Premium Essay

Chapter 1 Assignment

In: Computers and Technology

Submitted By jat1418
Words 1424
Pages 6
Joseph Thomas
CGS1060: Intro to Information Tech
Presented to: Professor Masline
Date Due: March 14, 2016

Joseph Thomas
CGS1060: Intro to Information Tech
Presented to: Professor Masline
Date Due: March 14, 2016
Digital Literacy: Introducing a World of Technology
Digital Literacy: Introducing a World of Technology

Part 1
How to Your Turn: Connect to a Wireless Network Figure 1 [ 1 ]http://media.idownloadblog.com/wp-content/uploads/2015/09/iPhone-6-Wi-Fi-settings.png
Figure 1 1http://media.idownloadblog.com/wp-content/uploads/2015/09/iPhone-6-Wi-Fi-settings.png Connecting a device to a wireless network is surely stress-free. I will be using my iPhone 6 to connect to a wireless network. Primarily, I made sure that my phone was on. Subsequently, I went to Settings and located the Wi-Fi tab. Continuously, I ensured that the Wi-Fi switch was switched to on, as shown in Figure 1. Following, I obtained the network name. The network name did not show up, meaning that the network was a hidden network. Nevertheless, I had to tap on Other… to manually type in the network name, CFT_Wireless. Since the network I provided is protected, I will then click on the Security tab to select the type of security the network uses. In this case, it uses the WEP, also known as Wired Enterprise Privacy, security type. To finish, you will enter the password that was setup by either the ISP or the administrator – cft#1. To substantiate that I am connected to the Wi-Fi, I can either launch a web browser or open an application that requires network communication. Before you rush to connect your device to a wireless network, you must first have the suitable authorizations. According to Graham Cluley, "Stealing Wi-Fi Internet access may feel like a victimless crime, but it deprives ISPs of revenue.” Also, using someone’s Wi-Fi without permission can slow their network…...

Similar Documents

Free Essay

Chapter 1

...Chapter 1 assignment Nouf Mohammad Alshammiri ID:209117509 (1) Analysis: the second phase of the SDLC in which system requirements are studied and structured. (2) Application Software: Computer software designed to support organizational functions or processes. (3) Computer aided software engineering (CASE) tools: systems development methodologies created to radically decrease the time needed to design and implement information systems. This methodology relies on extensive user involvement, prototyping, integrated CASE tools and code. (4) Design: the third phase of the SDLC in which the descriptions of the recommended solution in converted into logical and physical system specifications. (5) Implementation: the fourth phase of the SDLC in which the information system is coded, tested, installed, and supported in the org. (6) Information system analyses and design: the complex organizational process whereby computer-based information systems are developed and maintained. (7) Inheritance: the property that occurs when entity types or object classes are arranged in a hierarchy and each entity type or object class assumes the attributes and methods of its ancestors; that is, those higher up in the hierarchy. The property allows new but related classes to be deirved from existing classes. (8) Logical design: the part of the design phase of the SDLC in which all function features of the system chosen for development are described independently of any computer......

Words: 489 - Pages: 2

Premium Essay

Chapter 1

...Chapter 1 THE PROBLEM AND ITS BACKGROUND Introduction Technology plays an important role in society nowadays; technology serves as a communication tool. The alternative way to the society in terms of communicating is the internet. Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. W3C or World Wide Web Consortium is an international community that develops open standards to ensure the long-term growth of the Web. W3C is under the internet, W3C needs internet to access the sites, application or the data they use. Using Internet is the easiest way to communicate with other people. Social Networking Site (SNS) begins when two or more users share data, like personal information, with each other. SNS such as MySpace, Facebook, Friendster, Hi-5 and other sites are designed to allow people to share their information, pictures and videos to others. Facebook is one of the top SNS in the whole world. Users use Facebook to communicate with their long distance friends, families and loved ones. Using it can also help them find new friends and new love. Facebook allows users to see other profile or information available, post comment, wall post, photo and video comments. Pamantasan ng Cabuyao (PnC) was......

