Tuesday, January 15, 2013

Incarceron


Incarceron is a very big prison. It's not just cells, but there are towns, metal forests, jungles, and seas. The prison has been locked from the outside world for centuries, and only a person, according to the legend, ever got out from there.
Finn, the main roles in this book, is a seventeen years old prisoner. He didn't remember anything about his childhood. Moreover, he believed that he was from the outside world. He found a crystal key and communicate with outside world girl named Claudia, daughter of warden of Incarceron.
Finn wanted to get out from the prison and Claudia believed she could help. However, they didn't realize that Incarceron hide many mysteries. The effort to get out from the prison is impossible and life is at stake.

Finally, I finish reading this book. This book is written by Catherine Fisher. Overall I give this book 3 of 5. At the beginning, the story is a little complicated and a little hard to understand how the world and the story like. Finn and Claudia have a really different world. At the beginning they didn't even connect one to each other until the middle of the story, then you will finally realize the real goal. They split some clans of people but didn't tell readers how the clans looked like. Moreover, the story didn't tell us how the prison named Incarceron looked like.

Exercise Chapter 2 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   False
2.   False
3.   True
4.   False
5.   True
6.   False
7.   True
8.   True
9.   False
10. False
11. True
12. True


Multiple Choice

1. C ( A cellular radio network )
2. B ( periods )
3. C ( Hypermedia )
4. A ( put the most important terms last )
5. A ( microblog )
6. A ( thumbnail )
7. C ( Uploading )
8. C ( Netiquette )


Matching

1.   h
2.   b
3.   f
4.   e
5.   a
6.   i
7.   d
8.   g
9.   j
10. c


Short Answer

1. * Three different types of broadband Internet services :
       - Cable internet service provides high-speed Internet access through the cable television network via a cable modem
       - DSL provides high-speed internet connections using regular copper telephone lines
       - Wi-Fi uses radio signals to provide high-speed internet connections to compatible or properly equipped wireless computers and devices.
    * Regional ISP provides internet access to a specific geographic area while national ISP provides internet in cities and towns nationwide.

2. * Static webpage allows all visitors to see the same content. Dynamic webpage allows users to customize some or all content.
    * Web site is a collection of related Web pages and associated items, such as documents and pictures, stored on a Web server.

3. * Web application is a Web site that allows users to access and interact with software through a Web browser on any computer and device that is connected to the internet.
    * The features and examples of Web applications are : Google Docs ( word processing, spreadsheets, presentations ), Turbo Tax Online ( tax preparation ), Windows Live Hotmail ( E-mail ).

4. * The three types of specifications used by content aggregators to distribute content are RSS 2.0, Atom, Web slices
    * Accuracy of a Web site can be evaluated by using evaluation criteria : affiliation, audience, authority, content, currency, design, objectivity.

5. * Web publishing is the development and maintenance of Web pages.
    * The 5 major steps in Web publishing are plan a Web site, analyze and design a Web site, create a Web site, deploy a Web site, maintain a Web site.

Exercise Chapter 1 - Discovering Computer 2011 - Living in Digital World


Martin - 1601213690

01 PBT

True / False

1.   True
2.   False
3.   False
4.   True
5.   False
6.   False
7.   True
8.   True
9.   True
10. True
11.  False


Multiple Choice

1. B ( computers and their uses )
2. A ( Data )
3. C ( photo sharing community )
4. A ( podcast )
5. A ( System software )
6. B ( instant )
7. B ( enterprise computing )
8. D ( A neutral network )


Matching

1.   a
2.   j
3.   g
4.   d
5.   h
6.   b
7.   f
8.   i
9.   c
10. e


Short Answer

1. * A computer is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use.
    * The information processing cycle is input, process, output, storage.

2. * Prolonged or improper computer use can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back.
    * Computer manufacturing processes and computer waste are depleting natural resource and polluting the environment. When computers are discarded in landfills, they can release toxic materials and potentially.

3. * A Web application is a Web site that allows users to access and interact with software from any computer or device that is connected to the internet.
    * Web 2.0 provide a means for users to share personal information ( such as social networking Web sites ), allow users to modify the Web site contents ( such as some blogs ), and/or have software built into the site for users to access ( such as Web applications ).

4. * Seven categories of computer : PC, mobile computers / devices, embedded computer, super computer, mainframes, servers, and game consoles.
    * A computer's size, speed, processing power, and price determine the category it best fits.

