Wednesday, May 6

Hw #14 Technology Tip Terms:

  1. MIMi:Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of e-mail to support:Text in character sets other than ASCII ,Non-text attachments ,Message bodies with multiple parts and Header information in non-ASCII character sets.

  2. PDF:Stands for "Portable Document Format." PDF is a multi-platform file format developed by Adobe Systems. A PDF file captures document text, fonts, images, and even formatting of documents from a variety of applications. You can e-mail a PDF document to your friend and it will look the same way on his screen as it looks on yours, even if he has a Mac and you have a PC.
  3. Queue:To avoid any confusion, this term is pronounced exactly like the letter "Q". It is not pronounced "kay" or "kyoo-ee" like some people seem to think it is. A queue is a list of jobs that are awaiting to be processed. When when a job is sent to a queue, it is simply added to the list of jobs. Computer programs often work with queues as a way to order tasks. For example, when the CPU finishes one computation, it will process the next one in the queue.

  4. Webmail:There are two primary ways of checking your e-mail – using an e-mail program like Microsoft Outlook or with a Web-based interface called webmail. When you check or send e-mail via the Web, you are using webmail. Most free e-mail services, such as Gmail, Hotmail, and Yahoo! Mail offer webmail interfaces that allow you to send, receive, and organize your e-mail on the Web. If you own a domain name, many Web hosts also offer a webmail interface to use with your domain name or website. Some common webmail systems supported by Web hosts include Horde, NeoMail, and SquirrelMail.

  5. Offline:When a computer or other device is not turned on or connected to other devices, it is said to be "offline." This is the opposite of being "online," when a device can readily communicate with other devices. For example, if you try to print to your printer and you get one of those frustrating errors saying, "The specified printer could not be found," the printer is probably offline. You should check to see if the printer is connected properly and, yes, turned on as well.

Hw #14 Signs of a Coming Wireless Price War:

In the article"More Signs of a Coming Wireless Price War" By Saul Hansell on the New York times at He states that most of the cellphone customers are getting prepaid plan for their phones instead of postpaid ones. he explains that the reason for this is that postpaid phone contracts are very expensive and prepaid ones are cheaper such as 50 dollars a month for a year or two.

Wednesday, April 29

Hw #13 More Technology Terms:

  1. Localhost: refers to the local computer that a program is running on. For example, if you are running a Web browser on your computer, your computer is considered to be the "localhost."

  2. Native File: When you save a file using a certain program, the file is often saved in a proprietary format only that program can recognize. For example, if you save a Microsoft Word document, it is saved as a Word document (i.e. mydocument.doc).

  3. OASIS: Stands for "Organization for the Advancement of Structured Information Standards." To someone backpacking through the Sahara, this is not the type of OASIS you want to see. But is it a welcome sight in the computer science world.

  4. webmaster: the webmaster (a portmanteau of web and Postmaster), also called the web architect, the web developer, the site author, the website administrator, or (informally) the webmeister, is the person responsible for designing, developing, marketing, or maintaining a website

  5. Path: a path is the general form of a file or directory name, specifying a unique location in a file system. A path points to a file system location by following the directory tree hierarchy expressed in a string of characters in which path components, separated by a delimiting
    character, represent each directory.

Hw #13 Adobe reshaping online video:

In the Article "Adobe Wants to Reshape Online Video" by Eric A. Taub on the New York Times at He States that Adobe want to fix the online Video to make it more searchable, so users can be a certain portion of the video that they are interested in. he also points out that making flash Video format for the internet would be the great use for consumers nowadays.

Wednesday, April 22

Hw #12 Film Makers

In the article "Italians Look to Small Screen " by Elisabetta Povoledo on the New York Times at She States that the Filmakers developed Three short movie for the Web in Italia.

Hw #12 Terms: for Tech:

  1. Partition: Disk partitioning is the act or practice of dividing the storage space of a hard disk drive into separate data areas known as partitions.


  2. Gateway:A Gateway is a link between two computer programs or systems such as Internet Forums. A gateway acts as a portal between two programs allowing them to share information by communicating between protocols on a computer or between computers.