Words: 2260 - Pages: 10

Free Essay

Unit 1 Assignment 1 Chapter Review and Visual Argument

...Steps for Reading Visual Argument 1. Some history about computers 2. A beat up car and a nice new car, a tired mechanic and a happy mechanic, and computer company logos 3. Who’s computer is better 4. That Apple makes a better computer than Microsoft 5. The Apple side is new, faster looking and the mechanic looks happy 6. It wants people to buy Apple computer Review Questions 1. What did you think of when you encountered the word argument as you began to read this chapter? What do you think now? I thought an argument was when more than one person had opposing views on the same issue. After reading this chapter I feel that the word argument is much broader than just a disagreement between two people. 2. Provide three examples of your own to illustrate the statement “Argument is everywhere.” One of your examples should be a visual argument. * Who makes the better video game console Microsoft, Sony, or a PC gaming rig. * T.V. commercials * nicoleashleyrd. (Artist). (2013, Feb 4). Visual Arguments [Web Drawing]. Retrieved from http://thefamilyofblood.wordpress.com/2013/02/04/visual-arguments/ 3. Describe traditional and consensual argument. Give two examples of each. A traditional argument is when you try to change the audience point of view and a consensual argument seems to be one where the two parties must come to an agreement. Traditional * A movie trailer * Consensual * A couple trying to decide......

Words: 398 - Pages: 2

Free Essay

Chapter 3 Assignment 1

...1.) Ethics is the basic question of what is right and wrong that is generally accepted by everyone. Laws are basically ethics that have been adopted by a governing body of some sort (government, company, etc). 2.) Civil law is a set of laws that are created by a governing body for its own regulation. They are used in order to keep its citizens safe. 3.) Constitutional law, criminal law, and administrative law. 4.) The National Information Infrastructure Act of 1996 was the law that amended the Computer Fraud and Abuse Act of 1986. It changed multiple sections of the Computer Fraud and Abuse Act of 1986, mostly by increasing the penalties and fines of some of the cyber crimes. 6.) Privacy is being free from other people viewing or altering your personal data. 9.) The primary purpose of the USA PATRIOT Act was to change some of the laws in order to give law enforcement officials more tools to combat terrorism. Many of the laws changed have to do with electronics. 15.) Policy is a list of expectations that can outline actions that are considered acceptable and actions that are considered unacceptable to an employer. A law is much more harsh when broken than a policy is. 16.) The three general categories of unethical and illegal behavior are: Illicit use, Misuse of Corporate Resources, and Software License Infringement. 18.) The Association of Computing Machinery is the organization that has been established for the longest amount of time. It was......

Words: 272 - Pages: 2

Premium Essay

Composition 2 Unit 2 Assignment 1: Chapter Review and Trace

...Unit 2 Assignment 1: Chapter Review and TRACE 1. The five elements in the rhetorical situation are text, reader, author, constraints, and exigence. 2. A reader can use the rhetorical situation to analyze an argument essay by analyzing what the author is arguing about and who his target readers are. A viewer can use the rhetorical situation to analyze an image by first analyzing what the image’s meaning is, and who the targeted viewer is. A writer can use the rhetorical situation during the planning phase of writing a paper by deciding who is target readers will be and the position it may take on the topic. 3. The audience is important in argument because without the audience you have no argument. The different positions that the audience might initially hold are a friendly, an undecided, a neutral, a resistant, an unfamiliar, or a linked audience. There are multiple outcomes that are associated with arguments directed to each of these audiences, these outcomes include, a bias, they may oppose your argument, or they may agree with your argument. 4. Discourse communities are defined as groups that are involved in and communicating about a particular topic, or issue. The reason a discourse community is helpful to establish common ground for its members is because they share a set of basic values and assumptions. 5. A universal audience is an imagined audience that serves as an ethical and argumentative test for the rhetor. A universal audience is a useful......

