Thursday 18 August 2011

KNOWLEDGABLE INFORMATIONS AND MY PERSONAL REASONS I GOT FROM COMPSCI

3 main specifications of a computer

       I learned that processor, ram and hardrive are the most basic important specification when you will buy a computer. In my personal experience, when i choose a computer, i must know first how large is the video card is. Because before i thought that when the video card of the computer is small the graphics of the computer is basically a low quality which is not true. i knew that video card is important when you are a graphic designer, addict in playing game and web developer. But as a personal use, it is not practical to buy a computer that has a larger video card.

Buying a new laptop and pc's

     I also learned that it is practical to buy a new laptop than repairing it which is 3 years old and above. Because before we had a laptop and it is over 4 years old since 2000. Then it had a problem that it's mother board its not functioning correctly. We had no choice but to consult it on costumer service. Then he said to buy a new mother board than buying a new one because of the price. Then we buy a new one and spend a PHP6000. Its not bad because the brand of the mother board is original. Then this is the thing, we already had a new motherboard, but the problem is, many of the hardware is not compatible to the motherboard so we will have to buy a all of the hardrive that is needed in order to be compatible to it. I knew that it is practical to buy a new laptop than buying a motherboard because we will spend more than replacing it a new one. Also, as the years come by, technology become smaller and cheaper.

Deleting files

       Deleting files does not mean its permanently deleted as i knew before. The only time it will be permanently deleted is when you format your hardrive or random overwrite it. As i knew before that when i deleted the file it is totally deleted on my hardrive because the memory of the hardrive increased again but what happened the file was only virtually deleted and can be recovered by recovery software.


Social networking

     Social networking is just for distance relationship, far relatives to share and promote ideas. But many people do this just to cheat, tease, mock and etc. In short, majority of the people do social networking in bad doings. In my own experience, i had a girlfriend and she is so friendly. The thing is, many of his friend is boys so as a boyfriend i will feel jealous because i see my girlfriend in facebook flirting with other guys. So i decided to broke up with her because i was so jealous inspite of there is the trust but the thing is, you wont resist seeing your girlfriend flirting with guys. That's the majority of the cases in facebook. So many couple file a divorce just because of social network. Another thing is, many people post what they are doing in the same time they post it. Just like taking a bath, eating, or doing something that is not prcatical to say in public. The thing is, people must have privacy in life. What if one person post that he/she is taking a bath, then another person comment something bad to say in public. The person posted it was embarassed in public. That is what i hated much in people that even small thing they do they say to it in public especially in social network.


Friday 12 August 2011

STORY ABOUT USERS OF SOCIAL NETWORK

      VICTIMS OF USING SOCIAL NETWORK


          STORY ABOUT MEI WAS TRICK BY NON-GENUINE WEBSITE

Mei was looking in the internet for applying for a visa, then she saw an advertisement in somekind of social network. The contact details were australian. So mei believe that that site was reliable and true. So she called the australian and registered for an application in visa. The caller advised Mei she had been assessed eligible for a visa and all she needed to do was pay a fee. The caller was so very convincing and he told her to pay $600 for fee. After a few weeks for waiting. She never heard of that company again. When she tried to retrieve back her money and application for the visa,  she discovered the address and phone numbers listed on the website were false. 

http://www.immi.gov.au/migration-fraud/victim-stories.htm

      STORY ABOUT RICKERY RIVERO WHO WAS STABBED BY SUSPEK HANS IVAN

Ricky rivero is a director in abs-cbn. He met hans ivan in facebook through chatting. Ricky rivero invite him in his house. Exactly 3:00 am ricky rivero harass hans ivan and hans ivan stabbed ricky rivero 15 times in his middle body because he was asking some money to the director and ricky gave nothing to hans. So he stabbed 15 times the director and not contented, he get some of jewelry and some money of ricky rivero and go out to the condo. But the police caught him fastly and got him to jail quickly.

http://www.gmanews.tv/story/225366/entertainment/hirit-daw-ni-ricky-rivero-sa-suspek-na-si-hans-ivan-gawa-tayo-ng-baby