5. * Many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. These Web sites also maintain lists of doctors and dentists to help you find the one that suits your needs. They have chat rooms, so that you can talk to others diagnosed with similar conditions. Some Web sites even allow you to order prescriptions online.
    * Through telemedicine, health-care professsionals in separate locations conduct live conferences on the computer. While telesurgery, also called remote surgery, a surgeon performs an operation on a patient who is not located in the same physical room as the surgeon.

Exercise Chapter 15 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   True
2.   False
3.   True
4.   True
5.   False
6.   False
7.   True
8.   True
9.   True
10. True


Multiple Choice

1. A ( chief technology officer (CTO) )
2. C ( data communications analyst / VoIP specialist )
3. C ( articulation agreement )
4. A ( Computer information systems (CIS) )
5. D ( all of the above )
6. B ( user groups and trade schools )
7. D ( Certified Software Development Associate (CSDA) )
8. B ( CCNA )


Matching

1.   e
2.   d
3.   j
4.   g
5.   h
6.   b
7.   f
8.   i
9.   a
10. c


Short Answer

1. * Advantage of attending a trade school is time savings. Trade schools teach specific skills instead of requiring students take a broad range of courses in the sciences and humanities.
    * Factors that should be considered when selecting a trade school are ask the advisers if the trade school has an articulation agreement with a nearby college or university and ensures that if the students transfer to a college or university, they will receive credit for most of the courses taken at their current school.

2. * The benefit of professional growth and continuing education is staying aware of new products and services in the computer industry because technology changes so rapidly.
    * Some ways can be kept up-to-date about industry trends and technologies are participate in professional growth and continuing education activities such as workshops, seminars, conferences, conventions, and trade shows.

3. * About choosing a certification it should be reflected on the career goals and interest.
    * Four options for preparing for certification :
       - Self-study : flexible self-study programs help professionals prepare for certification at their own pace and supplement other training methods.
       - Online training classes : online training allows students to set their own pace in an interactive environment and combines the technological advantages of computer-based training with the connectivity of the Internet or a company's intranet.
       - Instructor-led training : available in a variety of forms, including seminars, which typically are held for several days during a week, boot camps, which immerse students in intensive course work for up to two weeks, and academic-style classes, which span a period of several weeks or months.
       - Web resources : the certification sponsor's Web site generally contains descriptions of the available certifications, with FAQs and links to authorized training and testing centers.

4. * The focus of programmer / developer certification is training programs that prepare applications for the certification test. Other types of certification are beneficial to those interested in programmer / developer certification are Certified Software Development Associate (CSDA), Certified Software Development Professional (CSDP), IBM Certified Solution Developer, Microsoft Certified Professional Developer (MCPD), Sun Certified Enterprise Architect (SCEA), Sun Certified Java Developer (SCJD), Sun Certified Java Programmer (SCJP), and Sun Certified Mobile Application Developer (SCMAD).
    * Those people who might be interested in programmer / developer certification are Java programmers, Mobile application developers, Oracle database managers, Programming consultants, SQL programmers, Web software developers, XML developers.

5. * Hardware certification vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company's current and future computing needs.
    * People in the following careers may be interested in hardware certification are cable installation technicians, computer repair technicians, corporate trainers, help desk specialists, IT consultants, system engineers and administrators.     

Exercise Chapter 14 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   True
2.   False
3.   False
4.   True
5.   False
6.   False
7.   True
8.   True
9.   True
10. False


Multiple Choice

1. C ( SMBs )
2. B ( reduces costs of maintenance and increases )
3. A ( Business intelligence )
4. B ( quality control software )
5. A ( VPN tunnel )
6. D ( legacy system )
7. A ( Fibre Channel )
8. D ( selective backup )


Matching

1.   h
2.   f
3.   b
4.   e
5.   d
6.   g
7.   a
8.   j
9.   i
10. c


Short Answer

1. * Managers are responsible for coordinating and controlling an organization's resources.
    * Four activities managers perform to coordinate :
       1. Planning : objectives, strategies, tactics.
       2. Organizing : money, people, management, structure.
       3. Leading : communications, instructions, motivation.
       4. Controlling : performance, measurement, corrective action.

