WEBMISTRESS DISCLAIMER TAGBOARD

Hello, welcome.
You are now at Introduction to Information Technology blog by yours truly.
Click on the navigations on top thankyou :)
Pui Yee 1007K10403
Photobucket
Catch the time

Credits
A Round of Applause to the following
Designer: Cynna
Image: Cyworld KR
Host: Blogger
Scripts : Dynamic Drive

Secondary Storage
Written @ 9:43 AM
File compression


A part of performance enhancements, file compression helps in increasing storage capacity by reducing the amount of space required to store data and programs. Hard-disk and floppy disk usually compresses files in order to speed up transmission of computer system files, form one device (computer) to another. File compression is done by reducing storage and find repeated pattern of the same data and thus it will shrink files. Technically, file compression reduces files size.








Head crash

Head crash is a situation where hard disk's surface makes contact with particles, commonly hair or dust. In a context, it meant, the hard disk being hovered a few inches away. Head crash is considered a disaster for a hard disk because once the surface is scratched, the possibilty of data and information missing is higher. This is most common for floppy disks.








Internet Hard Drive


Special service sites on the Web which provides users with storage is called an Internet hard drive. It is used as a specialized secondary storage device because of some limitations like the availability and security procedures of certain sites. Thus it is not used for storing highly personalized or sensitive information. It focuses on providing faster access and greater security for a certain amount of fee.


Optical Disc Drive


Optical disc drive reads optical disks where 1 and 0s are represented by flat areas called land and pits. Using a laser that projects light beams, reflected lights detects the binary codes by the amount of light relected. Optical disks use single track that spirals towards the center of the disc. It us usually installed in the drive bay in computers. Some ways to care for these disks drives are; store disks in jewel box when not in use, do not eat, smoke or drink near a disk, do not expose the disk to excessive heat or sunlight and hold disks at its edges.







Solid State Storage

It is typically a storage device that uses flash memory to store data, information and instructions. Several advantages over this storage are the multiple transfer rates. access times, generates less heat and power and lasts longer, preferably over 50 years of lifespan. However, they have higher failure rate and costs much more expensive that hard disks drive.




Input and Output
Written @ 7:03 PM
Ergonomic Keyboard

Similar to the traditional keyboards, ergonomic keyboards however is NOT rectangular and palm rest is provided. It is designed to ensure wrist strain could be avoided and make typing at ease. besides being economical it has many shortcuts keys where they are customisable and can be set for a program, command, file, folder or web page. The top five customizable keys include pre-figured keys for the Web browser, search, mail, calculator, as well as volume, mute and play/pause key.




Ink-jet Printer.

A computer device that produces hard copy by spraying ink onto paper, ink-jet printer can produce letter-quality images up to 300 dpi (dots per inch).  An ink jet can priduce 100 to several hundred pages depending on the ink catridge. Once it is emptied, it must be refilled in order to continue processing. They are reliable, quiet and relatively inexpensive.

Laser printer


Dubbed as the photocopying machine, the laser printer uses light beam to produce images. It comes in high quality in forms of letters and graphics. Compared to ink-jet printers, it is more expensive, however faster in producing excellent letters and images on a plain paper and usually used in applications that requires high-quality output. Two common types of laser printers are personal laser printers and shared laser printers, where one is less expensive and usually used by a single user, while the other are more expensive and shared by a group of users respectively.




Magnetic Ink Character Recognition (MICR)


Normally used by bank corporates, MICR are used to identify unusual numbers on the bottom of checks and deposit slips. A reader, designed specially for this purpose are used to read these numbers and provides input in order for bank officials to record or maintain customers' records and account balances efficiently.






Optical-character recognition (OCR)


Special pre-printed characters are used and is is read by using a light source which later changes into machine-readable code. A wand reader is used to record and retrieve these codes and it is commonly used. Codes like price tags attached to products are one of the example of an OCR, where usually retail departments read the price tgs codes by reflecting red light beams on the printed characters, or in other term, codes. Through this, information like the item's name and price is detected and appears on the screen.




