Sunday, November 28, 2010

Muddy: Week 14

Week 14 was completely confusing to me. I was familiar with the RAID1 and RAID0 from previous lectures, however, adding RAID5 and these other types of advanced storage devices along with networking really threw me for a loop. It was also extremely hard to concentrate on during the Thanksgiving Holidays and I almost forgot we had a class assignment due.


To begin with, this week was all about Enterprise Computing. Throughout this lecture we talked about RAID, which stands for Redundant Array of Independent Disks. This method is used to treat multiple disks as if they are one as to be more efficient. RAID0 uses a striping method to utilize two or more drives at once. The main problem that comes with using this method is that if one drive fails they both fail and all data is lost. Most people prefer to use RAID1 which has a mirroring technique. This technique copies the drive allowing for data recovery if either drive fails. 


This information is extremely valuable in the business world because it can protect a major corporation from a complete system meltdown. If they choose the wrong type of storage and do not have their files properly backed-up, then the business could completely fail and go under. While this technology is also very important to the everyday user. 


Below I have included a link to a website that helped me to better understand the multiple advanced storage systems CPUs can come with and how they can be used. 


http://www.wdc.com/en/products/raid/



Monday, November 22, 2010

Secure Email Project

This week our Secure Email Project was due. I had no idea how time consuming this project would be this is one that you definitely do not want to wait to the last minute to do just because of all the downloading, encrypting, digitizing and emailing. To begin with I have never had the need to use encrypted emails or digital signatures, and until now I had no idea why someone would need to use such devices as digital certificates. 


The following link will take you to a website that will teach you all about encrypted email and how it will help protect your privacy and increase your computers security. According to the article one of the number one reasons to secure your email is to prevent the possibility of your computer contracting a virus or spam. Phishing emails are one of the most commonly accidentally opened viruses that people come across. These emails look exactly like the real webpages and can be extremely hard to recognize. One simple click on these emails and cyber terrorist will have instant access to your personal information. 


Emails are like postcards, they can easily be intercepted in transit by thousands of people, government and even terrorist. If you have very important information either business or personal taking the extra precaution to encrypt your messages can keep your business from going bankrupt and your identity from being stolen. 




I really enjoyed this final project it was something I have never done and it really opened my eyes to how susceptible my personal information really is on my computer. From now on there is nothing but secure emails for me. 

Sunday, November 21, 2010

Week 13: Clear

Week 13 was all about computer security, ethics and privacy. I learned about how every year millions of people become victims of cyber crimes such as phishing, spamming, theft, fraud, cyber stalking and in severe cases identity theft. Throughout this chapter I learned about the simple ways to protect myself and my family from cyber crimes. Some of the ways to enhance my computers security include, turning on my spam blocker, enabling my firewall, updating my anti-virus software, protecting my personal information and monitoring what other people do on my computer. When it comes to your safety there is no such thing as going to far. 


Another extremely useful thing I learned during this chapter was how to prevent your password from being discovered. I was amazed to find out that for a password that contains ten characters there are 3,700,000,000,000,000 possible combinations. This would take a computer 59 years to crack and a person over 580 million years! I usually have passwords that run between 7-8 characters including numbers now that I know how just a few characters can make such a drastic improvement to the security of my personal information. 


All and all, chapter 13 was an eye opening experience to me. I always knew about hackers and scripts, but I never knew how susceptible I am to getting my identity stolen by just logging onto an un-secure link and downloading a virus. 

Sunday, November 14, 2010

Week 12: Clear

Week 12 touched base with the basics about communication & networks. This weeks topic was an extremely informational and I thought it was a great benefit to learn. Until now I had no idea that there were so many types of networks. The four types of networks are LAN (Local Area Network), WAN (Wide Area Network), MAN (Metropolitan Area Network) and PAN (Personal Area Network). Each one of these networks are utilized in their own unique way according to what a business or person needs. Networking can facilitate communitcations, increase productivity, share software, be more effecient, you can share data and information and even transfer funds. The main fallback to networking is the security threat and lack of privacy. Also, on some occassions there may not be enough site licenses on software for every member to use.

