Thursday, August 18, 2011

My Insights in COMPSCI


For almost 3 months of Attending class in compsci I’ve learned a lot specially for using social networking for real I don’t know how to use social networking my classmate told me that in our class only me don’t use social networking that time I use Friendster and because of Friendster I am addicted in other social networking like twitter and when i was in 3rd year high school I use Facebook and that time I deleted my account in Friendster. Facebook is so popular that time until now. I use facebook because my friend told me that in facebook you can chat with your friends, relative, and it has many games and I learned in this class about social networking is always think before you click because that will be the cause if your misunderstanding to your friends or some misconnection to your relatives etc. For real tho social networking don’t help us in our future or in our dream it makes our time fast because when you're using your account and you have an assignment i believe that we must open our account first before open our notebooks. And some common problem about using social networking it may cause failing grades.

Another thing I’ve learned in this class is about the copyright for me when I was in high school all of my papers are copy and paste i have no idea about the piracy in that time but when I heard the news about Wikipedia which is suing for copyright(my high school teacher told me about that I don’t know if that is true) and how to use the idea which you copy and paste.

There is another topic stock in my mind is the topic about the e business I thought you will become rich when you enter that field well I guess not because you cannot sell your product in other countries because some countries have their own law for selling product that are piracy or in other word the imitation which is more popular here in Philippines but in other countries i thought that imitation is against the law some example of imitation products here in Philippines is like the signature bags like Chanel, Hermes etc. You cannot delivery it in other countries that banned the imitation. Some businessman or businesswoman here in Philippines earns a lot because of selling imitation and I thank this topic because it gave an idea for safe business. This is not against the law.

Another thing is hacking for me I don’t know how to hack an account but by this topic it gives me an idea how to become safe even if in facebook when you change your setting in friends only which is not safe for the hackers. This topic helps me to put a password that is not related in my personal life. I said to my parent who’s also using the social networking to change their password which is not related to their lives.

Another topic which help me a lot is the misconception about computer some of my high school friends told me when I buy my laptop is use it carefully because they said if you restart your device it may cause a severe shutdown but I don’t follow them because I thought that they just kidding me and when this is our topic in compsci i have the idea about this problem and when this will be our project i do a lot of research and i knew that my friends have the wrong information about restarting your device. Another problem is the deleting a file will be permanently deleted we all know that when we deleted something it goes in trash bin or recycle bin and we don’t know that when is a file is permanently deleted.

When I was in 4th year high school our computer were automatically shut down so I thought that our computer has a virus so my mom call a technician and he said that we need to format our computer so we believe in him our computer was formatted but i know that time is when you formatted your computer you can recover or back up your files but when I saw the library all files were permanently deleted and can’t be recover so my mother was so mad to the technician because he didn’t back up our files. But we are lucky that nothing important was lost because all documents of my parents are in their laptop. All files that are lost is mostly like picture and movies but it’s okay.

Compsci taught me some things about computer that I realized I can make it in real life.

THIS WILL BE MY PROJECT IN COMPSCI GOOD LUCK :) 

Sunday, August 14, 2011

Stories About Taking Advantages of Using Social Networking

1. Personally greet new members
    

 Veronica Alvarez is the founder of FertilityTies, an online community for those trying to conceive or going through infertility. Since fertility is a very sensitive and sometimes uncomfortable subject, Alvarez went out of her way to greet all new members personally through the site. “I believe this was instrumental for new members to feel genuinely welcomed and to have a higher inclination to come back and visit the site,” said Alvarez. Soon after, one of the site’s fertility doctors helped out with the personal greetings. And a few months after that, the site’s veteran members continued the good will by greeting new members themselves.
The warmth of the community has become infectious and last Christmas, some members got together and surprised one of the site’s fertility doctors with a personalized gift, plus a gift basket to Alvarez for building the community to help them through their difficulty journey to conception. With 85,000+ monthly visitors and 20% monthly growth, Alvarez still makes as much time as possible to greet new members, plus gladly sees other members join in as well. As Alvarez chimes, “We’ll continue to grow one warm greeting at a time!”
2.Selective Networking

Managing the marketing for Motion GolfSarah Greenwood was only interested in growing her client’s social network with golf enthusiasts. She began searching for golf trade associations and non-profits that were on Twitter. She mined the lists of people they were following looking for amateur golfers, golf pros, golf companies, golf blogs, golf writers, and media outlets. This required a lot of research, clicking through and reading bios of many users. To get followed back it was important for her to read posts, interact, and start a dialogue. She quickly realized that those who chose not to follow her back were not interested in interacting with her. So she unfollowed those people.
It’s been a lot of work says Greenwood, but after three weeks she’s set up four cross-marketing projects with other companies, and had conversations with two tour players, four national media writers, and many golf bloggers. Today, the company’s Twitter account (@MotionGolf) has more than 1,400 highly targeted followers.