Optical Mark Recognition (OMR)


Often used during school examinations, OMR senses the presence or absence of a mark, particularly pencil marks. It extracts all data on the mark field and transform it into printed forms. Multiple choice questions sheets usually use OMR in order to detect marks, faster and more efficient and is extremely common to use in schools. The amazing part of this device is the error accuracy stands at only 1%.



The System Unit.
Written @ 9:30 PM
Flash Memory


It offers a combination of the features of RAM and ROM. It can be updated to stire new information and does not lose information when the system shuts down. It is used to store start up instructions type of keyboard, mouse and secondary storage devices. If there are changes in the computer system, there will also be refelcted in the flash memory.


Graphic cards


It connects the system board to the computer's monitor. Internal electronic signals will be converted to vide signals by the cards and be displayed on the monitor. It is installed in the motherboards. It is capable of displaying and manipulating pictures on display. The quality is determined by the computer's resolution and how many times they could display and represent graphics and colors.





Sound cards

It accepts audio input from a microphone and processed by the computer. The cards convert internal electronic signals to audio signals so it can be heard through the speakers. Sound cards are capable of manipulating sounds. It can project sounds through speakers, from microphone and disks.







Network Interface Card (NIC)


It is known as network adapter cards, where it is used to connect a computer to one or more computers. It forms a communication network where information, data, programs and hardware can be shared. this card is usually connected to the system unit through cables and then connected to the network.





Plug and Play

It is a set of specific hardware an software standard developed by software providers like Intel and Microsoft. Reflected by its name, Plug&Play is now generally associated with the ability to to plug a device to the computer and have it play or work immediately. Notebook and handheld computers use small credit card-sized cards since they are smaller in size compared to desktop.

Bus line


Simply known as bus, it connects the parts of the system unit to others and links it to other components on the system board. It is a pathway for bit where it travels down a bus knwon as bus width. Bus line moves information and data efficiently depending on the  bus width. Bus design or bus architecture plays and important in determining the bus width and its power and strength.


HDMI

Known as High Definition Multimedia Interface, it is a port that provides high definition video and audio. It can carry a wide bandwidth enabling the computer to transmit multi channel and video. It suppoets standard video formats, enhanced video and high-definition adn is compatible with digital Video Interface.


Cache memory


Cache (pronounced as 'cash') memory improves processing between the memory and the system unit by acting as a temporary high speed holding area. It detects information from RAM into the cache.when needed, it aces the information from the cache.



Specialized Application Software
Written @ 7:52 PM
Audio Editing Software


Audio Editing allows us to:
a. Reorganize and add effects to the video footage.
    Programs like Apple's iMovie and Windows Movie Makerallow us t resemble and edit new home videos
    from raw digital footage.
b. Create and eit audio clips.

    Apple's Garage Band and Sony's ACID allow us to create and edit audio clips. We can add audio effects,
    and create own music playlists.



Bitmap Image

It is known as raster images, uses thosands of dots or pixels to represent images. Each dots has a specific location, color and shade. The image, when expended will become pixelated, or jagged on the edges. Optical scanners and fax machine are used to translate text and pictures onto papers. 
                      


Dekstop Publishing Program

Also known as page layout programs, it allows us to mix text and graphics to create publications. It focuses on page design and layouts and publishing programs like Microsoft Publisher and QuarkXpress provide capability in creating text and graphics from word processors, digital cameras, scanners and image galleries.


HTML Editor

Is used to create sophisticated commercial sites. HTML editor supports HTML coding and web designs.WYSIWYG (what you see is what you get) wditers, indicate that you can build a page without ineracting directly with HTML codes. The common programs are like the MIcrosoft DreamWeaver and Microsoft Expression.
 .


Image Editors

Also known as photo editors are specialized garphicsprograms for editing or modifying digital photographs. Professional image editors include Microsoft Paint, Adobe Photoshop and Corel Paint Shop Pro.

                 


Multimedia

Is an intregration of all sorts of media into one presentation. Multimedia presentation incorprate interactivity between users. It consists links and buttons, multimedia presentations and multimedia authoring programs.
a. Links and buttons.
    It is a series of related pages, providing links and through this we can ne navigated to related sites.
b. Multimedia Presentation.
    Some steps to follow in developing multimedia presentation are plan and analyze, design, create and   
    support.
c. Multimedia Authoring Programs
    Special programs used to create multimedia presentations. All the videos, audio, graphics and text
    elements are brought together into an interactive framework.


