...Unit 1 discussion 1: familiar protocols Q 1) What role does TCP/IP play for internet communications? TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP. Q 2) What role does IP play in data transfer over the internet? IP is a protocol. Simply said, a protocol is a set of rules governing how things work in a certain technology, so that there is some kind of standardization. When put into a network communication context, a protocol is the set of rules governing how packets are transmitted over a network. When you have a protocol, you are sure that all machines one a network (or in the world, when it comes to the Internet), however different they might be, speak the 'same language' and can integrate into the whole framework. IP is probably the most common protocol over the Internet. It is the set of rules governing how packets are transmitted over the Internet. The IP protocol standardizes the way machines over the Internet or any IP network forward or route their packets based on their IP addresses. Q 3) How does Dynamic host configuration protocol ease management of IP addresses...
Words: 573 - Pages: 3
...The age of technology has opened many gateways into what education can and should be as our society progress so should the way we educate our children, they should get the best possible education we can provide and the best way for that is to implement more technology passed learning from a younger age. Technology has some immense potential too change our education system for the better but as we reach into the unknown we must be prepared to look at the positive and negative aspects of making technology a staple for our education. Too see if this will eventually turn out well we must look at how it will impact the students focus, creativity, and most importantly how it’ll affect social interaction with the other people around them as it is...
Words: 907 - Pages: 4
...INTERNET WEB SEARCH ARTICLE #1 HOW DO EMPLOYERS MONITOR INTERNET USAGE AT WORK? This article informs us the readers on how and what forms an employer can monitor our internet usage while at work. The main reason that we see this at work is due to our advance technology at the work place. Almost all companies have access to the internet at work which entices the workers to go to websites that are not work related. This article does not debate whether it is legal or illegal. It provides information on the two basic types that employers use to monitor, internet and desktop surveillance. This article explains that they use spyware like hackers do to monitor an employee’s internet usage, website visits, emails sent, information on emails, and streaming videos. This information provides specific work or unrelated work this employee is conducting to include the time spent. While conducting desktop surveillance it does all of the aforementioned to include offline activity. All systems are connected to the administrator’s computer and he can actually connect via remote and monitor while you are in front without knowing. I believe this article was mediocre in all. It did provide information that I was not aware like the two basic ways employers monitor. I feel they could have gone more in depth in this area. I know this article was not mean to debate whether it was legal or illegal but does cover the basic legal rights the employer and employee have. REFERENCE J. Bean (2010)...
Words: 279 - Pages: 2
...INTERNET REGULATION Legal and Ethical Issues Concerning Internet Regulation Calvin White Park University Outline 1. Intro a. Regulating the Internet: Delicate, difficult, presents challenges 2. Body b. Past i. History of Internet Regulation 1. Early role of regulation a. Mediate connectivity between researchers, government 2. Milestones and events that shaped regulation b. 70s and before - Lab experiments c. 80s - Early commercialization d. 90s - Widespread adoption i. Early malicious activity ii. Educational organizations e. 2000 to present iii. The need to curb crime iv. The need to protect consumers and businesses v. The defense of our nation’s assets 3. Leaders in Internet regulation f. Efforts at home g. Efforts abroad 4. The challenges of regulation ii. Why broad regulation has proven difficult 5. Technology meant for other purposes 6. Grew too quickly c. Present iii. Structure 7. Present-day regulations h. How ongoing Internet regulation works 8. Who controls the Internet? i. Who enforces regulation? 9. How infractions are punished iv. Problem...
