Wednesday, April 27, 2011

Chapter 10 Highlights - 3 Facts Learned Blog

Assignment 8 - After reading Chapter 10, post to your blog 3 facts you learned from the chapter. Tell the fact, definition, or explain what you learned.

Fact 1 - I learned that electronic commerce (e-commerce) and electronic business (e-business) are used interchangeably for a broad definition. The terms define any business process or processes conducted using Internet technologies.

Fact 2 - I learned that the cost of setting up a Web site and creating a presence for an Internet business can be far less expensive than renting an office and creating a presence in the physical world.

Fact 3 - I learned that the most successful online businesses sell services or small, lightweight, or unique products.

Monday, April 18, 2011

Chapter 9 Highlights - 3 Facts Learned Blog

Assignment 7 - After reading Chapter 9, post to your blog 3 facts you learned from the chapter. Tell the fact, definition, or explain what you learned.

Fact 1 - I learned that a beginning Web page designer using HTML should use limited fonts that are commonly installed on all computers. This is to ensure that the Web page is displayed correctly when viewed by others.

Fact 2 - I learned that most Web servers process upper and lowercase characters as the same. It is a good idea to save HTML documents in all lowercase to prevent compatibility issues if the Web site is ever moved to a different server.

Fact 3 - I learned that it is a good idea to check your work periodically in a Web browser as you are working in a HTML document. This allows the developer to look for problems in coding and to make sure the page being created looks correct.

Wednesday, March 30, 2011

Chapter 8 Highlights - 3 Facts Learned Blog

Assignment 6 - After reading Chapter 8, post to your blog 3 facts you learned from the chapter. Tell the fact, definition, or explain what you learned.

Fact 1 - I learned that the new upcoming 4G wireless network technology is expected to bring connection speeds up to 100 Mbps. This technology will also make it possible for wireless devices to move between different wireless networks without losing signal.

Fact 2 - I learned that in 1978 wireless technology was first successfuly used in Chicago which created the first generation of wireless networks. This first generation of wireless networking consisted of phones with voice-only capabilities that operated wirelessly on an analog cellular network (cell phone).

Fact 3 - I learned that Bluetooth compatible devices communicate automatically and do not require an access point for communication. I also learned that there is no single manufacturer or specific group that owns the copyrights to Bluetooth technology.

Thursday, March 10, 2011

Chapter 6 and 7 Highlights - 6 Facts Learned Blog

Assignment 5 - After reading Chapter 6 and 7, post to your blog 3 facts you learned from each chapter. Tell the fact, definition, or explain what you learned.

Chapter 6

Fact 1 - I learned that Web-based chat sites offer the same features as text-based chat and instant messaging without requiring the user to dowload or install any software. This makes Web-based chat more convenient and easier to use.

Fact 2 - I learned that Web 2.0 is sometimes referred to as the "new Internet". Web 2.0, in fact is not a "new" Internet at all. This was a term used to indicate a change in the way people used the Web. The Web had evolved to make it easier to create and interact with content. Connected people were now able to push information to other users.

Fact 3 - I learned that YouTube was one of the first Web sites created that allowed public video sharing. Major networks and music labels saw YouTube as an advertising tool and created partnerships that contributed to YouTube's success.

Chapter 7

Fact 1 -I learned that computer security threats are categorized into three categories. The three categories of computer security threats are secrecy threats, integrity threats, and necessity threats. Some threats can be classified into more than one category.

Fact 2 -I learned that physical and logical security are the two forms of security used to protect assets from unauthorized access, use, alteration, or destruction. Physical security refers to the use of tangible devices to protect assets, such as locks, alarms, safes, etc...Logical security refers to the use of a nonphysical means to protect assets, such as password protection.

Fact 3- I learned that active content such as Java, JavaScript, and ActiveX components can be used as entry points for malicious purposes. A Java applet could be used to consume a computer's resources. An ActiveX component could be used to reformat a hard drive.

Wednesday, February 23, 2011

Chapter 5 Highlights - 3 Facts Learned Blog

Assignment 4 - After reading Chapter 5, post to your blog 3 facts you learned from the chapter. Tell the fact, definition, or explain what you learned.

Fact 1 - I learned that JPEG and MPEG file formats both lose quality due to compression. This results in the reduction of graphic quality for JPEG files and video quality for MPEG files.

Fact 2 - I learned that musical instruments are usually recorded in MIDI format to easily manipulate that sound characteristics of individual instruments to produce a precise sound. The WAV format is normally used when recording music to CDs to produce higher quality sound.

Fact 3 - I learned that in the United States after 1977, the copyright law protects individual works for the life of the individual plus 70 years. Copyrighted works by corporations and nonprofit organizations are protected for 95 years from publication date or 120 years from the creation date. Once the copyright has expired, the files can be copied from the public domain freely without the permission of the source.

Tuesday, February 8, 2011

Chapter 3 and 4 Highlights - 6 Facts Learned Blog

Assignment 3 - After reading Chapter 3 and 4, post to your blog 3 facts you learned from each chapter. Tell the fact, definition, or explain what you learned.

Chapter 3

Fact 1 - I learned that a printer-friendly version of a message excludes content, such as ads and links.

Fact 2 - I learned that Windows Live provides free Web-based services to account holders to allow file and photo sharing. Windows Live also presents an opportunity to manage an online profile to create a network of friends.

Fact 3 - I learned that Gmail is made free to users by adding advertisements to email messages in the form of targeted advertisements. Targeted advertisements are added to the user's message based on keywords included in the message.

Chapter 4

Fact 1 - Web search tools consists of four broad categories of sites that can be used individually or in combination to accomplish a Web search strategy. The four broad categories of sites that include Web search tools are search engines, directories, metasearch engines, and Web resources such as Web bibliographies.

Fact 2 - I learned that a metasearch engine searches the database's of multiple search engines for a possible match or hit in response to a user query. This Web search tool prevents a user from searching multiple search engines separately when a query can go unmatched from numerous databases.

Fact 3 - I learned that some search engines provide a clustering feature that serves as a filtering effect to group the hits in to categories. This feature is helpful because a query can have multiple definitions and the categories provide a way to narrow down a search from thousands or millions.

Tuesday, January 25, 2011

Chapter 2 Highlights - 3 Facts Learned Blog

Assignment 2 - After reading Chapter 2, post to your blog 3 facts you learned from the chapter. Tell the fact, definition, or explain what you learned.

Fact 1 - I learned that Opera Mail saves messages in a single database rather than mailbox folders as other email programs do. The database inhibits built-in filters and allows the user to place messages into categories for easy search and retrieval of messages.

Fact 2 - I learned that spam is also known as unsolicited commercial email (UCE) or bulk mail. It has been reported by the Messaging Anti-Abuse Working Group (MAAWG) that 80% of daily sent email consists of abusive spam.

Fact 3 - I learned that a blind courtesy copy (Bcc) hides a recipient's address from all other recipients. The blind courtesy copy line can be used to hide the involvement of a main recipient. A blind courtesy copy also has the ability to aware one or more recipients of the message and protect the privacy of their address.