...Shawn Mayer CIS106 17OCT2013 Unit 2 Homework 1. What is the difference between a directory and a file? A file is any computer document folder, a directory is a collection of organized computer document folders, similar to a filing cabinet. 2. What is the difference between an ASCII file and a binary file? ASCII file is text, while binary is a combination of ASC II characters and binary code. 3. Explain what a root directory is. A root directory is the home directory of a computer, comprised of the most basic files required to run the computer/software/hardware. 4. What are the default file extensions for the following types of files? ASCII text file .txt Microsoft Word file .docx Microsoft Excel file .xls Microsoft PowerPoint file .ppt Compressed (zipped) file .zip Web page .html or .htm 5. What basic type of files have file extensions of .bmp, .gif, or .jpg ? images 6. If you create a new file with the long file name Budget Analysis 2005.html, what would be the short name generated by Windows? Budgetan.htm 7. A file’s system attribute is set. Which of the following settings for its folder will allow you to see the file? a. Show Hidden Files ...
Words: 268 - Pages: 2
...Unit 1 Homework Assignment 1. Explain the difference between operating system software, application software, and utility software. Operating system is the software that bridges the gap between the system and the user. Utility software performs actions essential for protecting, guiding, securing, and storing information or data appropriately Application software manages specific actions 2. For the following software programs, determine whether they are examples of • operating system software, • application software, or • utility software Norton Antivirus utility Microsoft Windows XP Operating system MAC OS X 10.6 Operating system Microsoft Word application An email program application A hard drive backup program utility An Internet browser application Microsoft Windows 98 Operating System RealPlayer application Microsoft Windows 7 Operating System 3. Explain the concept of virtual memory and why it is needed. Sets aside a portion of the Hard drive and uses it to add to the RAM making programs run faster and better. Prevents overworking the RAM and causing system crashes and slowdowns. 4. What would be a possible cause of disk “thrashing”? Overworking the hard drive or Ram by trying to run too many programs at once. 5. What is considered the first usable version of Windows? 3.0 6. What was the first business version of Windows? NT3.1 7. Which version of Windows joined together...
Words: 324 - Pages: 2
...Ethics and Local Government Ronald McMillan CIS106 Farzan Soroushi April 28, 2013 Ethics is defined as the discipline dealing with what is good and bad and with moral duty and obligation. Prior to 2006 the London Borough of Brent stored their citizen records across 12 different databases, one for each of the council’s division. Every division had its own separate copy of resident database that was either incorrect or incomplete. There are many ethical issues associated with the consolidation of citizen’s records in the London Borough of Brent but there are two issues that I think stand out the most. Those two ethical issues are the accuracy of the information that is being stored and privacy of the individual’s records. Accuracy, or the lack of, played a huge role in the consolidation of citizen records. The data of Brent’s residents was either inaccurate or incomplete and scattered across the 12 databases. “This situation meant that while one department might know that a resident was blind, and therefore required special services, the others might still treat them like any other” (Hudson, H. 2011, November, 03). There was a lot of confusion to both the employees and the residents of Brent. The London Borough of Brent’s customer information was scattered across numerous standalone databases that was not able to share the data across the enterprise. The information in these databases was filled with multiple errors and incomplete information. The Brent Client...
Words: 311 - Pages: 2
...CIS106 (Introduction to Operating Systems) BINARY AND HEXADECIMAL: Numbering Systems Binary has TWO symbols (0-1); decimal has TEN (0-9), and hexadecimal has SIXTEEN (0-9, A-F). Write binary out in sets of four digits each time. Each binary digit is called a “bit”. Eight bits make up a Byte, and four bits are a nibble. Each hex digit represents one nibble. Use Calc.exe to check your work; click on View – Scientific in XP, or View – Programmer in Windows 7. Part A: Counting in Binary, Decimal, and Hexadecimal. Fill in the symbols and digits in Table 1. Binary Decimal Hexadecimal Binary Decimal Hexadecimal 0000 0 0 8 1 9 2 1010 10 A 3 11 4 12 5 13 6 14 0111 7 7 15 Part B: Binary to Decimal and Hexadecimal. Complete the chart. Add h to each hex number. Fill in the power of 2’s as well. *2^ means “2 to the power of”; for example, 2^5 = 2 * 2 * 2 * 2 * 2 = 64 No. Binary (1 Byte format) 128 64 32 16 8 4 2 1 Decimal Hexa-decimal *2^ 2^ 25 2^ 2^ 22 2^ 2^ 1 11001100 1 1 0 0 1 1 0 0 128+64+8+4=204 CCh 2 10101010 3 11100011 4 10110011 5 00110101 6 00011101 7 01000110 8 10110001 9 11000001 10 11110000 Part C: Decimal to Binary: Complete the following table to practice converting a number from decimal notation to binary format. Mark each hexadecimal number with h. No. Decimal 128 64 32 16 8 4 2 1 Add them up to check...
Words: 337 - Pages: 2
...A Complete Home Network Jorge J. Garcia Strayer University at Palm Beach Gardens, FL CIS106 Dr. Otto June 12, 2015 Abstract It is a daunting task to create a working business network from the ground up when all you are allotted in the budget is $1000 dollars. Every item purchased and configured will need to be the cheapest available in the market, some will even need to be acquired for free in order to meet the requirements. Needless to say labor charges and service or maintenance contracts, aside from ISP monthly charges, will not be part of the equation. As far as my 25+ years of experience goes, there would only be two reasons to accommodate such a ridiculous request: Either my younger brother is begging me to address this because he has no other choice and time is of the essence due to an opportunity which could not be passed up or I am being tasked to be overly creative for a hundred point project due in a college class. Let’s get creative then. A Complete Home Network If we have $1000 dollars to create this project then the first thing to look at is the computers involved as they will be sucking up the most from this budget. There is no explanation for what this office with a minimal budget will do therefore there is no idea as to what type of computing power or software requirements will be needed. In my book minimum budget means minimum requirements. There is no way to make all this work with desktop PCs. The market has made a 180 degree shift from laptops being more...
