Monday, May 16, 2011

Internet Addresses

What is a URL?
The URL is the IP address of the website

The browser broke the URL into three parts:
  1. The protocol ("http")
  2. The server name ("www.howstuffworks.com")
  3. The file name ("web-server.htm")
What is an IP address and how is it related to a URL?
 each machine on the Internet is assigned a unique address called an IP addressThe browser communicated with a name server to translate the server name into an IP Address, which it uses to connect to the server machine.

   Given our school website's URL is http://www.mcauley.nsw.edu.au, what is our domain name and what protocol do you need to use to access the site?
domain name: mcauley
protocol: http://

    In the context of an IP address, what is an octet?
The four numbers in an IP address are called octets because they can have values between 0 and 255

What is meant by upload and download speed?
Uploading involves sending a copy of a file from a computer to a remote network connection.
Downloading involves the reception of a file that has been uploaded to a remote network.
Upload speed is usually slower than download speed because Internet providers have designed their system to optimize download speeds. This is because most Internet users spend more time downloading than uploading.

What are the units used to measure download speeds?
When talking about internet speed two units are often used - kbyte/s kbit/s

Why do different locations offer different download speeds? Hint: “bottleneck”
Because of the different connection such as dial up, wireless, ADSL connections, Cable connections


 

 

Tuesday, May 3, 2011

Key Terms- The internet and web design


  1. Define the term - Protocol
the set form in which data must be presented for handling by a particular computer configuration, esp in the transmission of information between different computer systems


2.  What are the following protocols used for?

TCP/IP- The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexiblity and wide array of functionality provided.
http- http stands for (Hypertext transfer protocol) it is a method by which computers communicate webpages to one another
smtp-  SMTP (Simple Mail Transfer Protocol) is a protocol for sending email messages across the Internet
pop- POP is short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server.
FTP- FTP stands for File Transfer Protocol. FTP is used to create a file server known as an FTP server which is a location created on the web that allows banks of files to be hosted/made available for download.
3.  What does GUI stand for?
Graphical user interface(GUI)

4. There are two methods of data transmission – serial and parallel. Explain the difference between them.

In parallel transmission, multiple bits (usually 8 bits or a byte/character) are sent simultaneously on different channels (wires, frequency channels) within the same cable, or radio path, and synchronized to a clock. Parallel devices have a wider data bus than serial devices and can therefore transfer data in words of one or more bytes at a time. In serial transmission, bits are sent sequentially on the same channel (wire) which reduces costs for wire but also slows the speed of transmission. Also, for serial transmission, some overhead time is needed since bits must be assembled and sent as a unit and then disassembled at the receiver.

5. Define the term “URL”. Explain the components that make up the url.

 Uniform Resource Locator (URL).
The first part is the protocol, which tells the web browser what sort of server it will be talking to in order to fetch the URL. In this example, the protocol is http.
  The second part of the URL is the fully qualified domain name of the website to connect to. This name identifies the website containing the page. The term "fully qualified domain name" refers to a complete website or other computer's name on the Internet.
The third part of the example URL is the path at which this particular web page is located on the web server. Similar to a filename, a path usually indicates where the web page is located within the web space of the website

6. In the context of data transmission, what is “error detection”?

Error detection is the detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver

7. Why would error detection be important for the internet

It is important as if the error detection wasnt there you can get viruses because the error

8. Name and explain one common method of error detection.

Parity Check Method

Errors may occur in recording data on magnetic media due to bad tracks, sectors on the recording surface. Errors may also be caused by electrical disturbances during data transmission between two distant computers. It is thus necessary to device methods to guard against such errors. The main principle used for this purpose in coded data is the introduction of extra bits in the code to aid error detection. A common method is the use of parity check bit along with each character code to be transmitted. As a simple example of an error-detecting code, consider a code in which a single parity bit is appended to the data. The parity bit is chosen so that the number of 1 bits in the codeword or character code to be transmitted or recorded is even or odd.

9. What is HTML and explain why it is important

 HyperText Markup Language (HTML) is a computer language devised to allow website creation. These websites can then be viewed by anyone else connected to the Internet.

Monday, May 2, 2011

History of The internet

How did the internet originate?

The Internet as it exists today began as a military network that was used to transmit data over long distances. That evolved into a text exchange between educational institutions.
Who were the people most responsible for creating it?

 The Internet was invented in the United States during the late 1950s to the 1970s by a group of researchers and scientists at the newly formed Advanced Research Projects Agency (ARPA) after the former Soviet Union launched Sputnik

What system immediately preceded the internet? What was its purpose?
By 1989 many of the new community networks had joined the Electronic Networkers Association, which preceded the Internet Society as the association for network builders. To make it easier to communicate between networks

What is an IP packet? What is it comprised of?
The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite.
 
All IP addresses are made up of four parts (quadrants) separated by dots, like this:
XXX.XXX.XXX.XXX
where each XXX can be any number between 0 and 255. If you know binary, you will understand that each of these numbers are stored in 8 bits (binary digits), and the number of possibilities you can have is 2 raised to the power of 8, which is 256 (0-255).
 