Words: 3196 - Pages: 13
...Alexis Martinez Professor Brown ENWR 100-25 December 14, 2012 Internet Interfering With Our Individuality The internet is beneficial in many ways if it is used correctly but individuals. Some people believe that the internet has a positive impact on students by providing various sources of research. The internet can also bring some negative effects on students such as being dependent on the internet to complete homework assignments. Yes, the Web is a useful source to share ideas all over the world, yet it can threaten the notion of individuality in todays society. However, intellectually, the internet can harm our sense of unique thinking. Individuals need to form there own idea’s, we can not always depend on the internet to make decisions for us. As for students, dependency is a huge issue, having a simple writing assignment can trigger the thought of going to the internet and googling it. When a student does this there is also the risk of plagiarism, since the information is online for everyone to read there is always a temptation to steal the individuals words. This action creates a lack of ideas and individual knowledge within a person. An example of this is seen in the essay “How Computers Change the Way We Think by Sherry Turkle, the author explores how technology has negative and also positive impacts on a persons live. While the Massachusetts Institute of technology Turkle observes professors complain about the calculators students where using. The students...
Words: 976 - Pages: 4
...Managing a small business network can be tough work, but it is a fun and exciting career, than provides endless opportunities for learning new technologies and ideas. Although this is a good career choice, there are many times where this job can be frustrating and tough. The frustrating times come when mission critical equipment fails, or a configuration file gets corrupted. First I will talk about the equipment needed to make a small business network function, with minimal errors. Next I will explain the pros and cons to managing a small business network. Lastly I will talk about what I recommend for a small business network. To start the body off, I will be explaining what equipment is needed to start a small business network. First we have our routers and switches. Routers perform many functions, one of which is serving as a firewall. Computers have tens of thousands of ports, or "doors" as this essay will refer to them as. Without a firewall, all the doors on the computer are unlocked and available for anyone to use. Anyone could be your brother sending an email, or hacker from Indonesia using your computer to send SPAM. Firewall's will recognize all the doors your computer isn't using and lock them, so no one can use the doors, unless you know the password for the firewall. Routers also have various other functions, which may or may not be used by businesses; it all depends on your application. Switches take one internet connection and split it into many connections. Fore...
Words: 2232 - Pages: 9
...Internet and Internet Authors Jennifer Holt HUM/186 August 18, 2014 Sabrina Young Internet and Internet Authors The internet has made information readily available to anyone that has some type of internet connection. It has also enabled people to find images, songs, and videos that they want to see or hear. With so much available with a few strokes on a keyboard or a click of a mouse, how does one determine what is alright to pass on or use for their own? Where does one draw the line that separates what is public use versus what was shared but copy written? In order to be able to recognize the difference, one should understand what copy write and plagiarism means. Information that is copy written means that only one person has the legal right to reproduce, publish, sell, record, etc. for a specific amount of time. Since the Berne Convention in 1989, anything created after April 1, 1989 is copyrighted. Internet users should assume that the work is copyrighted, unless the author has stated otherwise (Brad Templeton, 2008). Many internet users however, do not realize this. They share information and copy and paste images that have found on someone else’s site without any mention of where they originally found it or thought of obtaining permission for sharing it first. Students in particular have to really watch this as the ethical lines are easily crossed. This does not mean that students are less ethical, it just means that they have to be extremely careful...
Words: 486 - Pages: 2
...Audrey Runner Media: Good or Evil? I can remember what it was like to watch television as a child, in the morning while eating cereal, and how it felt playing on my Nintendo 64 and believing that piece of technology to be “cutting edge”. I also remember from an early education stand point that as a class in kindergarten we were introduced to computers, and told we would need to know how to use these when we were older. In reality, I have been born and raised in an era where technology is viewed more as a machine and not as the thriving life source of our community as it is now. Today we have digital technology everywhere; in our pockets, in our homes, in our cars, for some - even in their glasses. We are never too far from our technology or the access to social media it possesses. Social media is taking over our world. Now is this a good or bad thing? My answer to that is it always has been and always will be – there is no wrong or right. Meaning that technology and media in itself has always been progressing and digital media is just another step. Today’s media is in an ever progressing state, and it will continue to grow; such is the nature of media and social relations in themselves. Technology today has given us the ability to interact with one another much differently than we have in the past, it also has reached new heights in our ability to share and distribute knowledge, but one of the biggest problems is that of the generation gap between the technologically savvy and...