Words: 1427 - Pages: 6
...Assignment 1: Computer Memory Hacking Albert Pigg| |Mr. De Monte’ Thomason| |CIS106| |05/09/16| Assignment 1: Computer Memory Hacking Hacking of Memory When it comes to the term “hacking” essentially the “hackers” are usually categorized in two categories, “white-hat” and “black-hat.” White-hat refers to the hacker affiliating themselves with light and justice. Black-hat refers to the hacker affiliating themselves with the darker side of the net and with malicious intent. What is “hacking”? Essentially it is accessing, altering, or such manipulation of data while circumventing preventative measures. There is however numerous preventative measures corporations, governments and other private institutions take to secure their data. (Harvey, 1985) Common Tools of a Hacker “To catch a thief, it takes a thief.” We’ve all heard it sometime in life likely. To first take the steps of understanding how to prevent hacking, we must familiarize ourselves with some of their tools. DDOS and DOS Attacks Denial of service attacks are a frequent occurrence on the internet. Often referred to as “DOS attacks”. DOS attacks are initiated by hackers sending packets, or bits of data, very repetitively to the victim’s computer until it is unable to communicate any other packets. (PBS, 2001) One such attack was executed against some big United States companies. On February 8th 2000, “MafiaBoy” or Michael Calce attacked sites such as Yahoo!, CNN, eBay, and E-Trade, with repeated DOS attacks...
Words: 913 - Pages: 4
...Week 4 Assignment 1: Computer Architecture Tony D. Everett Professor Jennifer Merritt CIS106 Intro to Information Technology July 28, 2013 Introduction The use of Information Technology is well recognized. Information Technology has become a must for survival of all business housing with the growing IT trends. The computer is the main component of any Information Technology system. Today, computer technology has filled every scope of existence of modern man. From airline reservations to auto repair diagnosis, from government services databases to manufacturing and production systems that are used by the likes of Pepsi, Kellogg’s and Kraft Foods-everywhere we witness the elegance, complexity and effectiveness possible only with the help of computers. These systems operate using the Von Neumann Architecture. The Von Neumann Architecture and Importance The von Neumann architecture is a design model for a stored-program digital computer that uses a processing unit and a single separate storage structure to hold both instructions and data. The instructions are executed sequentially which is a slow process. One shared memory for instructions and data with one data bus and one address bus between processor and memory. Commands and data have to be fetched in sequential order (known as the Von Neumann Bottleneck), limiting the operation bandwidth. Its design is simpler than that of the Harvard architecture. It is mostly used to interface to external memory. Neumann architecture...
Words: 1237 - Pages: 5
...Assignment 2: A Complete Home Network Jonathan Scholl Strayer University CIS106 Professor Jamshid Haghighi June 7, 2016 A Complete Home Network Introduction: I believe this is way more than enough money for an entire home network, but it also comes down to what the needs of everyone in the household are. If you have gamers or those with workstations, then you’ll definitely need to take into consideration that you’ll need better than average hardware. But some family members may only need a simple notebook, tablet, or even their smart phone to connect to the internet. Most people enjoy streaming applications such as Hulu, Netflix, and Crunchyroll. Before you start, you need to figure out what the network will be used for and tailor it to the needs of everyone who uses it. For this example, I’m going to use my own family’s network. It’s a simple network that will most likely be sufficient for the average family. Starting out, you need to research the internet service providers (ISPs) in your area. These can range from large companies to small local companies. If you do a lot of video streaming and gaming, then you’ll want a fairly good connection speed. I’d recommend going with at least 20Mbps download and 5Mbps upload. The company we use is a local company called Forsyth CableNet. Hardware: You’re ISP can provide you with rental modems. I believe this to be a great option because modems can be costly to replace if they’re damaged. It usually means adding a...
Words: 1436 - Pages: 6
...Von Neumann architecture CIS106 11/12/13 Von Neumann architecture marks the beginning modern information system processing. To fully understand why it is so important, we must first consider the purpose of computer programs. We can then fathom the magnitude of this architecture. The von Neumann architecture allows instructions and data to be mixed and stored in the same memory module and the contents of this memory are addressed by location only. This all takes place in a sequential order. The Von Neumann machine had five basic parts comprised of memory, ALU, the program control unit, input equipment & output equipment. The programs uses a language that to the naked eye can in most cases resemble spoken language. Upper-level languages such as C and Java are designed with this in mind. However, computers understand natural language without significant human effort. The physical hardware cannot truly understand language, but instead processes electrical signals. Computer programs are a list of and data, and are represented as binary strings. We can produce a list of high level requirements that a Central Processing Unit (CPU) could execute. This then leads us to a list of functional units that implement the high-level functionality. Neumann m/c are called control flow computer because instruction are executed sequentially as controlled by a program counter. To increase the speed, parallel processing of computer have been developed in which serial CPU’s are connected...
Words: 2408 - Pages: 10
...2012 Catalog Volume 20 Issue 1 March 5, 2012 – December 31, 2012 This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer...
Words: 130938 - Pages: 524
...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...
Words: 149595 - Pages: 599