Examples of IP addresses are:
192.168.66.5
127.0.0.1

What does TCP stand for? How does TCP deal with lost IP packets?
transmission control protocol: a protocol developed for the internet to get data from one network device to another; "TCP uses a retransmission strategy to insure that data will not be lost in transmission"

Why do computer people like everything in letters?
Because it is easier to remember words than numbers

Sunday, April 3, 2011

Assignment summary

I uploaded my database onto studentnet. It isnt completely finished because access would not work on my computer and wouldnt llet me fix it up. The questions were uploaded on blogger and were quick easy to do but making the database was extremely hard to do with all the forms and queries.

ASSIGNMENT

What ethical/legal issues need to be considered when implementing this database? Explain.
 
Ethical issues that need to be considered when implementing a music database is that the information in the database is correct and up to date such as the song title, the artist of the song, the album the song is from, the producers etc and that there are no errors. You need to make sure the database is easy to use by everyone such as people who does not have plenty of computer skills that it is easy to access as well as easy to navigate through as for those who have plenty of experience on computers. Instructions on how to use the database needs to be included for the customers so that if they get confused so that they can have a guide on how to navigate through the site. The database must not demonstrate any bias information on music or artist or the song given.
Legal issues that needs to be considered when implementing a music database includes that the information follows the copyright laws concerning the musical CD’s and do not plagiarise the music. That the company that is creating the database have possession of a music licence stating that they can legally sell and promote music. The CD’s is being sold from the company are selling legally and also that they are sold by the date specialised by the music industries that have given the CD’s to the store.  You also have to recognize the artist of the song, the producer and the song title of a sing if it is not an original song by that artist but a cover from another.

Discuss what advantages such a system has over conventional methods of organizing and previewing music?A system which has conventional methods of organising and previewing music has the advantage of being organised as the information is put into fields, setting apart each piece of information.  It allows the customer to create queries which can be both specific and general.  It is easier to update the information in the system as well as it is neatly presented. It can be searched by multiple fields. The database also includes a sample of the music and an image of the album as well as song name, artist name, genre, duration, cover art, cost etc.
Create a “data dictionary” for your database
Field
Data type
Reason
Song title
Text
Name of Song
Artist name
Text
Name Of Artist
genre
Text
Genre Of Song
Duration
Numbers
How long the song is
Album Cover  
Image
What the album looks like
Cost
Numbers
How much it costs
Sound sample
Sound
A sample of the song




Storyboard
- First you press the search button on the main menu

- Three different buttons will then come up, search for genre, search for artist, search for song

- If you click on the search for genre button, then you have to type in the specific name of the genre and the songs from that genre will come up

- if you click on the search for artist button, you have to type in the name of the artist and the songs by that artist will come up

- If you click on the search for song button, you have to type the specific song name and the song and a sample will come up

- When you want to return to the main menu then you have to press the back button on the search page 

Tuesday, March 8, 2011

Bits and Bytes

1.A digit is a single place that can hold numerical values between 0 and 9. Digits are normally combined together in groups to create larger numbers. For example, 6,357 has four digits.
2. Base-10 is a number system based on grouping in tens.
3. Bit originated from Arabic countries
4.
(4 * 1000) + (3 * 100) + (2 * 10) + (1 * 1) = 4000 + 300 + 20 + 1

Thursday, March 3, 2011

Online banking

1. Online banking is a system that allows individuals to perform day – to – day banking activities from the comfort of their own home. One will find 2 kinds of online banks, traditional banks that offer the facility of online banking and the other being an online bank with no physical presence. These banks allow users to execute routine transactions, such as account transfers, balance inquiries, bill payments, and stop-payment requests. The benefits of online banking also include, acquiring and accessing account information at any hour of the day – all one needs is a internet connection.


2. Databases are used in online banking as it must store the information of the bankers in the database to be accessed from the bank and from computers at home.  Databases make it easier to access someone’s details such as their name, address, telephone number, card number and amount of money available in their accounts in a short amount of time for the bank and also, it is easier to find information about their banks online for the consumer in order to do transactions online in a shorter amount of time and pay bills without leaving your own home.

3.The types of data stored about individuals in online banking include the individual’s full name, their email and address, their occupation, date of birth, their phone numbers both home and mobile and fax number, their account number, password, the balance of money in their accounts and credit card details.

4. Some ways where online banking can be misused would be the following:
·         Hacking into people’s bank accounts and stealing their money
·         Taking personal details of the bank account owner
·         Privacy, to embarrass you. Letting everyone know your bank account money

5. Responsibilities of those maintaining the database are very simple and straightforward. Maintainers should keep personal and account information extremely secure, and private. They should make sure they have high security regulations in order for them to prevent the misuse of disclosed information.

6. The responsibilities of people maintaining databases would be to keep personal and bank details discreet and private, and not reveal them to a third party. Examples of information that should be kept confidential are DOB, address, bank number and bank password. Design their systems so that it is hard to get into it.