               
      TEEN ADMITS THAT HE KILLED A 13 YEAR OLD GIRL THROUGH FACEBOOK


A teenager has admitted to killing a 13-year-old girl he met on social networking site Facebook, according to Lithuanian police. The 14-year-old lured the girl to the county's capital, Vilnius, where he lives. And this morning he confessed to the murder, police said, after the unnamed girl's half-naked body was found last night. Police spokeswoman Dalia Petrauskiene says the girl from the town Alytus was murdered after arranging on the popular social networking site to meet the boy. She was found murdered and semi-undressed at a bus stop outside Vilnius. The spokeswoman said today that the boy confessed to the killing and if he is found guilty of murder he faces a maximum 10-year sentence. Lithuania is one of Facebook's fastest growing markets, with some 710,000 users in the country of 3.4 million. Facebook has attracted over 600 million users since it was established in 2004 and the social networking site has already been the cause of some attacks and killings, drawing vicious criticism from some quarters who complain that privacy settings should be tighter. In January 2009 Edward Richardson, 41, was convicted of killing 26-year-old Sarah Richardson in a 'frenzied and brutal attack' at her parents' home in Biddulph, Staffordshire, after he had become 'enraged' when she changed her status from 'married' to 'single'. Last March Peter Chapman, 33, was jailed for at least 35 years over the killing of Ashleigh Hall, 17, in Sedgefield. The known sex offender met her via Facebook. Meanwhile in August three Colombian teenagers were murdered in five days after their names appeared on two hitlists published on Facebook, the social networking website.

http://www.abc.net.au/news/2011-01-17/boy-arrested-over-facebook-murder/1908938
http://www.siliconrepublic.com/new-media/item/19987-teen-admits-killing-13-year






                  A 13 YEARL OLD GIRL WAS RAPED BY MEETING A GUY ON MYSPACE




A 13 year old girl was raped by a guy name Johnathan Cooper. Jonathan cooper was a member by a gang And motive is to get a victim on a social network. Currently he’s the sentencing phase for not only having sex with a 13-year-old girl (again, child rape in my opinion) but for also trying to get that girl to get him a 6-year-old girl that he could rape. It doesn’t end there though. The article is a never-ending tale of twit and turns that show what lengths Cooper would go to in order to have sex with just about anyone.


http://trenchreynolds.me/








    SOME ADVANTAGES OF SOCIAL NETWORK


               
        POPE SAYS THAT SOCIAL NETWORK HELPS SPREAD THE GOSPEL OF GOD


 Pope Benedict XVI invited Christians to join online social networks in order to spread the Gospel through digital media and discover "an entirely new world of potential friendships. He said also that "In the search for sharing, for 'friends,' there is the challenge to be authentic and faithful, and not give in to the illusion of constructing an artificial public profile for oneself," (POPE) http://www.catholicnews.com/data/stories/cns/1100274.htm In their online activities, he added, Christians also need to remember that "direct human relations remain fundamental for transmission of the faith" The pope said that believers can help prevent the web from becoming an instrument that "depersonalizes people, attempts to manipulate them emotionally or allows those who are powerful to monopolize the opinions of others." 
















Friday 1 July 2011

hackers


ACCESSING OTHER COMPUTER WITH PASSWORD




According to(http://pcworld.about.net/news/Apr022001id45726.htm)

One click on the mouse or just putting any storage devices in the computer 
with just meter away someone can access what files and data's you are putting in to your computer even if it has a protection or password. Even if you have many a dozen of any kinds of servers that protect your network, hackers can easily access through it with just some amount of typing in keyboard or commands in it. Whatever we do hiding in our files, hackers will do anything just to get into the systems. 


Q. So can other know what files and information you are hiding in your computer?




A. Yes.


Some hackers uses a program to get into other computers for accessing it. They run the program that cracked the file sharing password with just a blink of an eye. Some uses methods to attack machine or network. The popular ones is the demon dailer (which will redial a number repeatedly until a connection is made), the wardialer (an application that uses a modem to dial a thousands of random phone numbers to find another modem connected to a computer). 

Hackers can find tools for hacking in the internet. Just only search and download it. Many sites contains a dozens of free hacking software and instructions. While understanding how these tools work well it is not just easy many files includes homegrown documentation written in hacker shoptalk. Hackers also use the net to share a list of ip addresses. the only connection of internet connected computers with unpatched security holes.





GETTING THE IP ADDRESS OF OTHER PERSON'S COMPUTER




According to (http://whatismyipaddress.com/ip-address)

An ip address (internet protocol address) is a number assigned to a network that allows the device to communicate to other network or device via internet. Also it is a set of rules that govern the internet activity and facilitate what you are doing in the internet. It governs online communication by identifying both devices and internet destinations. An ip address are consists of four number. Each of the number is consists of one to three digits. Each of the number can range from 0-255. The single dot (.) seperating each number of the digits. For example, 216.27.61.197. This numbers is the key that empowers both users to send and receive their datas over their connections, assuming that their messages and data's will reach their destination correctly. 