Vector Image

Is also known as vector illustrations uses geometric shapes or objects. These objects are connected by lines and curves. These objects can be rsized, recolored, textured and manipiulated because these objects can be defined by mathematical equations.




Basic Application Software.
Written @ 7:41 PM

Graphical User Interface


Its an application that allows us to control and interact with the program; the user interface. Graphical User Interface (GUI) uses icons to represent familiar objects and mouse. A window is a rectangular area containing document, program or message. Menus have menu bar at the top, dialog box that provides additional information while toolbars appear below the menu bar, containing small graphic elements called buttons. which provides shortcuts for quick access. Basically, GUI operates with the presence of Windows, Icons, Menus and Pointers.





Word Processor
It creates text documents and to create memos, letters and fax. Microsoft Word is the most widely used word processor  besides Corel WordPerfect and Apple Pages. In a word processor, we can edit, check for synonyms, spelling and grammar checks and edit the format; font, colors and etc.




Spreadsheet
This program analyzes, organize and graph numeric datas. It manipulates numeric data and create workbook files. A worksheet or spreadsheet is a rectangular grid of rows and columns. the intersection of a row and a column is called a cell. The most widely used spreadsheets include Microsoft Excel, Apple iWork's Numbers and Corel Quattro Pro.



Database Management System (DBMS)
It is a collection of related data. It sets up or structures a database besides providing a tool to enter, edit and retrieve data drom the database. It is able to find and bring together information stored in seperate locations. There are also tools to sort records based on a selected field. A filter meanwhile display only records meeting the conditions we specify.



Utility Suites
Utility suites combine several programs into one package, which provides several types of utilities, like programs that will protect the system from viruses. The common ones are like the Norton System Works and Norton Internet Security Suite.






The Internet, The Web and Electronic Commerce.
Written @ 7:21 PM

From software to applications to programs, Internet is supported by all these in order to work and able to cater to its users. All of these contribute to the Internet in becoming a tool from networking to business to simply for leisure purpose, but in a brand new way. With all these converging together with the Internet, they together bring us the new era and more functionality towards the way how the Internet operates.
These following are examples attributed to the Internet.

Javascript

A Javascript logo.


Javascript's official name is ECMAscript, which was invented by Brendan Eich and is maintained and developed by ECMA organization. Javascript is a scripting languange designed to add interactivity to HTML pages, which is usually directly embeded to these pages. Javascript enables webpage users and its reader to interact with each other. Everybody can actually use javascript without having or purchasing a license and doesn't require any plug-ins, which most other programmes do.

Applets

Like the Javascript, an applet is a program which can be inserted into HTML pages where applets can perform interactive animations, immediate calculations or other simpler tasks. Applets are small in size, compatible, highly secure and ideal for small Internet applications accessible from a web browser. An applet must be a subclass of the Java, so the codes can be transferred to the system and executed by the Java's browser. Then only tasks such as animations and interactive tools can be performed.
Applets work with the Java program.


Filters
Internet filters is basically software where it blocks or stop its users by logging in to undesirable or permeable websites.  For example, a blogger might have set up his/her blog to be only open for selected readers, thus those who are not invited are filtered and denied access to the weblog. Filters can be implemented in many ways; by software from a personal computer or provided by the internet access. Internet Service provider (ISP) blocks webpage that are objectionable to its users, like pornography or dangerous websites. While for search engine filters (Yahoo, Google e.g.) offers its users the security filter. Once activated, explicit contents for example will be automatically blocked from its user.
ISP Filter.
Google's web filter.