2. * Content Management System (CMS) is an information system that is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other files, including images and multimedia content.
    * Type of content may be processed by a content is a content management system includes information about the files and data, called metadata.

3. * Two types of virtualization :
       - Server virtualization : provides the capability to divide a physical server logically into many virtual servers.
       - Storage virtualization : provides the capability to create a single logical storage device from many physical storage devices.
    * Cloud computing is an Internet service that provides computing needs to computer users.
       Grid computing combines many servers and/or personal computers on a network, such as the Internet, to act as one large computer.
       Companies use them because they allow a company to diversify its network and server infrastructure.

4. * Five types of E-Commerce :
       - E-Retail
       - Finance
       - Travel
       - Entertainment and Media
       - Health
    * Describe three of five types of E-Commerce :
       - E-Retail : also called e-tail, occurs when retailers use the Web to sell their products and services.
       - Entertainment and Media : music, video, news, sporting events, and 3D multiplayer games are a growing part of the Web's future. Newsprint on the Web is not replacing the newspaper, but enhancing it and reaching different populations.
       - Heath : many Web sites provide up-to-date medical, fitness, nutrition, or exercise information. Some Web sites offer the capability to listen in on health-related seminars and discussion.

5. * Backup plan contains :
       - The location of backup data, supplies, and equipment
       - The personnel responsible for gathering backup resources and transporting them to the alternate computer facility
       - A schedule indicating the order in which, and approximate time by which, each application should be up and running.
    * Factors contribute to the success of a backup plan is employees must be trained in the backup and recovery procedures and the location of the alternate computer facility.

Natalie Hiong - Part of Me Wonders, Lyrics


Part of Me Wonders
Music and lyrics by Natalie Hiong

Baby I just gotta come clean
I can't give you what you want from me
Don't get me wrong
I still think about you all the time

Only time will tell
If we are meant to be together
For now I'm like a balloon
I wanna fly fly fly
So don't hold me down oh

Chorus:
Part of me wonders
If I'm letting my true love
Walk right out of my life
Just for the foolish reason
That I wanna have fun now
I wanna have fun oh

I don't try to pretend
That it's been easy for me
Many a sleepless night
Wondering if I'm doing what's right

I could let it hang in the air
I know that wouldn't be fair
So I gotta tell you now

Chorus:
Part of me wonders
If I'm letting my true love
Walk right out of my life
Just for the foolish reason
That I wanna have fun now
I wanna have fun oh

Bridge:
I still wanna put myself out there
My heart's still willing to be broken
But maybe that will help me to see
How good you are to me
But baby, I won't make you wait
If I lose you, it's my mistake

Chorus x2

Monday, January 14, 2013

Exercise Chapter 13 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   True
2.   True
3.   False
4.   False
5.   True
6.   False
7.   False
8.   False
9.   False
10. False


Multiple Choice

1. A ( compiler )
2. C ( event driven )
3. C ( Java )
4. S ( SQL )
5. A ( VBScript )
6. C ( SharePoint Designer )
7. D ( Dreamweaver )
8. B ( encapsulation )


Matching

1.   g
2.   d
3.   j
4.   i
5.   c
6.   e
7.   a
8.  a
9.   f
10. h


Short Answer

1. * Compiler : a program which converts the higher level language in lower level language. In case of compiler, it reads a whole block of code at a time, converts it into executable code, and runs the code.
       Interpreter : a program which converts the higher level language in lower level language or assembly language or binary language. It reads one line of code at a time, converts it into binary language and then runs the code on the machine.
    * The advantage of an interpreter is if there is any error on the middle of the program then the program is interrupted in between.
       The disadvantage of an interpreter is after removing the error the programs needs to run again from the beginning.

2. * Object-Oriented Programming (OOP) benefits :
       - OOP provides a clear modular structure for programs which makes it good for defining abstract datatype where implementation details are hidden and the unit has a clearly defined interface.
       - OOP makes it easy to maintain and modify existing code as new objects can be created with small differences to existing ones.
       - OOP provides a good framework for code libraries where supplied software components can be easily adapted and modified by the programmer. This is particularly useful for developing graphical user interfaces.
    * Rapid Application Development (RAD) uses predefined prototyping techniques and tools to produce software applications. It encompasses a graphical user interface (GUI) development environment, allowing end users to easily drag and drop required software application components.