3.The husband who dumped his wife by Facebook: 
"A separation is hard for everyone but finding out your marriage is over on the internet is too much! Emma Brady, a 35-year-old woman was shocked by a message her husband posted on the social networking site: "Neil Brady has ended his marriage to Emma Brady." The woman said she had no idea about it until her best friend in Denmark phoned her to “check if she was all right”. Her ex husband Neil Brady, who is now living with his mother, stated he had mentioned the separation to his wife. And added 'Id had enough of her'. We get the picture Neil… but anyways, you could have told it clearly to her face. "
4.The woman who had her Facebook photo stolen and used as advertising in the Czech Republic : 
"Everybody say cheese!! What a beautiful moment for this Missouri family posing for their Christmas card photo. But what they didn't expect is that the photo would end up somewhere else than their living room. Yes, a giant version of the image was spotted by a college friend of them on a food store in Prague, the Czech Republic . The photo was being used as an advertisement without any authorization. Grazie store in Prague's owner, Mario Bertuccio said he took it from the internet and he had no idea it belonged to a real family. Well Mario, say that to the judge. "


5.The Thirteen year old girl met a man on Facebook had sex with him and the hid him in her closet. "A very shocked woman called the police after she opened her teenage daughter's bedroom closet and found a 19-year-old man hidden inside. The 13-year-old girl admitted she had had sex with the man after meeting him on Facebook. Actually, according to the police, the man had been hiding in her closet since at least 2 days. The Facebook Romeo was arrested and is in custody awaiting possible criminal sexual conduct charges. "

Disadvantage of using Social Networking
1. According to: http://www.helium.com/items/1878218-the-disadvantages-of-social-networking
Social networking sites can sell your personal information to anyone who wants to buy it, including spammers and on line predators. Even if the terms of understanding claim that no personal information will be sold, the site can change its policy at any time.

-Lots of great content still gets overlooked. Current lack of good filters creates problems finding the best content.

-Writers have problems delivering content consistently.
-Anonymity can engender polarization and hate.
-Information overload and social networking overload.
-Work/Life balance is hard to achieve.
As society and technology moves forward we stand at a watershed moment and history, so it is vitally necessary to stop and think about our societal trajectory.
3.Based on:http://webupon.com/web-talk/the-advantages-and-disadvantages-of-using-social-networking-sites/
Scams, rumors and frauds spread easily. Because messaging and chatting is easy with the use of social networking sites, scams, rumors and frauds can be easily sent and spread. Some crazy people may start rumors about certain topics until it reaches everyone’s ears. Once the rumor has been spread, it will continue on and on.
You can lose privacy. Though you can adjust the privacy settings, you can still lose privacy. Some people, whom you don’t know, may look at your pictures, posts, comments, and a lot more
You could be a victim of cyber-stalking. Many have been a victim of cyber-stalking. You could be one of them because of social networking sites. A person (or even group of persons if you are very attractive) may be attracted or interested in you then keep on stalking you online. It is hard to know who your online stalker is. So, be careful in using social networking sites.
Addiction. Admit it. Social networking sites are very addicting. It is the reason why many students cannot concentrate on their studies and workers cannot do their job well. Children of today’s generation are less physically active compared to the children years ago. The reason is that children today spend most of their time in front of the computer using social networking sites. Social networking sites are also one of the reasons why office workers get scolded by their boss or even get fired.







Sunday, July 03, 2011

Law and Order : Access Nation

Law and Order is all about the murder of a psychologist leads to a case involving a computer company that sell information and their responsibilities in shielding their clients's history to serve their needs.