  3. Telnet:Telnet (Telecommunication network) is a network protocol used on the Internet or local area networks. It was developed in 1969 beginning with RFC 15 and standardized as IETF STD 8, one of the first Internet standards. Typically, Telnet provides access to a command-line interface on a remote machine.

  4. X86:The generic term x86 refers to the most commercially successful instruction set architecture[1] in the history of personal computing. It derived from the model numbers, ending in "86", of the first few processor generations backward compatible with the original Intel 8086.

  5. Peripheral:A peripheral is a device attached to a host computer behind the chipset whose primary functionality is dependent upon the host, and can therefore be considered as expanding the hosts capabilities, while not forming part of the system's core architecture.

Hw #11 Web Video on TV Sets:

In the article "Adobe in Push to Spread Web Video to TV Sets" by Brad Stone on the New York Times He states that Adobe want to bring Web Video into TV using flash. He also states that flash is one of the powerful web Video which is incorporated in most of the Phone that's why they want to bring it on TV as well.

Hw #11 Terms for the new Era:

  1. MacAddress:
    Stands for "Media Access Control Address," and no, it is not related Apple Macintosh computers. A MAC address is a hardware identification number that uniquely identifies each device on a network.

  2. Megahertz:One megahertz is equal to one million cycles per second. It is used to measure transmission speeds of electronic devices. The most common area you will see Megahertz used is in measuring processor clock speed, such as an 800 Mhz Pentium III.

  3. Metadata:Metadata describes other data. It provides information about a certain item's content. For example, an image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, and other data.

  4. Modem:The word modem is actually short for Modulator/Demodulator. (There's something you can really impress your friends with). A modem is a communications device that can be either internal or external to your computer.

  5. Banner:A web banner or banner ad is a form of advertising on the World Wide Web. This form of online advertising entails embedding an advertisement into a web page. It is intended to attract traffic to a website by linking to the website of the advertiser.

Hw #10 Raising Internet Price:

In the article "As Costs Fall, Companies Push to Raise Internet Price" by Saul Hansell in the new york times at,%20Companies%20Push%20to%20Raise%20Internet%20Price&st=cse . He states that the internet service providers want to increase their fees. He also states that telephone company and cable company charge more for their services than the internet services providers.

Hw #10 Terms to keep posted:

  1. ASCII:Stands for "American Standard Code for Information Interchange." ASCII is the universal standard for the numerical codes computers use to represent all upper and lower-case letters, numbers, and puctuation. Without ASCII, each type of computer would use a different way of representing letters and numbers, causing major chaos for computer programmers (allowing them even less sleep than they already get).

  2. Certificate:An SSL certificate, or secure certificate, is a file installed on a secure Web server that identifies a website. This digital certificate establishes the identity and authenticity of the company or merchant so that online shoppers can trust that the website is secure and reliable. In order to verify that these sites are legitimate (they are who they say they are), the companies and their websites are verified by a third party, such as Verisign or Thawte

  3. Chip:Technically speaking, a computer chip is a piece of silicon with an electonic circuit embedded in it. However, the word "chip" is often used as a slang term that refers to various components inside a computer. It typically describes an integrated circuit, or IC, such as a central processor or a graphics chip, but may also refer to other components such as a memory module.

  4. CMOS:Stands for "Complementary Metal Oxide Semiconductor." This technology is typically used in making transistors. The "complementary" part of the term unfortunately does not mean these semiconductors are free. Instead, it refers to how they produce either a positive or negative charge.


  5. Parse:In the computing world, when people talk about their computer configuration, they are referring to the technical specifications, or the "tech specs" of their computer. These specs typically include processor speed, the amount of RAM, hard drive space, and the type of video card in the machine. No, this is not a typo of the word "sparse." The word "parse" means to analyze an object specifically. It is commonly used in computer science to refer to reading program code.