Words: 254 - Pages: 2

Premium Essay

Chapter 1 Analysis Assignment 1.1: Discuss Windows Platform and Installation Options

...Assignment requirements 1. ------------------------------------------------- Complete assigned reading prior to working on this assignment 2. ------------------------------------------------- Review the online lesson for week 1 3. ------------------------------------------------- Review assignment instructions 4. ------------------------------------------------- Your submission must be 2 -3 pages in length in essay format Windows Sever 2008 Server Core Server Core is a very advanced server for advanced systems administrators. Core does not have a GUI (Graphical User Interface). All execution of commands will have to be handled through the CLI (Command Line Interface). The advantages of using Core as a qualified systems Admin, is that “Powershell” helps to illustrate and execute easier commands, and manage and configure. Since Core does not offer a GUI, making the system optimal in its performance, less reliant on unused resources, stable, and more secure. Basically, reducing attack surfaces because there are less targeted services to attack. In addition, Microsoft has developed one of the most secure Operating Systems. Roles such as DNS, DHCP, RDS and more can be managed through the CLI, making it less intrusive. Also, there are fewer “hot Fixes” of Roles and Services that are not in use, and less memory and HDD requirements. The Disadvantages of Server Core, besides No GUI, is that you have limited amount of server roles and features. And, it does not......

Words: 532 - Pages: 3

Free Essay

Chapter 1

...THE RULE TO MAKE CHAPTER 1 ( ONE ) AT SOFTWARE ENGINEERING’S PROJECT CHAPTER I INTRODUCTION 1.1 The Reason for Choosing the Title The fast growth of computer nowadays are very helping human to make their work easier and faster in all aspect of life. To sending data between two separated places by geographic can be done in the moment and processing a huge data is only being done in quite short time. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXX 1 2 1.2 Problem Formulation 1. 2. 3. 4. 5. According to the background in choosing title above, then the problem in this final assignment are: How is scaling process implemented on the image so we can get zooming on output image ? If zooming is done on the beginning image, it will affect many places (pixel) have spacey so image will not be looked fine. XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXX 3 1.3 The Objective of Research The Main purpose from this final assignment is to programming a software to recover quality of zooming image......

Words: 776 - Pages: 4

Free Essay

Week 1 Chapter 1 Assignment

...Name: Kelsey Dionne Chapter 1 Instructions Practice Problem 12, 15, 21, & 22 Due Week 1 Day 6 (Sunday) Follow the instructions below to submit your answers for Chapter 1 Practice Problem 12, 15, 21, & 22. 1. Save Chapter 1 Instructions to your computer. 2. Type your answers into the shaded boxes below. The boxes will expand as you type your answers. 3. Each shaded box is worth 1 point unless otherwise noted; thus, 28 points total for Chapter 1. 4. Resave this form to your computer with your answers filled-in. 5. Upload the saved form to the Assignment Files tab. Read each question in your text book and then type your answers for Chapter 1 Practice Problem 12, 15, 21, & 22 in the corresponding spaces below. 12a. equal-interval – a variable in which the numbers stand for approximately equal amounts of what is being measured. No matter if stress is being measured or if anger is being measured, numbers 1 and 2 are equal to 4 and 5. 12b. rank-order – A numeric variable in which the values are ranks, for example: class or place finished in a race. 1st, 2nd, or 3rd. 12c. nominal – A variable with values that are categories, also called the categorical varible. An example of a nominal variable would be variables like gender, or race. 12d. ratio scale – An equal-interval variable is measured on a ratio scale if it has an absolute zero point. Some scales start at the lowest number, other scales start at zero. 12e. ...

Words: 611 - Pages: 3

Free Essay

Homework Assignment: Chapters 1 Questions 4 and 7

...Week 1 Homework Assignment: Chapters 1 Questions 4 and 7 Cruz A. Morin II Devry University Chapter 1 4. Why does word – of – mouth “advertising” work so effectively? Word – of – mouth advertising works of effectively because it is the simplest way to advertise. When people receive either excellent service or a good deal on a product they will talk about to everyone they know. Companies know this really well and want to ensure that is what is delivered to each customer weather it is a new customer or someone that has been a customer for a long time. Every company wants positive word – of – mouth advertising because it is free to them. The other way that word – of – mouth advertising is being updated now is with the use of social media by everyone. Besides regular social media sites you also have review sites that people post both good and bad reviews on (ex. YELP). 7. What do we mean by an “engaged” customer, and how does this relate to customer loyalty? An “engaged” customer is someone who feels that they have an emotional tie to the company that they are doing business with. Most companies will use loyalty programs to in a way entice customers to keep returning. When extremely satisfied customers have been asked if they felt an emotional tie and many said no. If a company wants to truly rise the level of customer loyalty they have to increase the emotional tie in that each customer fills and at the end of the day if there is no tie in with the emotions then...