RISKS TO INTERNET PRIVACY
     In today’s technological world millions of individuals are subject to privacy threats Companies are hired not only to watch what you visit online, but to infiltrate the information and send advertising based on your browsing history. According in the article (http://en.wikipedia.org/wiki/Internet_privacy) risks to internet privacy - Privacy measures are provided on several social networking sites try to provide their users with protection for their personal information. for example On Facebook privacy settings are available for all registered users The settings available on Facebook include the ability to block certain individuals from seeing your profile, the ability to choose your "friends," and the ability to limit who has access to your pictures and videos  It is the user's prerogative to apply such settings when providing personal information on the internet.

Computer Hacking
     Computer hacking is more difficult to define base on http://www.ed.uiuc.edu/wp/crime/hacking.htm Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy),. Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, web pages or software. The impact of computer hacking varies from simply being simply invasive and annoying to illegal. There is an aura of mystery that surrounds hacking,and a prestige that accompanies being part of a relatively "elite" group of individuals who possess technological savvy and are willing to take the risks required to become a true "hacker".

Recovering Deleted Files
     Deleting the file isn’t the end,  According to http://www.geekgirls.com/2010/02/recovering-deleted-files/ All you need to do is open up the Recycle Bin on your desktop, select the file and drag it onto the desktop or into an Explorer window to recover it. Or simply double-click to open the Recycle Bin, select the file, and choose Restore from the pop-up menu to restore it to its original folder
       

Monday, June 06, 2011

Belief and Issues about Computers..

     Is there's the time that you have heard someone telling you that your computer doesn't sound quite right or that sound a bit odd? Don't feel alone ;( this is a kind of computer misconception and i will show you the other common computer misconception.

     MYTH: The speed of a computer is determined by the System Resource

     TRUTH: Low resource can cause a computer to run slower but the speed of the system is not determined by the amount of system resource many things determined the speed but the most important are the speed and type of processor the amount of memory,speed,and type of RAM.the speed and size of the level two cache all have an effect some of these can also affect system resource though that is just a symptom only.and the cause that your system become slow is that there's a low amount of RAM installed in your computer.

     MYTH: Don't need an antivirus program because you use firewall.

     TRUTH: A firewall is designed to help prevent unauthorized entry into your computer from the internet its not designed to help prevent virus infection nor it is able to determined if there is a virus nor to remove one.

     MYTH: Restarting the computer is the same as shutting it down completely then powering it back up.

     TRUTH: Shutting down your computer off completely and waiting at least 30 second before powering it up again allows electrical current that is still in the wiring and board to seep out .Restarting doesn't do this .current is maintained.Turning a compute off periodically is vary good idea.

     MYTH: Restarting computer will cause damage to it.

     TRUTH: Not only restart not harm the computer the will actually help it.as you use your computer information is put in temp files as well as in a location known as Swap files where it can more easily be retrieved for use by the application closing those application does not release all of this information so eventually the computer will no longer run efficiently and may even freeze with the standard use a computer should be restarted at least once or twice a day.

Thank you for reading my post. :D
SOURCE:
             http://www.helium.com/items/443611-common-computer-misconceptions

Friday, May 27, 2011

Generations of Computers

FIRST  
GENERATION 
COMPUTER (1951-1958)
In 1951 the first generation of computer started with the UNIVAC I which stands for Universal Automated Computer built by J. Presper Eckert and John Mauchly I have a research   about them and i found out that they are the founder of EMCC (Eckert-Mauchly Computer Corporation)who designed the first commercial computer in U.S (United State) and the inventor of ENIAC or the Electronic Numerical Integrator and Computer it is the first general purpose electronic computer.UNIVAC I  is sold to the US Census Bureau. It is dedicated to business data processing so i thought it is only for business matter and not for military or scientific purposes.Its characteristic is it use vacuum tubes in electronic circuit which controlled the internal operations and this vacuum was huge.so the consequence is the machine is also large like in the picture above. 

SECOND GENERATION   
COMPUTER (1959-1964)
Not like First Generation Computer that use
vacuum tubes for internal operation.The Second Generation Computer use a tiny solid  state transistor like you saw on the picture.but the good about it the heat problem was minimized and the computer could be made smaller and faster.i thought that because of the tiny solid transistor computer can be smaller and faster not like vacuum tubes that are so huge and the computer was also huge.