2 types of ip address (source) http://www.spamlaws.com/ip.html


Dynamic address


Because there are only limited number of IP addresses, it is not possible for every computer that connects to the internet to have its own permanent ip addresses. They are simply not enough to go around. That's why some computer's uses dynamic ip address. Dynamic address are temporary and are assigned each time a computer accesses the internet. They are less security risk as the computer is assigned a new IP address each time the use log's on. It is like using a payphone, you can call out and it does not matter what number you are calling.


Static address


A computer that uses a static address always identifies itself by this one permanent ip address. For example, when you access the internet and you want to visit www. youtube.com, you type this address in the browser. Your computer takes the address and ask a domain name syster (DNS) server for the corressponding IP addresses for www.youtube.com. (In this way the DNS server acts like a phone directory. Your computer then uses this address to connect to the sever of www.youtube.com. Static IP Address is always permanent it never change.


Q.
So can hacker's can know what other computer is visiting online in the internet?

A.
precisely yes.


HOW HACKERS FINDS THE IP ADDRESSES OF THE OTHER USER


Source: (http://www.d3scene.com/forum/development/3676-tutorial-how-hack-someone-knowing-his-ip.html)


Like i said earlier, Ip Addresses is a set of rules that govern the internet activity and facilitate what you are doing in the internet. So when hacker know your Ip addresses, they might know what are your informations that you put in the internet (Social networking, Blogging, etc) Getting the IP (internet protocol) of a remote system is the most important to hack an ip address. IP address is the assigned number to each computer on a network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. For example 216.27.61.197 Now the first part of the numbers,
216 is the network number or  the network prefix. The second part, 27 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network. Other uses HTML they get the ip addresses of that website then hack it.














Monday 6 June 2011

beleifs and issues about the computers


MISCONCEPTIONS OR BELIEFS ABOUT THE COMPUTERS
    I frequently heard some of the beliefs and misconceptions on the computers. Most of them is true and most of them is not true or false. Perhaps we dont know some of the facts of it thats why we can say some beliefs that it is not true.

Common misconceptions of the computers:
  • Restarting computer will cause damage to it.
         Actually it can not cause damage to the computer but can help the computer function again smoothly. Like for example, corruption of files can cause computer to freeze, what we normally do is to press, CTRL + ALT + DELETE, to easily access to restart the computer. It can help the computer to reboot all the files that has been corrupted.

  • The faster the processor the expensive and better it is.
            Yes, we can say that the faster the processor the better performance it has. But when it comes to price it is not practical to buy a expensive processor. For example, the Pentium 4. It comes to the variety of speed of 2.8 GHZ which cost P8,000-P9,000 and the 3.8 GHZ which cost P12,000-P14,000. For a student like me 2.8 GHZ is enough for me. It can only cause P8k-P9k. The Pentium 4 with the speed of 3.8 GHZ will be too much for a standard user like me. So it is not true that the expensive the processor the faster and better it is.  

  • You need a good video card for watching DVD's and editing videos or pictures.
              Basically most of the people think that if you have a better and high video card, you can better see pictures more clearly. Actually it is not true, video cards are for gamers and for video animations only. If you are going only to watch DVD's and for editing pictures and videos 64 to 128 video card will be enough. Anything more than that is not practical.
              
       

ISSUES REGARDING THE COMPUTERS
  • MONITORS CAN CAUSE RADIATION AND MIGHT LEAD TO RISKS OF LIFE
             This is the most common we will hear especially to older ones. They will say that too much of using computers can actually hurt our internal organ and might effect to infertility. Well actually for me, computers has radiations but it is minimal. And also too much of using it can not cause infertility but sometimes it might lead to eye problems like blurring of eye sight and etc. 

  • APPLE MACS DONT GET VIRUSES
                Many of the people say that mac computers don't get viruses because of the OS was built not to have a virus. Basically it is true about the OS was built not to have a virus. But actually hackers can do or make a virus for mac OS. The only thing for   now that mac's don't have a virus because fewer users use macs. Hackers will not make a virus with a very less number of user of a computer. They make virus to a large number of users of computers.

  • CELLPHONES CAN CAUSE EXPLOSION TO GAS STATIONS
                 All of the gas stations you will see in the prohibited sections, no smoking, off the engine and turn of the cellphone. Basically it is not true and it has never happened in past times. They say that when you are using your cellphone, the battery in the back of it can produce a spark by the electromagnetic wave and it will travel through the air and it will cause a static electricity which lead to fire explosion. It is obviously not true. It can only happen when there is a friction or presence of touch between the battery and the gas fuel. Generally, it is not true. 