Bandwidth was a term I was very familiar with when watching the lectures. In bandwidths relation to latency, you want a high bandwidth and a low latency. You want to have a great connection to be able to transfer a lot of data in a short amount of time without any lag.

One of the hardest things for me to catch on to was the TCI/IP (Transmission Control Protocol/Internet Protocol). This is broken down into two layers, TCI which is responsible for verifying the correct delivery of data from client to server and IP  which is responsible for moving packet of data from node to node.

The following link allowed me to better understand the complete development of the TCI/IP system.

I learned the reliable and unreliable modes and the specific uses of the IP.

Sunday, November 7, 2010

Access Project

This week our Microsoft Access Project was due. This project was one of the most confusing projects I have ever had to work with due to the date that I have never used Microsoft Access before. I am glad I didn't wait until the very last moment to begin working on this assignment because I had to download Microsoft Access 2007.


Throughout the Access project I learned about creating tables, queries, forms and reports. I learned how to import external data files in multiple formats to one database and organize it. I also learned how to export data from a database in different file formats like .txt which is extremely easy to convert and one of the best formats to send documents in. I also learned that how to relate sets of tabular data and how easy it is to organize massive amounts of data by using Access. The biggest surprise to me was how professional the default tables and reports look without any customization.


The only fall backs to using Microsoft Access is learning how to use the program. I have never used the program before and it was quite hard to catch onto at point. However, once you understand how the program works the possibilities for organizing data are endless. Some of the ways to enhance the functionality of the database would be to increase security, insert user passwords to protect customers and to make better tutorial videos. I thoroughly enjoyed watching the Access lectures, but they were a little dated and it made it harder to learn some of the required techniques to complete the project and scavenger hunt. Increased security is a must for any programs in the world today, especially since these files organize and hold valuable information such as addresses, names, date of birth, etc. The program as of right now is extremely vulnerable to identity theft which spreads through the web like wildfire. 

In the end, I am extremely happy I took this course just because I got to learn the aspects of a program I have never used. Even though the project is over I am going to look into Microsoft Access Tutorials and learn all the ways of using the program. I have always enjoyed using excel for organizing data but I cannot wait to explore Access even further. Below I have included a sample of what a Microsoft Access Database looks like. 



Friday, November 5, 2010

Week 11: Clear

This week are assigned topic was on Information Systems Development. Prior to this topic I was not familiar with the extremely elaborate developing process. I also had no clue exactly what a system analyst's job really was. 

A system analyst also called a systems "architect" has a very important part in completing a successful project. The main job of the analyst is to be the guardian of the company. To watch over the entire systems process from beginning to end, to troubleshoot technology problems and to make sure people stay on schedule. Without the analyst overseeing the project, there are many things that could go wrong and the project would be more likely to fail. 

Another topic I learned about while watching the lectures was the SDLC, system development life cycle. The SDLC is the collection of phases that system development activities are often grouped in. These groupings are labeled as followed; planning, analysis, design, implementation and operation.

  • Planning- In this phase, you should review project requests and prioritize them, allocate resources and form a team for the project.
  • Analysis- In this phase, you should conduct primary investigation, study the current system, determine user requirement and recommend a solution to them.
  • Design- In this phase, you should acquire hardware and software and develop the details of the system.
  • Implementation- In this phase, you should develop the programs, install and test the new system, and finally train the users. Don't forget to convert to the new system.
  • Operation, Support & Security- In this phase, you should perform maintenance, assess the system performance, and asses the system security.
Without a great systems analyst and the use of the SDLC system a project would become chaotic and be a complete failure. The video below talks about the job of a systems analyst, how long they work and what their job requires on a day to day basis. It helped me realize how easy it is for one thing to go wrong in a project and how much pressure is on a analyst.

http://www.youtube.com/watch?v=3A0d4NVtWx4&feature=related

Wednesday, October 27, 2010

Week 10: Clear

This weeks assignment was on Databases. When I first saw this topic I thought it was going to be a breeze. I am pretty computer savvy and I am a quick learner. Unfortunately, I have never in my life used Microsoft Access before. I watched all the lectures and did all the required reading for this section and was amazed to see how this new program worked. I am very familiar with excel and while learning about access I couldn't help but relate things back and forth.