Wednesday, April 1

Hw #9 Useful Terms:

  1. Conficker:Conficker is a malicious worm that has so far infected 9 million Windows-based PCs since it was a first detected in October 2000. by
  2. Worm:A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targetedcomputer.
  3. Patch: a fix for a software program where the actual binary executable and related files are
  4. A backdoor: in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware
  5. Botnet: is a jargon term for a collection of software robots, or bots, that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing software. by

Hw #9 News: Conficker Worm:

In the article" Experts See Early Activity From Conficker Worm" by John Markoff,at in the New York Times.He states that a very dangerous virus called Conficker could take place today on April 1st 2009. He also state that this malicious virus is powerful enough to affect those huge powerfull servers such as goverment agencies and it deletes all the data in the computers that it infects. Also, He states that Microsoft is offering a reward of 250,000 dollars to find the Author of Conficker.

Wednesday, March 25

Hw #8 Interesting Computer Terms:

  1. clone: is a hardware or software system that is designed to mimic another system. Compatibility with the original system is usually the explicit purpose of cloning hardware or low-level software such as operating systems. by

  2. Visual Basic:(VB), formerly called Visual Basic .NET (VB.NET), is an object-oriented computer language that can be viewed as an evolution of Microsoft's Visual Basic (VB) implemented on the Microsoft Net framework.

  3. Ping: tool used to test whether a particular host is reachable across an IP network; it is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies. by

  4. screen pop:is a feature of a computer telephony integration (CTI) application that automatically displays all of the relevant caller and account information on a call center agent's screen during a call. by,,sid9_gci1211808,00.html

  5. password cracker: is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a human cracker obtain unauthorized access to,,sid185_gci536994,00.html

Hw #8 Media Companies, Beware the Priceline

In the article “Media Companies, Beware the Priceline Negotiator”, by Saul Hansell on the New York time at He states that companies that used to charge a fee for their services such as Priceline when you purchases tickets online are changing their procedure to increase market sales. Therefore, these companies are not making any charge in ticket purchasing to increase sales. This is a good way to grap customers and increase revenues.

Tuesday, March 17

Hw #7 Best Key Terms:

  1. GUI: (Graphical User Interface) ” Computer display format that allows the user to select commands, call up files, start programs, and do other routine tasks by using a mouse to point to pictorial symbols (icons) or lists of menu choices on the screen as opposed to having to type in text commands. “, by
  2. MS-DOS:” short for Microsoft Disk Operating System) is an operating system commercialized by Microsoft. It was the most commonly used member of the DOS family of operating systems and was the main operating system for personal computers during the 1980s.”, by
  3. IPCONFIG: (Internet Protocol Configuration) in Microsoft Windows is a console application that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol DHCP and Domain Name System DNS settings.” by
  4. Scribd: “ is a document-sharing website and top 20 Social Media site.Scribd currently has more than 50 million monthly users and more than 50,000 documents are uploaded daily “, by
  5. Spyware:” is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.” by,,sid14_gci214518,00.html

Hw #7 Passwords exposed on ComCast

In the article “Passwords of 8,000 Comcast Customers Exposed” by Brad Stone posted at in the New York Times. He states that some passwords information for the users of the Comcast were revealed online, which could cause a lot of problems to the users due to the fact that users could have the same passwords in other accounts such as emails. He explains as an example that someone could get access to someone email account and stealing personal information from there such as credit cards. He also, states that Comcast did apology to their customers and remarked that it was not their fault that he was a phishing scheme. What do you think? can we trust in this company?

Sunday, March 8

Hw #6 Another Five more Key words:

  1. Sxipper: ” is a free Firefox add-on that saves you time by keeping track of an unlimited number of usernames and passwords as well as the personal data you share every day over the web “, by
  2. VOIP:” is a general term for a family of transmission technologies for delivery of voice communications over IP networks such as the Internet or other packet-switched networks.”, by
  3. Trojan:” in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save their files on the user's computer or even watch the user's screen and control the computer.” by
  4. Telnet: “is a deprecated protocol used to remotely log in to another computer or some communication equipment (usually running some UNIX variant) over a network. The telnet protocol offers no security, sending all communications, including passwords, over the wire in plain text “, by
  5. Denial-of-service:” attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include attempts to "flood" a network, thereby preventing legitimate network traffic” by

Hw #6 Police take the fight onto the web

In the article “Police Take the Fight onto the Web” by Brad Stone posted at in the New York Times. He states that the police is using the internet to find people who commit crimes. He informs that a lot of police agencies are using the web to fight crimes. For example;” posted on Facebook images from a surveillance video that showed three teenagers vandalizing the spa at a local Hilton.” He explains that some teenagers were arrested because they committed a crime and posted on facebook web site. So, with the help of facebook that was easy for the police to find the teenagers who committed the crime. Therefore, the police agencies are using the web as a tool to fight against crimes from wherever point in the globe they are.