Plug-ins
Plug-ins is a set of software components that add specific capabilities to larger software application. if a software is successfully supported, customizing the functionality of the application is enabled. For example, plug-ins is commonly used to play music videos, scan viruses and display new files. Some of the top plug-ins engines include Adobe Flash Player, Quick Time, Java and Real Player.
Internet Security Suite

Internet Security Suite is basically security software installed to the computer to ensure security whilst online, making sure virus is detected. It is an anti-virus software which protects the computer from any sort of viruses or 'worm' which would affect the computer system. Among the top Internet security suites are Norton Internet Security, Kapersky Internet Security and F-Secure Internet Security.






FTP; File Transfer Protocol

File Transfer protocol or FTP is a standard network protocol used to copy a file from one host to another, like the Internet. It is claimed to be faster than any other protocols, like the HTTP or POP in terms of exchanging files. It also helps in transferring data efficiently and reliably. 



Wiki

Wiki is a server which allows users create Web page using any browser, where they can actually edit their pages freely. It supports hyperlinks and has a simple text syntax that helps in creating new pages and crosslink in the webpage. It is also considered as an 'encyclopaedia' where many information are included in a single webpage with many interlinks in it, which causes that particular webpage to have some unnecessary  materials considered as 'off-topic'. 

URL

Known as the Uniform Resource Locator, it is the global address of documents or other resources in The World Wide Web. The first part of the address is called the protocol identifier; indicates what protocol to use and the second part is called a resource name, where the domain name is used. the protocol identifier and the resource name are separated by a colon and two forward slashes.
    











Careers in IT
Written @ 9:22 AM




The study, design, development, implementation or management of computer-based information systems are best known as Information Technology. It basically revolves around software applications and computer hardwares. Computers and computer softwares are converted, stored, protected, transmitted and securely retrieved trough IT. As many offices or homes are not literally educated with the usage of these softwares, IT specialists are highly needed. Considering wide scope of careers in the IT department, many now opt to land a job in this growing field.

Webmaster
A webmaster is responsible in designing web pages, which include graphics, animation and functionality. Besides monitoring and implementing several other functions and advanced graphics in web pages. A webmaster also need to promote and maximize online affiliate opportunities and gain more revenue through generating marketing online. In short, a webmaster manages, oversees and maintains a company website as it is.

Computer Support Specialist


From the job title alone explains a computer support specialist (CSS) as someone who supports computer software, making sure appropriate software, installation of cables and operation system is carried out. A CSS also prepares related documents or trains users on the method of using installed software are taken care of immediately by referring to technicians and make sure everything related to computer software are looked after. 





Technical Writer

A technical writer is responsible in writing and editing technical documentation for an organization’s product. He/ she must do plenty of researches, thorough editing and are able to transform ideas into simple or understandable writings. Usual drills for a technical writer; manage and complete multiple assignments accordingly and to meet up with customers' expectations. A technical writer also reviews and makes changes in terms of content, format, and scope if needed. Interviews, journals and awareness of the surrounding is also crucial as it is important for a technical writer to familiarize product technologies and production method.

Software Engineer
A software engineer job revolves about a large scale and it’s usually broken down into smaller departments or scale to cater to different needs. Eg. Software Architect Design, Design Engineer and so forth. However, a typical software engineer’s responsibilities can be narrowed into few job scopes.  A software engineer basically analyzes Software, code, requirements, software review, identification of code metrics, system risk and software reliability. He/she need to maintain and support software’s functionality besides testing software and ensure quality. Lastly, a software engineer also implements localization or globalization of software and integrate them with existing systems.

Network Administrator
The administrator job position is one that oversees the administration, management and maintenance of computer network systems and data circuits. Besides that, they upgrade, install and troubleshoot networks, networking hardware and devices.  Basically, a network administrator works mostly with the computer networks and devices and sets document standard system for computers.


System Analyst
One of the responsibilities as a system analyst is to control the cost used and implement more cost-effective solutions used on computers applications. A system analyst works closely together with the management to achieve business targets besides providing information needs to his/her employer. As this job scope literally focused more on business, a system analyst must also have in-depth knowledge or fundamental understanding of specifications of business requirements.



Programmer
A programmer develops and maintains applications from beginning till the end. Besides innovating and improving on data visualization and presentation techniques, a programmer also creates codes that meet system standard. In conclusion, a programmer job involves responsibility for the design, development and administration of transactional and analytical data structures.