The first thing that stood out to me in this section was the explanation of the differences in Data, Database and Information. I know a lot of people including myself have thrown those three words around interchangeably not even realizing they are completely different things. Data is a collection of unprocessed items. A database is where data is organized in a manner that allows access, retrieval and use of the data, and information is processed data. All three terms are connected but are not the same thing. 

I also learned a lot about the query language of databases. It's amazing that each query language has its own grammar and vocabulary. Also, I love how simple it is to learn the different processes of access like queries through the specialized wizards. Another interesting thing about this weeks topic was learning how Microsoft Access can be broken down into different types of information such as reports, queries, tables and forms. The way that access makes external data importation and exportation simple is another plus the program has to offer. 

Programs used to manage databases are called Database Management Systems (DBMS). Data is normally organized in a hierarchy with the smallest layer (fields) leading up to the biggest layer (files). In the business world I think that databases are extremely important. Time is money, and if your entire staff is spending hours on end looking through file processing systems at tons of redundant information then your company is losing money. Databases and a database knowledgable staff are essential for a smooth running of a company. Most companies have some form of database for organizing important documentation. Normalization, integrity, maintenance and security are absolutely crucial for the upkeep of a professional business.

The following is a tutorial I found on how to create a simple database. This tutorial helped me to better understand Microsoft Access because it was targeted at beginners and I have no experience at all. 

http://www.youtube.com/watch?v=bPtXq-3qf6U

I am looking forward to doing this project I think it is going to be something new to try and extremely fun!

Saturday, October 23, 2010

Web 2.0 Project

The following is a link to my project.


Overall the Web 2.0 project proved to be extremely stressful to me. The storyboard, idea, and actually making my presentation were extremely easy to do with powerpoint. However, when it came time to actually upload my work to the web, I went to at least 20 different websites and my audio wouldn't play on any of them. Eventually, I had to record my desktop with the project playing in the background on screenjelly.com.

Presentation Evaluation Rubric
Name of Presenter: Rebecca Barnes
Your Name: Rebecca Barnes


Missing or lacking
Meets the minimum but could be improved

Excellent
Is there a logical flow and sequence of content? How could it be improved?


Yes. The flow of information is logical.
Does the presenter anticipate questions and answer them in the right place? At what points did you have questions that were not answered?


Yes. I answered the questions before they were asked.
Did the presenter grab your attention in the first 30-60 seconds?

I feel like I could have done a better job of a WOW factor at the beginning of my presentation.

Did the presenter ask questions and spark your curiosity?


I didn’t ask many questions, but instead fully explained things.
Did the presenter set the context with a concise explanation? Is it clear what the presenter is trying to share?


Yes. My presentation was extremely simple, concise and clear.
Did the presenter validate any claims?


Yes. Most of my presentation was validating claims and statistics for my audience.
Did the presenter avoid inconsistencies and errors, typos and unbelievable claims?


Yes.
How well did the presenter avoid clutter?


Very well. Many of the slides were simple. They had lots of space and some even had three or four words.
What did the presenter do to ensure readability?

Used a great font and size type, maybe should have used different colors.

Did the presenter say it, and then show it or did he/she read the slides?


I read the presentation as it was given and added facts that were not shown.

                 

I did my presentation on the Relay for Life at UF. I wanted to tell people about how scary cancer can be and let them know the real statistics of how it affects people everyday. I also mentioned when the university was planning it's relay and encouraged my audience to participate and donate to the cause.

After watching multiple videos from classmates and seeing all the different ways to create projects it has been a truly mind-blowing experience. The project was a lot of fun for me, I just wish that the web sharing would have been a little easier to do.

This project takes a lot of time and planning out and I am glad I didn't wait till the last minute to complete it. I had no idea that uploading certain presentations to the web were so hard to do. If you do not have the perfect combination of files and the correct website the whole presentation can fall apart. 

I have provided my rubric in my blog. 


Friday, October 22, 2010

Week 9: Clear

Week nine was all about the Internet and the World Wide Web, which before now I thought was the same thing. However, to clarify the internet has been around a lot longer than the world wide web. Having used computers all my life I thought that this topic would be a breeze after the Web 2.0 project, however, there were many new terms and statistics that I found to be extremely interesting.


