The first time I saw Sir Tom in the dormitory especially when we are introducing ourselves, I've been really frightened because of his muscular body and army-like voice and is acting like a very strict dormitory. When I first stepped inside the computer laboratory I'm still wandering what will be our lessons, if the lessons are too hard to take and some other things related to our subject. On the first session in Computer Science 1, Sir Tom introduced to us the definitions of computer science, information technology (IT), and information communications and technology(ICT). He also introduced the curriculum guide for the whole school year in CS 1 and stated to us how we will be graded through the Grading System for CS 1. At first, he let us guess the definition of terms for CS, IT,and ICT. Then later when it seems that nobody was participating, he already started for the lecture. He always seems that he always call me Ash/ Ashley during recitation because he said that it is a
Martes, Agosto 13, 2013
My First Computer Science Session with Sir Tom
The first time I saw Sir Tom in the dormitory especially when we are introducing ourselves, I've been really frightened because of his muscular body and army-like voice and is acting like a very strict dormitory. When I first stepped inside the computer laboratory I'm still wandering what will be our lessons, if the lessons are too hard to take and some other things related to our subject. On the first session in Computer Science 1, Sir Tom introduced to us the definitions of computer science, information technology (IT), and information communications and technology(ICT). He also introduced the curriculum guide for the whole school year in CS 1 and stated to us how we will be graded through the Grading System for CS 1. At first, he let us guess the definition of terms for CS, IT,and ICT. Then later when it seems that nobody was participating, he already started for the lecture. He always seems that he always call me Ash/ Ashley during recitation because he said that it is a
Sabado, Agosto 10, 2013
Backup
Data Encryption
Conversion of data into code for compression (with compression algorithm) or for confidentiality or security (with encryption algorithm) (businessdictionary.com)The translation of data into a secret code. Encryption is the
most effective way to achieve data security.
To read an encrypted file,
you must have access to a secret key or password that enables you to decrypt it.
Unencrypted data is called plain text ; encrypted data is referred to as cipher text.There are two main types of encryption:
asymmetric encryption (also called public-key encryption) and symmetric encryption (webopedia.com). Microsoft's BitLocker, PGP Corp.'s Whole Disk Encryption, and
TrueCrypt from the TrueCrypt Developers Association are just examples of
encryption applications (computerworld.com).I do not usually encrypt my files because
there is nothing confidential especially I'm just a first year high school
student but currently I'm encrypting my files in my laptop.
Data Compression
Reducing the 'electronic space' (data bits) used in representing a piece of information, by eliminating the repetition of identical sets of data bits (redundancy) in an audio/video, graphic, or text data file. White spaces in text and graphics, large blocks of the same color in pictures, or other continuously recurring data, is reduced or eliminated by coding (encryption) with a program that uses a particular type of compression algorithm. The same program is used to decompress (decrypt) the data so that it can be heard, read, or seen as the original data. Compression ratios of 1:10 to 1:20 (or much higher, with emerging technologies) are routinely achieved with common types of data, resulting in much smaller storage space requirements or much faster communications. Fax machines were the earliest consumer equipment to use a data compression technology. Also called data compaction. See also streaming media (businessdictionary.com).
File Formats
A file format also defines whether the data is stored in a plain text or binary format. Plain text files can be opened and viewed in a standard text editor. While text-based files are easy to create, they often use up more space than comparable binary files. They also lack security, since the contents can be easily viewed by dragging the file to a text editor. Binary file formats can be compressed and are well-suited for storing graphics, audio, and video data. If you attempt to view a binary file in a text editor, most of the data will appear garbled and unintelligible, but you may see some header text that identifies the file's contents.
Some file formats are proprietary, while others are universal, or open formats. Proprietary file formats can only be opened by one or more related programs. For example, a compressed StuffIt X (.SITX) archive can only be opened by StuffIt Deluxe or StuffIt Expander. If you try to open a StuffIt X archive with WinZip or another file decompression tool, the file will not be recognized. Conversely, open file formats are publicly available and are recognized by multiple programs. For example, StuffIt Deluxe can also save compressed archives in a standard zipped (.ZIP) format, which can be opened by nearly all decompression utilities.
