benign or have a negative effect, such as causing a program to operate
incorrectly or corrupting a computer's memory.
The three best examples are Futronix, love letterand CIH (a.k.a.
Chernobyl).
>
> 4. Is working with computers for a long period of time can cause
> various types of health problems? Why? give EXAMPLES  20 points
Yes, first it was studied by the American Optometrist Association
that pay attention to the obvious fact again: working at the computer
is not natural for human eyesight. 70-75% of all users which routinely
work at the monitor screen have problems with the eyesight. A lot of
complaints come from the computer operators about sharp pain in the
eyes, blaring, the common eyesight worsening. Moreover, people, which
earn with the work on a computer, have the greatest part of health
complaints on muscles and joints diseases. Mostly this is simply neck
torpor, shoulders and loins pain or legs pricking. Finally, when
working at the PC bar bate muscle feels load over 8,5%, and trapezium
muscle – 13,5% of maximum voluntary force of this muscles, what
answering considerable load on neuron muscular system. Coupled with
big arm moves quantity (they can amount to 40 thousand) with working
at the keyboard, it can lead to over fatigue and occupational disease
evolution.

jurich bitco

unread,
Mar 16, 2009, 12:43:29 PM3/16/09
to ce-2-advance-software-appl...@googlegroups.com
Final exer 4.Scientific discovery


1. What is artificial intelligence?
-- It is a software that can process information on its own without human interventions which means it is very advanced because it doesn't anymore need us to operate.


2. What is genetic engineering?
-- Genetic engineering is the insertion of foreign genes into microorganisms to enable the microorganisms to produce specific gene products or to enable them to be used for other purpose.  For me, this is one of technology's advantage which helps prolong human life as well as help in farming and other endeavor.

3. What is virtual reality?
-- Since virtual reality is an artificial environment that feels like a real environment it is a very good place where a person could practice a certain skill like that done by student pilots.  They have this simulation room where they feel like they are flying a real plane in which they could check their capability before doing the real thing.

4.  What is E-commerce?
-- It is conducting business online which for me is very convenient and helps a lot those home-based, micro-businesses become known and enable it to expand its customer base.  Thus it makes a business grow and earn more profit.

Final Exer: Technological Issues

1. What is plagiarism & copyright?
-- Plagiarism is presenting someone else's idea or work as your own, without authorization in short, its piracy while copyright is the exclusive right granted by law for a certain number of years, to make and dispose of literary, musical or artistic just like in the music industry where composers/singers has copyright of their songs and hackers do plagiarism that is why pirated dvds proliferate in the market.

2. What is computer crime?
-- It is a criminal act committed through the use of a computer example are unauthorized use of a computer and copyright violations of software.

3. What is computer virus?
-- It is a program written usually by a hacker to cause the corruption of data on a computer examples are trojan horse, time bomb and worm.

4. Is working with computers for a long period of time can cause various types of health problems? Why? give EXAMPLES?
-- Yes,
due to the fact that you stare at the monitor for so long, you can encounter any of the following ailments including Eye strain, Tingling, coldness, or numbness in the hands at anytime even after a period of using your keyboard,some loss of strength and coordination in the hands, Pain that wakes you up at night sometimes , Feeling the need to massage your hands after keying in data, wrists, and arms and Pain in the upper back, shoulders or neck, this will be most likely due to the repeated use of a computer or can acquire BLOOD CANCER or Leukemia caused by the radiation.

Reply all
Reply to author
Forward
0 new messages