3. * A code editor, a compiler, a debugger, and a graphical user interface (GUI) builder is included in an integrated development environment.
    * The programming languages in the Visual Studio suite is any programming language that lets users create programs by manipulating program elements graphically rather than by specifying them textually.

4. * XML is used in many aspects of web development, often to simplify data storage and sharing.
    * Two applications of XML :
       - RSS 2.0 : stands for Really Simple Syndication
       - ATOM : specifications that content aggregation use to distribute content to subscribers.

5. * In documenting the solution, the programmer performs two activities :
       1. review the program code
       2. review all the documentation
    * Proper documentation greatly reduces the amount of time a new programmer spends learning about existing programs.

Exercise Chapter 12 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   False
2.   True
3.   False
4.   False
5.   False
6.   True
7.   False
8.   False
9.   False
10. True
11. False


Multiple Choice

1. A ( Extreme project management )
2. B ( PERT chart )
3. C ( project request )
4. A ( mandated by management or some other governing body )
5. C ( decision table )
6. D ( system proposal )
7. A ( Computer-aided software engineering (CASE) )
8. D ( acceptance )


Matching

1.   d
2.   e
3.   a
4.   b
5.   i
6.   g
7.   f
8.   j
9.   c
10.  k


Short Answer

1. * System Development is a general term applied to a variety of structured organized processes for developing information technology and embedded software systems.
    * The five phases of the System Development Life Cycle (SLDC) :
       - Analyze ~ the main output is the Business Requirement Document. It would also define test scripts.
       - Design ~ the functional designs and technical designs are the deliverable created in design. It describe how the system will behave and what functions it will contain. It also describe what systems, tables and programs will be created or impacted.
       - Build ~ the main deliverable in this phase are the actual programs and any required documentation.
       - Test ~ the main output is a fully tested system ready for production.
       - Deploy ~ the main output of this phase is a product application now being used by the users to perform their job functions more efficiently.

2. * Four types of feasibility :
       - Operational feasibility : measures how well the proposed information system will work. Will the users like the new system? Will they use it? Will it meet their requirements? Will it cause any changes in their work environment? Is it secure?
       - Schedule feasibility : measures whether the established deadlines for the project are reasonable. If a deadline is not reasonable, the project leader might make a new schedule. If a deadline cannot be extended, then the scope of the project might be reduced to meet a mandatory deadline.
       - Technical feasibility : measures whether the organization has or can obtain the hardware, software, and people needed to deliver and then support the proposed information system.
       - Economic feasibility : measures whether the lifetime benefits of the proposed information system will be greater than its lifetime costs. A systems analyst often consults the advice of a business analyst, who uses many financial techniques, such as return on investment (ROI) and payback analyst, to perform the cost/benefits analysis.
    * Six techniques to gather data and information :
       1. Identify the areas for which information is required
       2. Created the necessary research questions
       3. Determine the sources of data
       4. Research to gather the raw data
       5. Confirm that the data is correct
       6. Process the data to derive meaningful information and then translate into goals and requirements

3. * Unified Modeling Language (UML) is used to specify, visualize, modify, construct and document the artifacts of an object-oriented software-intensive system under development.
    * Use case diagrams : represent the functions of a system from the user's point of view.
       Class diagrams : represent the static structure in terms of classes and relationships.

4. * The operations, support, and security phase consists of three major activities :
       1. perform maintenance activities
       2. monitor system performance
       3. assess system security
    * Type of maintenance activity :
       - Corrective maintenance : the process of diagnosing and correcting errors in an information system.
       - Adaptive maintenance : the process of including new features of capabilities in an information system.
       - Performance monitoring : the process to determine whether the system is inefficient or unstable at any point.
       - Perfectible maintenance is the process to investigate solutions to make the information system more efficient and reliable.

5. * Summarizes in writing all of the safeguards that are in place to protect an organization's information assets.
    * Three things should a computer security plan do :
       - Identify all information assets of an organization, including hardware, software documentation, procedures, people, data, facilities, and supplies.
       - Identify all security risks that may cause an information asset loss. Rank risks from most likely to least likely to occur.
       - Identify the safeguards that exist to detect, prevent, and recover from a loss for each risk.