THATS IT! THANK YOU FOR READING MY POSTS ABOUT BELEIFS AND ISSUES ABOUT COMPUTERS! GOD BLESS! :)) 












EXTERNAL LINKS, http://www.snopes.com/autos/hazards/gasvapor.asp
http://tutorial-computer.com/info-comp-tech/180-frequently-computer-restart-cause
http://www.pcmech.com/article/computer-myths-and-misconceptions/



Wednesday 25 May 2011

history of computers

*HISTORY OF COMPUTERS by ronnier franz torres
 i studied about history of computers in my grade school, i think i was in grade 5 or 6. Well the first form of computer i learned  is the abacus invented by the chinese and that was 5,000 years ago. Also it is the first the manual data processing device which has a function to compute arithmetic computations which is used by manipulating the beads and the rods. I learned also the other type of computer is the pascaline invented by Blaise pascal in 1642. Pascal is only 18yrs old when he invented the pascaline and he is the son of a french tax collector. Well basically, the function of the pascaline i studied was only addition.


CHARLES BABBAGE (dec 26 1791-octo 18 1871)The computers as we seen today began with an English mathematics professor, and also the father of computer was Charles Babbage. Babbage's first attempt to solve a problem was proposing a machine to perform differential equations. He called it Difference Engine. After working in this device for 10 years, babbage suddenly inspired to begin work on the first general purpose computer, which he called it the Analytical Engine.


*EAM (electromechanical accounting machine)
it gaves the new age of inventions through the use of electromechanical devices such as the electric relays switches.









*ABC (Atanasoff-Berry Computer)
ABC was invented by John V. Atanasoff. Electronic digital computer together with his friend clifford berry, built a prototype of an "electromechanical digital computer" (formerly called before ABC). it is used for electronic vacuum tubes for computation.





*ENIAC (Electronic Numerical Integrator and Calculator)
was the first purpose invented, all electronic digital computer. It was built by John Presper Eckert, jr and John W Mauchly. And ENIAC introduced to the world the FIRST GENERATIONS OF COMPUTERS.

 and that is the reasons why the series of the generations of the computer began and introduced.





*GENERATIONS OF THE COMPUTER


First generation computers (1951-1959)
With the beggining of the korean war in 1950, the different kinds of computations not only the arithmetic functions, increases greatly. UNIVAC was first introduced in 1951, it is the first commercial computer. The use of the vacuum tubes was the major innovation in replace of replays as means of storing data in memory and also the stored-program concept. I understand also that the vacuum tubes made the computers so much faster and powerful than any of its predecessors, (processors) that it has a several faults or mistakes.



Second generation computers (1959-1964)
In this generations i think the computers made smaller, faster and more reliable for specific task and much greater capacity. Solid state components (transistor and diodes) and alos the magnetic core made the second generations of the computers. The transistors performs the same function as a vacuum tubes except that electrons move through solid materials instead of through the vacuum. Built in error detecting devices were installed and more important things were developed to easily store input/output devices and retrieve data from the computer.



Third generation computers (1965-1970)
In this generation the Intergrated solid-state circuitry improved the secondary-storage devices, and also new input/output devices were the most important advances in this generations.

Here are the first integrated circuits:

  • Small-Scale Integrated circuits (SSI), it can have a 10 devices per circuit.
  • Medium-Scale Integrated Circuits (MSI)
  • Large Scale Integrated Circuits (LSI), it can have a thousands of transistors on a single chip. 





Fourth generation computers (1970-Present)
The major innovations and changes happened in this generation. For example the development of microelectronics and in the development of the computer technology such as the multiprocessing, multiprogramming and the memory storage capacity. The use of INTEL developed in this generation. Because of the microprocessor, this generation includes large computers in the past generations made faster, much less expensive, and of much greater data processing capacity than the sized of the past generations specifically the third generation computers.




Fifth generation computers (present-future) Artificial Intelligence
Many computers in this generations were fully developed when it comes to different areas of the system of computers such as the processors made faster, the memory capacity made it super large that even a multi-files can fit. I think the goal of this present generation is to make a computer more capability for learning purpose like the World Wide Web(www) and internet of course, a multitasking program and also self organizations.




THATS IT, THANK YOU FOR READING MY PROJECT IN COMPSCI ABOUT THE HISTORY OF COMPUTERS.!! GOD BLESS. :)
 reference my books