THIRD
GENERATION
COMPUTER (1955-1970)
The use of IC (Integrated Circuit) replaced the old tiny solid transistor of the second generation computer this circuit are printed and hundreds of electronic components could be put on silicon circuit.like tiny solid transistor IC or integrated circuit has greater storage capacity..
FOURTH 
GENERATION
COMPUTER (1971-Present)
A Fourth Generation Computer is a modern day computer.so its more faster and more reliable to a specific task and has a greater amount of storage data. and the size started to go down with the improvement in the integrated circuits.it use a very large scale that many component could be fit in a small chip.it reduced the size and price of the computer at the same time increasing power and reliability. .The intel chip developed in 1971 took the integrated circuit one step further by locating all the component of a computer.


FIFTH 
GENERATION 
COMPUTER (1982-Present)
All of our computer in our home are fully developed when it comes in faster processor and much greater storage capacity not like 1st to 4th generation i thought this computer is capable of course and more convience to  our needs when it comes in doing your  project or research or even surfing the  internet,multitasking and private business purposes.thats why we are lucky to have this kind of computer which is very useful to us in our daily routine.

History of Computers (Francis Altez)

Seriously computer was not introduced to me when i was in grade school because in public school that time i think that was year 2005 and i was grade 5 we don't have any computer subject but i know what computer is but i don't have any idea about it example what are the parts of computer but when i step in high school and now i studied in a private school and the first thing that I've learned about computer is the father of computer who is Charles Babbage yeah we all know our teachers first introduced to us is who originated the concept of computer or computer programming you can see about him in blog archive right beside my blog with the title "Father of Computer".I learned that computer is a programmable machine designed to sequentially and automated carry out a sequence of arithmetic or logical operations.Lets start in the ancient times.



ABACUS     
When i was a child i have an abacus in my room but I don't know how it works then when i step in grades school my teacher told us that abacus is a kind of calculator but i don't believe in her and i think that she was joking then she gave us an  assignment about abacus and when i found out it is a kind of calculator and i was kind of idiot that don't believe in my teacher .well that was epic :D so an ABACUS is the early known device to record computation  and it dates back to ancient time.well that time real calculator was not invented so it used to be the first manual tool used in calculating answer.but time has come and a real calculator was developed.do you know him?Well i guess not? he is..


BLAISE PASCAL
He developed what system are we still used today and that is calculator which many of us still used when it comes in problem solving and other business matter it is very useful to us but did you know that he is a kind of child prodigy?which means at an early age he master one or more skills far beyond their level of maturity because he was educated by his father whose a tax collector in Roune,France.and while he still a teenager he started work on calculating machine and many years to come he invented mechanical calculator which is used to perform the basic operations of arithmetic.




CREDIT:
 http://library.thinkquest.org
                                                                 

Thursday, May 26, 2011

2 Kinds of Computer

GENERAL PURPOSE COMPUTER  
     Did you know what type of computer are we using for word processing or serve as storage data?Well it's a General Purpose Computer which has to be able store data so,it has to have a memory or RAM which stands for Random Access Memory. and i red in an article that RAM or Random Access Memory is a "volatile memory" because the date is on a chip but it is "temporarily" which means it serve for a limited time for example when you switch off your computer the data will disappear. it means that the memory will not work if your switch off your computer.or the data will be used when you switch on your computer.and another things about general purpose computer is it is often understood to be a large systembut it may also be a smaller computer like desktop workstation.                            


SPECIAL PURPOSE COMPUTER
 A Special Purpose Computer base on a article in it is designed to solve specific problem and it has many features of general purpose computer but it is designed only to handled specific problem and not to handled computerize activities like documenting .It means it is designed to process numeric data or other term for quantitative data which means it measured or identified on a numerical scale and numerical data can be analyzed using statistical method, so we can use a special purpose computer to figure out specific problem than general purpose computer which handled computerize activities.


Credits:
  http://www.blurtit.com
  http://www.its.bldrdoc.gov

Father of Computer

CHARLES BABBAGE
Nowadays we all know that computer is one that teens and other people needs for research,documenting,and also for gaming to have fun. But did you who is the Father of Modern Computing or the Father of Computer?well i guess not?He is Charles Babbage ,Born on the 26th of December 1791 in London England. He was an inventor and he originated the concept of computer programming.i red in an article that Charles Babbage studied mathematics and logic at several school.and found himself disapointed with most of the curriculum.well that was tragic :(. but on his own he designed an early computer which is not actually constructed and he also designed a printer and an analytical engine which would work alongside with his designed early computer,his analytical engine operate by a program which is created by Ada Lovelace whose now credited as the first programmer.


His Signature: