Download presentation
Presentation is loading. Please wait.
Published byOctavia Russell Modified over 10 years ago
1
Computers and Society IST 2710 Section 006 Class #12: 4/9/08 http://www.is.wayne.edu/drbowen/casw08
2
4/9/08Computers and Society, Class 122 Grade What-If Excel spreadsheet to estimate your course grade Download from course website Save to local storage to preserve and update Can get grades from Online Grade Reports Danger in leaving grades blank if not done
3
4/9/08Computers and Society, Class 123 Staying for Lab Two or more labs or assignments behind, must stay during Lab to get 100% attendance credit tonight - 8 labs in, and 7 assignments in. Who must stay: oEVERYONE! (Unless you have turned more in tonight).
4
4/9/08Computers and Society, Class 124 Social Issues - Essay Due today From “Social Issues” handout on website Topics for short homework essays and semester essay, and on Quiz 2 and final Review of semester Essay (handout in first class) o3 – 5 pages oOne one of the social issues from web page oMust use course materials and discussion oNot a research assignment
5
4/9/08Computers and Society, Class 125 Makeup for Quiz 2 Next week, April 16, 5 – 6 PM in Room 213
6
4/9/08Computers and Society, Class 126 Upcoming Assignments This week, April 9 oEssay, on diskette oStudent Evaluation of Teaching (SET) Next week, April 16 oMakeup for Quiz 2 oLast regular class, lab in class Handout tonight oAll work to be counted in regular grade must be in(*) oReview for Final Two weeks, April 23: Final Exam
7
Review of Quiz 2 Average 72 curved up to 82, circled grade at top of paper is the curved one, the one that counts oMy curving: lower grades get more boost Q1A: text stored by codes for characters oASCII, Unicode Q2B: images stored in pixels, RGB code for each pixel oEach row left to right, rows top to bottom 4/9/08Computers and Society, Class 127
8
Review of Quiz 2 Q2A: Virus harms computer (files, programs), spreads itself Q2B: Keyboard logger records keystrokes, sends them to someone else (hacker) oKeystrokes captured before encryption Q2C: Computer virus hoax is a false rumor of a virus Q3: short essay on issue: (a) background, (b) at least two views, © your own view 4/9/08Computers and Society, Class 128
9
Review of Quiz 2 One essay file not on floppy, gets a zero oCHECK YOUR DISKETTE! Excel, must be able to enter formulae on list 4/9/08Computers and Society, Class 129
10
Topics FOLED Open Source Vs Proprietary Computer Connections Access Internet Enhancements Social Issue SET Lab 12 4/9/08Computers and Society, Class 1210
11
FOLED For Assignment 12 In earlier Computers and Technology in a Changing Society Now picture only oBottom right of Figure 8-1 on Pg 268 showing a roll-up display. Stands for Flexible Organic Light-Emitting Diode. oMay be important for miniaturized computers 4/9/08Computers and Society, Class 1211
12
Open Source Vs Proprietary Two competing models, primarily for software, of how it gets developed oProprietary: for profit, users cannot modify it, file formats are trade secrets Tested by manufacturer before release oOpen source: developed by core group of users with input from all Code and file formats publicly available with modification rights (*) Tested continuously by users 4/9/08Computers and Society, Class 1212
13
Open Source Vs Proprietary In theory: oProprietary: Developed by professionals In theory, better coordinated, integrated, tested oOpen Source: Features users really want Actually: oOpen source often works better, tested more thoroughly by wide user community oProprietary does have better technical support oOpen source free or very inexpensive 4/9/08Computers and Society, Class 1213
14
Open Source Vs Proprietary Operating System Applications ProprietaryWindowsOffice Open SourceLinuxStar Office Google Docs 4/9/08Computers and Society, Class 1214 Examples:
15
Computer Connections “Serial” – one wire (actually two for return) oBits one after the other in time (serially) oEarlier had one wire for each bit (parallel), theoretically faster but more complex and electronic speeds now so fast that speed not an issue MBps – Mega Bytes per second Mbps – Mega bits per second 4/9/08Computers and Society, Class 1215
16
Computer Connections 4/9/08Computers and Society, Class 1216
17
Computer Connections 4/9/08Computers and Society, Class 1217
18
Computer Connections 4/9/08Computers and Society, Class 1218
19
Computer Connections 4/9/08Computers and Society, Class 1219
20
Computer Connections Wireless Internet o802.11(?) new types o802.11g 54 Mbps o802.11n is latest, 200 Mbps oLater ones compatible with earlier 4/9/08Computers and Society, Class 1220
21
Access Microsoft Access – database oLooks like Excel but not Faster Handles much more data More secure Can do more things with data oColumns called Fields Same piece of info in each row of a field – e.g. first name, last name, date of birthd oRows called records – all info about one case 4/9/08Computers and Society, Class 1221
22
Access Enter data – always in last record oIf you just close, what happens, or doesn’t happen? Sort For demo, download file WebLog.accdb from IST 2710 website ohttp://www.is.wayne.edu/gst2710http://www.is.wayne.edu/gst2710 Filter, join 4/9/08Computers and Society, Class 1222
23
Two Internet Enhancements IPV6 – IP Version 6. oCurrently IPV4 – no IPV5 oIPV4 has four bytes for Internet addresses – 32 bits o2 32 = 4.3 Billion – seems like a lot, but… o6 Billion people on earth, headed for 9, and each one of us will need a lot of IPs oIPV6 16 bytes - #IPs = 3 with 132 zeroes 4/9/08Computers and Society, Class 1223
24
Two Internet Enhancements Internet 2 – different than Web 2.0 oMuch faster Ultimately thousands of times faster than current broadband ohttp://www.internet2.eduhttp://www.internet2.edu oAlso will have security enhancements 4/9/08Computers and Society, Class 1224
25
Social Issues Privacy oThreats: Someone else reading our private information Intercepting our communications Gathering information from many different sources (use of databases to coordinate it all – see Access Demo tonight) oWays to counter all of these threats Be careful with personal information Strong passwords 4/9/08Computers and Society, Class 1225
26
Social Issues Privacy oWays to counter all of these threats Antivirus, firewall Turn computer off when not in use oThe ultimate protection: Encryption or scrambling Public-key – private-key Authentication Stronger than signature 4/9/08Computers and Society, Class 1226
27
Social Issues Privacy oWill probably need legal protection or limits for information about you that is held privately: examples Phone records Magazine subscription records Credit card transactions oStill, online more secure than offline oProblem is speed and scale of selling info 4/9/08Computers and Society, Class 1227
28
SET IST 2710 Call Number: 23186 Instructor: David Bowen 4/9/08Computers and Society, Class 1228
29
Lab 12
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.