For instance, I had no idea that the What is my IP Address? website even existed, and how simple it makes locating your IP address. Also, while reading the Don't Make Me Think! chapter from Steve Krug, I was amazed at how often I do the things they explained while browsing the web. I'm so use to scanning pages, closing any pop-up before it is completely loaded and being upset when I find webpages with tons of writing and no empty space I don't even realize I am doing it.


One thing I was very familiar with this week was the difference between dial-up access internet and broadband. I am originally from a small town out in the woods where connecting to the internet took at least 30 minutes. Now that I live in Gainesville and have high-speed broadband internet it makes researching for projects and communicating with friends back home a pleasant experience. 






Another topic discussed this week was Wi-Fi "piggybacking" or "war-driving" that are actually recognized as Wi-Fi Crimes. This occurs when people drive around with their wireless devices and try to connect to other people's unsecured wireless signal. I know that this happens all the time, but I was astonished by the number of people who have admitted to doing it and how it is considered a felony.

The following link clarifies the Wi-Fi crimes a little more.

http://www.securityfocus.com/columnists/237

Monday, October 4, 2010

Week 7: Clear

Week seven explained the process of creating presentations. The terms this week were simple to follow and I learned about some great new devices that can be used to build presentations. I am fairly new to the Mac world but after watching the video tutorial on Keynote I will never use regular powerpoint again. The simple template selection and the build option to create slide effects were simply astonishing. The tutorial created a simple learning environment that even beginners to the program could relate to. 
I also found the lecture on design and layout and the video from Duarte.com to be extremely useful in starting my project. 


As a photojournalism major one of the parts of the lecture that stood out most to me was talking about graphics and photographs. The list of image mistakes to avoid were a little shocking to me because I have seen a lot of presentations with clip art graphics and random placement. During High School using clip art was one of my favorite things to do, but that doesn't cut it in the business environment. 


I feel that learning the different ways to create presentations and to present them are extremely important for the future of any student. Being able to capture an audiences attention and really convey the meaning of a product or idea is what most modern day businesses are looking for. The keys to a great presentation is to be creative, have fun with it and put yourself in the audiences shoes.


A recap of the list of image mistakes are below.


  • Images that are too small
  • Placement that is random
  • Image use that looks accidental
  • Pixelated images
  • Watermarked images
  • Distorted
  • Clip art
  • Cliche images
  • Too much going on in the image

While searching the web for more information I found the following links that give tips and help with building great presentations. One of the most important things I learned from these websites are to relate and connect to the audience in the presentation. The last thing people want to watch is a boring slideshow that is read word for word by a robot. 

In the end its all about finding that happy medium when creating a presentation, something not to cluttered but not to boring. 


http://www.rediff.com/getahead/2005/jan/31present.htm

http://www.suite101.com/content/how-to-make-a-great-presentation-a280199


Saturday, September 25, 2010

Week 5: Clear

Week five covered the topic of mastering Excel. The clearest topic to me in week five was the formulas. They were extremely easy to catch onto as long as you didn't forget to put the equal sign ( = ) at the beginning of your formula. Formulas can be built by clicking on a cell and typing in the correct combination of letters, numbers, and symbols to produce a answer. This may seem a little intimidating at first, but the formulas are all basic math followed by the order of operations that you learn in elementary school (PEMDAS). The lectures were extremely helpful in demonstrating how to enter and copy your formulas into other cells. However, it was also helpful to me to explore the formula help bar to identify the correct formulas I needed to use and what they are used for. 


Mastering the use of formulas in excel can be very beneficial later on in life when you are looking for a job or just managing your money and time. Many work places have strict rules about using Excel for certain projects and having well rounded knowledge of the program ahead of time can give you a leg up on the competition in the job market. Also, I have talked to many college professors and they said that submitting your resume in Excel really shows how important the job is to you and sets you apart from the other thousands of applications that are submitted in Word format. 


For the more experienced Excel user there are formulas that can help you form advanced mathematical calculations quickly and accurately. Also, when working with Excel formulas you need to keep in mind the difference between absolute cell addressing and relative cell addressing. An absolute cell address consist of the column letter and row number surrounded by dollar signs ( $ ) and is used when you want a cell address to stay in a specific cell. While a relative cell address point to a different cell in relation to how far the cells are apart. Relative cells addresses change and absolute cell addresses do not. 


