Tuesday, March 29, 2011

ONLINE GAME



Have u ever heard of online game?

I think, it was not a new thing anymore because almost every people play game. A game is a structured activity, usually undertaken for enjoyment and sometimes used as an educational tool. Games are distinct from work, which is usually carried out for remuneration, and from art, which is more concerned with the expression of ideas. A game can also be distinguished from play which is usually unstructured, and a puzzle which requires a strong mental concentration and is undertaken alone.

From the very earliest days of networked and time-shared computers, online games have been part of the culture. Modern online games are played using an Internet connection; some have dedicated client programs, while others require only a web browser. Some simpler browser games appeal to demographic groups (notably women and the middle-aged) that otherwise play very few video games. 

Example of online games...










Tuesday, March 22, 2011

...HOW SMS WORKS??...

~mObile phOnes~

do you ever had these gadgets? 
I'm sure you all have it... 
without these gadgets, life is meaningless...
Wow, is that true? 
Ermmmm, I think the answer is 'YES'




but I don't want to talk about those gadgets....
the main point here is..
when you text message to people..








did you really know how the SMS been sent to the mobile phones?
and why the SMS takes time to been sent to the recipient??
here it is...
even you are not talking to your mobile phone..
the information that you send & receive are move through the...


~ CoNTRoL CHaNNeL~


1st reason...
your mobile phone system knows which mobile phone is in...
to change cells as you move around...
2nd reason...
control channel used for call setup..
when people calls you..









the tower sends message to your mobile phones over control channel..
then..
 it tells your phones to play ringtones
&
the tower gives a pair of voice channel frequencies to use for call


~ CoNTRoL CHaNNeL~


..also..
provides pathway for SMS messages



when people send you an SMS...



it flows through this pathway..
message -> SMSC -> tower-> your mobile phone (as a little packet of data)

it is same when you send a message..








the pathway...
your mobile phone -> tower -> SMSC-> its destination





Diagram of the path of an text message
HOW SMS WORKS?




that's all for now..


see you in the next topic!!



BYE2!!



Wednesday, March 16, 2011

~Organizational Information Flow~

FUNCTIONS OF AN ORGANIZATION IN AN INFORMATION SYSTEM

  • information flows vertically & horizontally throughout an organization
  • there are 5 functions:


~ACCOUNTING~

~MARKETING~

~HUMAN RESOURCES~

~PRODUCTION~

~RESEARCH~

ACCOUNTING INFORMATION SYSTEM (A.I.S)

-study & practice of  accounting ( design, implementation, monitoring of information   
   systems)

-systems use modern information technology resources + traditional accounting controls + methods to provide users the financial information

A.I.S + TECHNOLOGY

INPUT: associated with A.I.S include-:
  • standard personal computers/ workstations running application
  • scanning devices for standardized data entry
  • electronic communication devices for electronic data interchange (EDI)
  •  e-commerce
  • "Web-enabled’’ - allow devices to connect to the World Wide Web

PROCESS 
  • ranging from individual personal computers to large-scale enterprise servers
  • conceptually, the underlying processing model is still the ‘‘double-entry’’ accounting system initially introduced in the 15th century

OUTPUT
  •  output devices include:
      -computer displays, impact and nonimpact printers
      -electronic communication devices for EDI 
      -e-commerce

  • output content - financial reports from budgets & tax reports to multinational financial statements



MARKETING INFORMATION SYSTEM (M.I.S)

-set of procedures & practices employed in analyzing & assessing marketing information  
 system
-provides basis for decisions such as product development / improvement, pricing, 
 packaging,distribution, media selection & promotion

-component of M.I.S :
  1. internal reporting systems
  2. marketing research systems
  3. marketing intelligence systems
  4. marketing models



HUMAN RESOURCES (H.R.I.S)

  • software / online solution for data entry, data tracking & data information needs of the Human Resources
  • better H.R.I.S provide:


  1. management of employee information
  2. reporting & analysis of employee information
  3. company related documents such as employee handbooks
  4. applicant tracking & resume management




PRODUCTION INFORMATION SYSTEM
  • manufacturing subsystem that includes all functions required to design, produce, distribute, & service a manufactured product
  • current production applications :


  1. electronic catalogs
  2. website / webshop content
  3. product catalog


RESEARCH INFORMATION SYSTEM
  • involves the use of qualitative data, such as interviews, documents & participant observation data, to understand and explain social phenomena   
  • in Information Systems,  a general shift in IS research away from technological to managerial & organizational issues 


Monday, March 7, 2011

Privacy & Security

COMPUTER CRIMES
Definition
- crime activities, involve the use of the use of information technology to gain an illegal or an 
   unauthorized access to a computer system with intent of :
        -damaging
        - deleting  
        -altering computer data
- include the activities like electronic frauds, misuse of devices, identity theft, software theft 
   and data as well as system interference 


Types of computer criminals


-these are some types of computer criminals :


1) Hacking
2) Cracking
3) Computer viruses
4) Cyberstalking
5) Identity theft




1) HACKING


-breaking into a computer system or defeating security capabilities to gain an unauthorized   
  access 
-e.g. hacking of IP addresses in order to transact with a false identity
-known as hackers
-hackers generally deplore cracking


Images of hacking




2) CRACKING


- breaking into a computer system often a network to point out weaknesses in a site's security 
  system
-by passwords / license in a computer programs / breaches computer security
-known as cracker




3) COMPUTER VIRUSES


- can replicate themselves and harm the computer systems on a network without the 
   knowledge of the system users




Images of computer viruses
-viruses spread  through network file system,  network, 
  Internet or by the removable devices like USB drives and 
  CDs
-it forms of malicious codes written with an aim to harm a 
  computer system and destroy information
















4) CYBERSTALKING
Images of cyberstalking


-use of communication technology,like Internet, to torture other individuals
-cyberstalking activities include :
       -false accusations
       - transmission of threats and 
       -damage to data and equipment 
-cyberstalkers target the user at the chat room, online forums and social networking websites 
  to gather and harass the user information




5) IDENTITY THEFT


-involves stealing money and obtaining other benefits through the use of a false identity 
-act of pretending to be someone else by using someone else's identity as one's own
-financial identity theft involves the use of a false identity to obtain goods and services
Images of identity theft

                                           
-commercial identity theft is the using of someone else’s business name or credit card details 
  for commercial  purpose
-identity cloning is the use of another user's information to pose as a false user
-e.g. illegal migration, terrorism and  
         blackmail 




REFERENCES :
 a)  http://www.buzzle.com/articles/types-of-computer-crimes.html
 b)  http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211852,00.html