Words: 298 - Pages: 2

Free Essay

Chapter 1

...Instructor’s Manual—Chapter 1 CHAPTER 1 Introduction 1.1 The Objective of This Book 1.2 Some Historical Perspective 1.3 A Note on Ethical Behaviour 1.4 The Complexity of Information in Financial Accounting and Reporting 1.5 The Role of Accounting Research 1.6 The Importance of Information Asymmetry 1.7 The Fundamental Problem of Financial Accounting Theory 1.8 Regulation as a Reaction to the Fundamental Problem 1.9 The Organization of This Book 1.9.1 Ideal Conditions 1.9.2 Adverse Selection 1.9.3 Moral Hazard 1.9.4 Standard Setting 1.9.5 The Process of Standard Setting 1.10 Relevance of Financial Accounting Theory to Accounting Practice Copyright © 2009 Pearson Education Canada Instructor’s Manual—Chapter 1 LEARNING OBJECTIVES AND SUGGESTED TEACHING APPROACHES 1. The Broad Outline of the Book I use Figure 1.1 as a template to describe the broad outline of the book and course. Since the students typically have not had a chance to read Chapter 1 in the first course session, I stick fairly closely to the chapter material. The major points I discuss are: • Accounting in an ideal setting. Here, present-value-based accounting is natural. I go over the ideal conditions needed for such a basis of accounting to be feasible, but do not go into much detail because this topic is covered in greater depth in Chapter 2. • An introduction to the concept of information asymmetry and resulting......

Words: 1905 - Pages: 8

Free Essay

Bibl 350 Chapter Assignment #1

...Chapter Assignment 1 Template Name: Liberty University Email Address: Assignment 1-1: Select five translations that we talked about in this chapter. Select a passage from the Bible (it must be at least two verses long) and write out how the translations render this passage. Next, mark or highlight the differences among the five translations. Write a paragraph summarizing what you have observed by comparing the translations. (p.38) (10 Points) 1 Corinthians 10:13 Translations Used: NLT, KJV, NIV, NKJV and ESV NLT – 1 Corinthains 10:13 the temptations in your life are no different from what others experience. And God is faithful. He will not allow the temptation to be more than you can stand. When you are tempted, he will show you a way out so that you can endure. KJV – 1 Corinthains 10:13 there hath no temptation taken you but such as is common to man: but God is faithful, who will not suffer you to be tempted above that ye are able; but will with the temptation also make a way to escape, that ye may be able to bear it. NIV – 1 Corinthains 10:13 no temptation has overtaken you except what is common to mankind. And God is faithful; he will not let you be tempted beyond what you can bear. But when you are tempted, he will also provide a way out so that you can endure it. NKJV – 1 Corinthians 10:13 no temptation has overtaken you except such as is common to man; but God is faithful, who will not allow you to be tempted beyond what you are able, but......

Words: 3920 - Pages: 16

Free Essay

Assignment #1 Chapter 8 Case: Whole Food

...Assignment #1 Chapter 8 Case: Whole Food BUS 322 Bachelor of Business Administrations Strayer University   Discuss how the basic interpersonal communication model that is presented in Figure 8.1 can be applied to the interpersonal nature of an online forum. The interpersonal communication model in figure 8.1 illustrates the key elements of interpersonal communication: the communicator, the receiver, the perceptual screens, and the message. Last month I received an overseas phone call from an ole buddy of mines. He and his family are stationed in Germany. Our phone connection was very bad. I bet we got disconnected at least a dozen times. I think everybody’s had that happen to them during a phone call. It’s the reason Verizon did their “Can you hear me now” campaign. When my phone drop that call, I knew it right then and there. I was annoyed, frustrated, and angry. Have you ever thought about why you don’t react the you do when you get disconnected? Being disconnected wasted my time. It interrupts the flow of what I was trying to accomplish, and it undermines my productivity. The bottom line is that connecting is everything when it comes to communication. In an online forum the communicator, the person originating the message still delivers the correspondences, which could be simple text, instant message or an email. I am convinced more than ever that good communication and leadership are all about connecting. According to John C.......