Words: 2095 - Pages: 9
...The average person does not go to work expecting to have big brother looking over their shoulder when they are using their computer. In this day and age the monitoring of computer usage has become more prevalent than it was in the past. As a computer user you have access to more resources on many computers that are just a few mouse clicks away. With your computer at work you can send emails to the four corners of the earth. Today, you can use the World Wide Web to get look at just about anything you can imagine. This includes pictures, sounds, and video. The desktop computer has become a very powerful tool in today’s workplace. There are downsides to this power too. Because of these downsides employers are finding it necessary to monitor what you are doing on your computer. Does this infringe on your privacy right in the workplace? Do you know what your privacy rights in the workplace are? When you are using your computer at the workplace to access you email your activities may be monitored without your knowledge. Companies are not monitoring what computer users are doing with their email. Do you send email to users on the Internet? Most if not all company Internet activity passes through a firewall. One of the functions of a firewall is to monitor Internet traffic coming into and out of the company’s computer network. If you are sending emails to Internet users your company firewall is monitoring whom it is being sent too and if they respond too you. Employers watch company...
Words: 1101 - Pages: 5
...submitting to the Unit 3 Dropbox. Be certain to answer each question completely. Unit 3 Assignment Outcomes addressed in this activity • Describe the origin of the internet • Explain various multimedia files found on the Web • Discuss how to search the internet effectively Course Outcomes practiced in this unit: IT190-2: Describe the basic components of a computer network. GEL-7.1: Identify the ethical issues within the field of study. Do not forget, whenever you look up information, you need to cite your sources! Please copy and paste the full URL of any website you use in researching your answers to the following questions. If you use your book, please place the page number from your book in parentheses next to the answer. Unit 3 is a Master Learning Unit. A Master Learning Unit presents an opportunity for you to grow and improve as a student. In order to qualify for Master Unit Grading you must: • Respond to all questions • Make a determined first attempt • Cite your responses • Submit your assignment on time If you meet the above criteria, your instructor will grade your assignment if it meets mastery level. However, if your assignment does not meet mastery level standards, your grade will be withheld and you will be given advice on how to improve your assignment for resubmission. Once you have received recommendations for improvement, you have 72 hours to resubmit your assignment for grading. If you do not make...
Words: 1405 - Pages: 6
...BUS311: Business Law I (BAI1414A) 4/20/2014 Philosophers have barely taken an interest in the ethics dealing with intellectual property, this despite societies continued debate over “fair use” of copyrighted materials. We justify copy and paste forgoing old set standards of how we give credit for intellectual achievement in lieu of convenience. One has to wonder as technology continues to advance and copyrighting laws become diluted that music and art available via the internet will be of any commercial value. Intellectual Property-Music and Art and Fair Use I. Intellectual Property a. What is IP? b. How has technology affected IP? c. What laws protect IP? II. Music & Art work a. How has broadband changed the music industry? b. How is it so easy to copy and paste someone else’s work? 1. Does citing a source give one the permission to use? 2. What laws govern copyright? III. Fair Use a. What is fair use? b. How does fair use fit with copyright law? c. How does the court know if a use is fair? . IV. Moving forward a. Advancing Technology vs. Copyright laws b. Artistry vs. Commercial reward What is Intellectual Property? Intellectual Property By definition intellectual property IP, is all products derived of human intellect that the law protects from unauthorized usage. Ownership creates a limited monopoly innately of this protected property. Intellectual property consists...