Information Communications and Technology
Information Communications and Technology refers to
technologies that provide access to information through telecommunications
(techterms.com). technology used to handle information and aid communication
(stevenson). technology that supports activities involving the creation,
storage, manipulation and communication of information, together with the related
methods, management and application. Stands for "Information and
Communication Technologies." ICT refers to technologies that provide
access to information through telecommunications. It is similar to Information
Technology (IT),
but focuses primarily on communication technologies. This includes the Internet, wireless networks, cell phones, and other
communication mediums.In the past few decades, information and communication
technologies have provided society with a vast array of new communication
capabilities. For example, people can communicate in real-time with others in different countries using
technologies such as instant messaging, voice over IP (VoIP), and video-conferencing. Social networking websites like Facebook allow users from all over the world to remain in
contact and communicate on a regular basis.Modern information and communication
technologies have created a "global village," in which people can
communicate with others across the world as if they were living next door. For
this reason, ICT is often studied in the context of how modern communication
technologies affect society.(techterms.com) Information Communications and
Technology is the distribution of information to different computer systems.
Information Technology
The technology of the production, storage, and communication of information using computers and microelectronics (Collins). The technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data (Merriam-Webster). Info Tech is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. As the branch of technology devoted to the study and application of data and the processing thereof. IT can also be thought of as applied computer systems, including both hardware and software, usually in the context of a business or other enterprise, and often including networking and telecommunications. Information Technology is basically the technology of Information.
Computer Science
ICT Systems
A system is a procedure that involves
input, processing and output.You can have a
manual system too.
ICT is the
use and transmission of data to produce information after processing. An ICT
system involves hardware, people, data, procedures, information and software.An ICT system is a system that uses any form of
digital technology, the output goes directly to a human being or into another
system. A system that uses any form of digital technology to input and process
data and out put the information which goes directly to a human or into another
system. ICT systems are those where the
output from the system goes directly to a user or into another ICT system. Input is
capturing the data, process is
converting the data into information and output is the information produced. Feedback might then be used to affect another input (into the same
system or a different system).Common ICT Softwares
The second category is office applications, these are softwares that are used in business such as word processing, spreadsheet, database management and e-mail. Common office applications are widely available in a package set from vendors. They are also available in packages or suites. The Microsoft Office is an example of office application.
Web service is the third category. Web service applications/softwares are softwares that use internet to operate and produce the output. There are several subcategories of web services applications. The first one are web browser, this is a software application used to locate, retrieve and also display content on the World Wide Web, including Web pages, images, video and other files. Examples are Mozilla Firefox, Google Chrome, Safari, Opera and the fastest web browser, Internet Explorer. The second one are E-mail Software for creating, sending, receiving and organizing electronic mail. Example is Microsoft Office Outlook. The third one is Instant Messaging Software-software that enables you to create a kind of private chat room with another individual in order to communicate in real time over the Internet, analogous a telephone conversation but using text-based, not voice-based, communication.
Command Prompt
Command Prompt- available in all Windows system. The counterpart of the GUI-based commands.
Commands in the Command Prompts
ATTRIB- change the file attributes. '+' adds an attribute and '-' removes an attribute.
DEL-delete one or more file in your current directory
EDIT-runs DOS EDIT. Useful for editing batch files and viewing logs
C:-go to the C: drive.
D:-got to the D: drive
CD-changes you to a different directory
CLS- clears the screen
DIR-displays the contents of a directory
HELP-displays DOS Help. Used for help on an individual command
MD-makes a new directory
RD-removes directory
RENAME-renames a file
There is a quiz on this lesson where I got only 9 out of 10.
I waited for the others to finish because I can't use my own computer systems.
Mag-subscribe sa:
Mga Post (Atom)