Words: 1235 - Pages: 5

Premium Essay

Chapter 1

... Virtual Class ~ PutraLMS http://lms.upm.edu.my/ • Notes • Announcement • Assignment 1-3 1-3 Chapter 1 The Corporation and Its Stakeholders McGraw-Hill/Irwin Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved. Ch. 1: Key Learning Objectives  Understanding the relationship between business and society  Considering the purpose of the modern corporation  Knowing what is a stakeholder and who a corporation’s market and nonmarket and internal and external stakeholders are  Conducting a stakeholder analysis, and understanding the basis of stakeholder interests and power  Recognizing the diverse ways in which modern corporations organize internally to interact with various stakeholders  Analyzing the forces of change that continually reshape the business and society relationship 1-5 Introduction – The Business and Society Relationship  Business: Any organization that is engaged in making a product or providing a service for a profit  Society: Human beings and the social structures they collectively create  1-6 Figure 1.1 Business and Society: An Interactive System 1-7 Introduction – The Business and Society Relationship  We borrow “General Systems Theory (GST)” from biology to explain this relationship; first introduced in 1940s  Theory posits that organisms cannot be understood in isolation, even though they have clear boundaries; they can only be understood in relationship to......

Words: 1025 - Pages: 5

Premium Essay

Chapter 1 Graded Assignment

...1. Based on your experience as a coffee consumer, does Starbucks’ strategy as described in Concept & Connections 1.2 seem to set the company apart from rivals? Does the strategy seem to be keyed to a cost-based advantage, differentiating features, serving the unique needs of a niche, or some combination of these? What is there about Starbucks’ strategy that can lead to sustainable competitive advantage? Answer: I have to be honest I like my coffee but I don’t get why people are so fascinated with paying so much for coffee. That being said I will say that Starbuck definitely has set itself apart from its competitors. I know people whose day is just ruined if they don’t have their Starbucks coffee in the morning. I guess the reason they enjoy and like Starbucks is because Starbucks has quality products, with guidelines so detailed that they outline how much time it should take for their coffee to be prepared. I believe Starbucks uses a broad differentiation strategy because it focuses on a broader segment of the total coffee market. Starbucks strategy of continuing to grow their brand globally by increasing store locations in other countries and in the U.S coupled with offering non coffee products should allow them to sustain a substantial competitive advantage over its competition. 3. Elements of eBay’s strategy have evolved in meaningful ways since the company’s founding in 1995. After reviewing all of the links at the company’s investor relations site, which can......

Words: 478 - Pages: 2

Premium Essay

Chapter 1

...Chapter 1 THE RESEARCH PROBLEM Introduction This Action Research was undertaken to describe the impact of teacher-made advance exercises as intervention on disruptive behavior of pupils when learning division skills in elementary arithmetic operation. The subjects of this study were Grade Two – A pupils who were constantly disrupting the class during Mathematics period taken from the list made by the teacher through visual observation. For the last two grading periods handling a cream class, a lot of repeated disruptive behaviors such as incessant talking or getting out of their seats to name a few, which were very taxing to the teacher, were observed. These disruptive behaviors were mostly due to boredom especially to those pupils who got to finish their seatwork fast. This called for a classroom management skill. Hollowell (2013) mentioned in her article that classroom management skills are essential for all teachers. Supervising a group of children with different personalities and backgrounds is a challenging task. You are responsible for their academic growth while ensuring that the learning environment stays welcoming and secure. This includes dealing with disruptive pupils. According to Tyson (2013), disruptive students are always present in every classroom. Regardless of scenario or perhaps how great you happen to be as being a teacher, in one way or another they will and can be found. All of which will develop problems provided an open possibility.......

Words: 4006 - Pages: 17