Words: 2885 - Pages: 12
...WILL LUERS SETAREH ALIZADEH DR. DENE GRIGAR A Study Guide for Douglas Rushkoff’s PROGRAM OR BE PROGRAMMED #nextchapter The following study guide aims to provoke further thoughts and extend the conversation surrounding Douglas Rushkoff’s book Program or Be Programmed: Ten Commands for a Digital Age. It has been created for a wide variety of readers––from high school to adults––and purposes––from book clubs to study groups. Rushkoff proposes 10 commands that are each based on one of the “biases” of digital media. In computer programming a “command” is a directive to a computer to perform a specific task. But Rushkoff’s commands are not directives for human behavior as much as a code of ethics that, like the 10 commandments of Judaism in what was a new text-based age, help us navigate a new age of computer mediation and abstraction. Digital technologies continue to increase the capabilities of mankind. These technologies, however, come with biases. If we aren’t aware of these biases, we’ll find ourselves at the mercy of the technology designed to serve us. While there’s still time, we must take matters into our own hands and learn to program! Rushkoff, Douglas, dir. Program or Be Programmed. 2010. Film. 31 Jan 2013 2 RUSHKOFF’S PRINCIPLE OF: I. TIME DO NOT BE “ALWAYS ON”. We live in a world dictated by time. However, to our digital devices, time is an unknown concept. This situation has caused us to become more concerned with the newest information rather than the most...
Words: 6071 - Pages: 25
...How Social Media Makes Society Let us take a trip into digital cyberspace and see what we will find. It is a never ending wonderland of bytes of data never before seen by men of different walks of life. Yes, dear reader, we can discover a whole new world in this digital frontier. However, is it worth it to venture the digital landscape if we could find out everything we ever needed to know on the social media landscape? Yes, it is. And in the end, it may be better to find out information outside of social media since social media leads to a possibility of spreading false information, a lack of privacy in one’s daily life, and a facilitation of endangering children through harmful social media sites. All in all, Social Media is more likely to do more evil for the society than it does justice. Forms of digital communication over the internet, such as social media, have become increasingly popular in information transmission since the dawn of the internet in the 1960s (Museum of Science and Industry). Today as of 2013, over 50% of people worldwide receive their information over common social media mediums such as Facebook, Twitter, and YouTube (Kidwali and Imperatore). Mediums such as radio, television, and print publication have slowly dropped in use. With this rapid increase in information being spread over social media, any individual with a decent understanding of the English language and a terminal to the greater World Wide Web can become just as credible as any well-established...
Words: 2196 - Pages: 9
...Wireless Fidelity. Cellular communications are rapidly changing as more wireless applications are realized. The potential for cellular use has transcended mere phone communication use as developers delve into other cellular applications. Cellular technology works on the premise of radio communications through lower power base stations known as cells (Brain, Tyson, & Layton). The world has built an extensive and reliable cellular infrastructure and is now midst of significant improvement. With third generation (3G) and forth generation (4G) cellular communication, it is now possible to have mobile broadband technology. Other applications include WAN backup and alarm system transmission. An example of this is the use of 3G backup devices used in all State Farm agencies. This device is connected to the router in lieu of a dial backup. Satellite is another form of wireless technology. This digital signal transmits from the Clarke’s Belt approximately 22,000 miles above sea level (How Does Satellite Internet Work?, 2012). This geostationary orbit allows appropriate gravity for satellites to rotate at the same rate as the Earth. Satellite signals were predominately used for communication, but lately include Internet transmit and receive capabilities. A company can transmit and receive signals to and...
Words: 582 - Pages: 3
...controls the input/output and controls various tasks of the hardware. Apart from serving as a go-between for application programs and the hardware of the computer, the OS also consists of information and programs while providing general services to make sure that several software applications can operate accordingly. Operating systems can be found in almost any type of a computer device such as personal computers, supercomputers, cellular telephones, and video game consoles as stated by Linux Systems (2011). As the research was being conducted for this paper, it raised a question whether the internet uses the operating system? It proved to be a challenge to actually pin point the most common operating systems on the Internet, but as the research continued, it was obvious that these three, Windows, Mac OS X, and Linux are considered to be the most common operating systems used on the Internet today. Background of each Operating System Windows Privately owned operating systems, Microsoft Windows is generally used on personal computers and as of today, the most commonly used version is Windows XP with the new version of Windows 7 for personal computers and Windows Server 2008 R2 for servers is entering the market. Mac OS X Mac OS X is a graphical operating system which is designed and distributed by Apple Incorporated is considered to be partially privately owned. Its latest version of software is pre-loaded on all of the Macintosh Computers and is also a UNIX operating...
Words: 1150 - Pages: 5