The following link helped me to remember the format when differentiating relative and absolute cells. It also helped me recognize formula formats for basic math. 


http://www.baycongroup.com/excel2007/02_excel.htm

Wednesday, September 15, 2010

Week 6: Clear



Week six came across extremely clear to me. Multimedia is something that I am very familiar with being a Journalism major. I have taken many classes on photography and technology which helped make this topic very easy to understand. Multimedia is broken down into three categories; images, audio and video. Out of these three categories the clearest topic was images.

Images in multimedia are broken down into two separate graphic fields, raster and vector. Raster graphics are an array of colored dots most commonly known as "pixels" that create a bitmap. The only problem with this type of graphic is when you scale an image to make it larger it sometimes becomes jagged or pixelized.  While on the other hand, vector graphics are represented by primitives, which are geometrical and expressed mathematically. The benefits to using a vector graphic is that you can zoom in and out to infinity without losing resolution (clarity/sharpness) and there is no pixilation. 

Images can be saved in multiple file formats, BMP, GIF, JPG, and PNG. The BMP format is extremely useful when creating original copies that can be edited later because they are uncompressed. When you compress a file it tends to lose its quality after multiple copies. Compression can be done in two formats Lossless, which eliminates redundancy, saves space, and is great for archiving, and Lossy which discards data but makes the file extremely small and great for transferring.

Multimedia is extremely important in the business world because it can make or break a business deal. The more technologically advanced corporation usually gets the best offers, sells the most products, and hire the best employees. By knowing how to use your computers multimedia you can create your own promotional material, you can record your own music recordings and videos to send to potential employers. Also, once hired in a business you can use multimedia power-points at work to make your presentations more professional. Multimedia and business evolve together hand in hand, and it is almost essential in todays society to be able to manipulate and produce digital media. 

Creating multimedia images is simple. It can be accomplished by using the following methods:
  • Digital Camera
  • Webcam
  • Scanner (Careful of copyrights when scanning pictures)
  • ScreenCaps (PrtScrn)
The following link helped me to understand all the various types of multimedia and cleared up any questions I may have had on the subject. It showed me a bitmap color chart, and clarified the different types of multimedia programs there are for graphics.


http://www.grassrootsdesign.com/intro/graphic.php

Saturday, September 11, 2010

Week 4: Clear


Week four covered Application Software, and helped me to realize all the major components I needed to look for before buying software for my personal use, and future business use. The clearest part of week four to me was the analysis of the different license agreements, the penalties, and the types of licenses that can be purchased. Learning about EULA (End User License Agreement) was one of the most interesting things to me. I had no idea that there were so many license agreements that I agree to everyday when I am downloading applications, music, and new software. I also was surprised at some of the ways companies will enforce the license if you break the EULA.


To begin with, commercial and open source licensing were completely new to me and were extremely easy to catch onto. Commercial licensing can be broken down into several groups depending on what your company needs and how big your company is. These licenses can be sold in bundles to be used on multiple computers as a per-seat license., or A site license can be purchased to legally allow all the computers in a LARGE business to run certain application programs. There are also Trial, Shareware, Freeware, Developer, and Per-CPU commercial licenses that can be purchased all according to the specific needs or a corporation. 

Open Source Licenses on the other hand give buyers access to the programs source code, which allows its users to be able to modify and even redistribute the software. These types of software are typically developed by teams or communities, not distributed by a sole creator. Also, they are usually free, although some may have a donation fee. However, concerns when choosing either a commercial licensed software or open source licensed software are mostly dealing with support activity, patches and fixes, response time, and its migration path.

found that the consequences and repercussions for breaking the license agreement were also made very clear. Your system, computers, and network could be locked. You could be sued to your illegal actions, and your business or good name could be given a bad reputation all by breaking one license agreement. I learned so much from this section of the class, and it has been made extremely clear that I DO NOT want to break a license agreement!!

The following links helped me greatly understand software licensing, and the consequences of not following licensing rules.

http://www.aaxnet.com/topics/slicense.html
http://www.the-eggman.com/writings/piracy.html