Exercise Chapter 11 - Discovering Computer 2011 - Living in Digital World



Martin - 1601213690

01 PBT

True / False

1.   True
2.   True
3.   False
4.   True
5.   False
6.   True
7.   True
8.   True
9.   False
10. False
11. True
12. False


Multiple Choice

1. B ( payload )
2. D ( all of the above )
3. A ( denial of service attack )
4. C ( Digital forensics )
5. C ( hardware theft )
6. D ( encryption )
7. D ( power usage effectiveness (PUE) )
8. C ( social engineering )


Matching

1.   j
2.   d
3.   e
4.   g
5.   i
6.   c
7.   b
8.  a
9.   h
10. f


Short Answer

1. * There are two ways that an antivirus programs detect and identify a virus. First, it scans or monitors the programs by its code, if it found a program code that matches with the virus code in its signature database, it will consider that program is a virus. Second, it scans or monitors the programs by analyzing its behavior, such as modification of critical system files, if any behavior seems suspicious, then the antivirus program will alert the user that there are suspicious behavior, or it may alert the user that malicious actions are about to be performed, and block that behavior.
    * Virus hoax is a false warning about a computer virus.

2. * ENERGY STAR is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy helping us all save money and protect the environment through energy efficient products and practices.
    * The users should recycle obsolete computers properly. Then, the revamped end product would be sold at a low price or donated to the less fortunate in the society.

3. * Information privacy is considered an important aspect of information sharing. With the advancement of digital age, personal information vulnerabilities have increased.
    * Five ways to protect personal information :
       1. Don't use your primary email address.
       2. Don't give out your phone number.
       3. Don't give out your birth date.
       4. Don't ever give out your credit card number, driver's license number, or Social Security number.
       5. Be savvy, if it's too good to be true, it probably is.

4. * The two best methods for avoiding phishing attacks are first to abandon any outdated email software. Get a Gmail account if you can, they are top of the line in preventing phishing attacks. Another method is to tighten up your browser's security settings.
    * Clickjacking has introduced a new threat to images, links, website, forms, guest-books, bank log in pages, and many more can now be used by hackers to compromise your computer. Attackers now have a way to place invisible code behind web elements mentioned above and there is no way to detect if a page has been compromised.

5. * Content filtering is used by corporations as part of internet firewall computers and also by home computer owners, especially by parents to screen the content their children have access to from a computer.
    * Internet content rating systems define special metadata to describe web content, so-called content labels. The creation of this metadata is generally performed on a voluntary basis by the content providers themselves, who will also technically integrate the rating information into their websites. Another though less common scenario involves third parties in the role of the content rating institution, who will classify content on behalf of others and provide this rating information on request.

Natalie Hiong - This Love Song, Lyrics

This Love Song
Music and lyrics by Natalie Hiong

Saturday afternoon

And I'm sitting here in my room
Thinking about you
And when I'm going to meet you

I guess I should be outside

Not hiding here, all out of sight
That'll make it easier for you to find me

Chorus:

Oh baby come and find me
I'm waiting here so patiently
What's taking you so long
Can't you hear me singing you this love song

Friday night, I'm out about town

But I can't help feeling down
Wondering why all the guys I meet
Are just after one thing

I just want someone who'll be true

And I know it's you
So I'm pinning all my hopes on you
Now, darling come and save me

Oh baby come and find me

I'm waiting here so patiently
What's taking you so long
Can't you hear me singing you this love song

I just want someone who'll be true

And I know it's you
So I'm pinning all my hopes on you
Now, darling come and save me

Oh baby come and find me

I'm waiting here so patiently
What's taking you so long
Can't you hear me singing you this love song

Oh baby come and find me

I'm waiting here so patiently
What's taking you so long
Can't you hear me singing you this love song

Tuesday, January 1, 2013

Happy New Year 2013

Happy New Year 2013 ~

There's nothing special actually in this new year, but.. I have a really amazing story. You will not believe this and I'm not gonna believe myself also. I through the new year's eve with Esther K! Amazing isn't it? She sings very well and did a lot of songs' cover in youtube. We did a lot of funny chat, coolio! Here's a link, one of her videos! Happy New Year 2013 everyone!


Merry Christmas 2012


Merry Christmas 2012 ~

I never thought that I will really get into this. For me, this Christmas is one of my best days in this year. Every people around me share their joyfulness and greet one to each other like a family. I hope this good feeling will continue and hope this Christmas will bring joy to all of us. Once again, Merry Christmas everyone! :)