Tuesday, March 3

Hw #5 Five new Key Terms:

  1. Ruby “A dynamic, open source programming language with a focus on simplicity and productivity. It has an elegant syntax that is natural to read and easy to write” , by

  2. Bittorrent “is a peer-to-peer file sharing protocol used for distributing large amounts of data. BitTorrent” is one of the most common protocols for transferring large files, and by some estimates it accounts for about 35% of all traffic on the entire Internet.”, by

  3. ActionScript “is a scripting language based on ECMAScript. ActionScript is used primarily for the development of websites and software using the Adobe Flash Player platform”, by

  4. POP Post Office Protocol ” is an application-layer Internet standard protocol used by local e-mail clients to get e-mail from a remote server over a TCP/IP connection “ , by

  5. FTP (File Transfer Protocol).”It's a way for you to move files from one computer to another. It's commonly used for transferring web files you're working with on your local computer up to DreamHost's server so that they're accessible via the Internet.” by

Hw #5 Chip Makers watch sales fall sharply

In the article “Chip Makers Watch Sales Fall Sharply” by Ashlee Vance posted at in the New York Times. She states that some companies that make the chips for electronic devices such as cell phone, iPod etc. their sales are declining drastically due to the fact the recession is affecting their product sales. For example,” Consumers have benefited from some of the underlying turmoil”. She explains that Computer companies needed to sale their products to the consumers and in order to do that they needed to lower the prices as a way to attract customers and increase their profits. Even though, they are trying to increase their sales it won’t be as previous years. Therefore, I would recommend to anyone that needs to purchase any electronic devices to do it now because the good deals don’t last forever.

Tuesday, February 24

Hw #3 Article Sumary and Review

In the article “Microsoft Searches for Group Advantage” by Robert Lemos at . He states that Microsoft is trying to improve its search Engine to compete with Google. He also explains that Microsoft is trying to incorporate a new method of algorithm for its search engine, such as tapping from other groups to improve the search result of the information desired.

This article is very informative about what is occurring in the real world nowadays. It would be the great help for this class to know about this article; especially because we as a user have to use search engines in a daily basic. Therefore, to know that Microsoft is trying to offer users some of the capabilities that Google offers us with its search engine, it would be of enormous support because we would have more search engines to choose from; especially when we are looking for better and quicker search results.

Hw #:2 Key Terms:

  1. Hacker: a person who breaks into computers.

  2. SQL: Structure Query Language used on database used to retrieve and manager information in databases.

  3. HTTP: “Hypertext Transfer Protocol, it is an application-level protocol”, by

  4. JavaScript is a language script used on the client side (browser).

  5. DOM:” The Document Object Model is a platform- and language-independent standard object model for representing HTML,” by

  6. RSS:” (Rich Site Summary) is a format for delivering regularly changing web content. Many news-related sites, weblogs and other online publishers syndicate their content as an RSS Feed to whoever wants it”, by

  7. AJAX: stands for JavaScript and XML. It is a group of application used to create dynamic web application.

  8. API: Application Programming Interface, It is a set of structure, subrouting classes and objects.

  9. PayPal:” It is an e-commerce business allowing payments and money transfers to be made through the Internet.” by

  10. PHP: it stands for Personal Home Page. It is scripting language used to create web pages. It works on the server side.

The way I researched these key terms was: First I used Google to search the key terms due to the fact that this search engine provides more options to pick from. However, I noticed that most of the results were taking me to Therefore, I continued using Wikipedia site because I realized that it was providing me all the information needed to learn about these terms.