585 IS Brueland Anjanae Assignment 3

advertisement
IS 585
Brueland Anjanae Assignment 3
Points: 100
Due: Nov. 13, 11:59 pm.
1. Mobile Learning
1. What are the four key problems associated with mobile-Learning discussed in
“Mobile Learning using Mobile Phones in Japan” article? (4)
1. Technology
2. Content design
3. Uniqueness of device
4. Psychological issues
2. Do you think the same problems are applicable to the US? If yes, why? If no,
why not? (4) Yes. Well, one of the projects took place in Stanford University in
California with similar results. But mainly because the key problems are
universal, not limited to culture or geographic location.
3. Present any mobile-Learning application used by libraries in the US. Make sure
to give screenshots and list key features of the application. (4)
Tutor.com used by Sevier County Public Library System is mobile. Available on the iPad, iPod
and iPhone.
Key Features are:
 Study resources – Lessons, worksheets, study guides and videos
 Test prep resources – ACT, SAT, etc
 Career resources
 One to one tutor sessions from 12pm to 12am EST everyday
 Ability to upload documents and photos
 Ability to save past sessions
Screenshots of some of the features of Tutor.com
Screenshot of inside Study Resources Search: Math/Elementary/Number Facts; displaying the
resource results.
2. Library 2.0 & Social Media
1. Illustrate six essential steps for transforming traditional libraries to Library 2.0.
(12)
1. Identify what is going wrong – Issues; Challenges
2. What does the community want and need
3. Requires change in mission and the handling of authority – Unfreezing –
Showing needs, implementing change, Freezing – Institutionalization the
change
4. Is the technological agility available
5. What financial resources are available, if any
6. What is currently being done
2. Illustrate any four Web 2.0 technologies that can be used in the library setting of
your choice. (8)
1. Make sure to give key background information about the library setting
of your choice. (2)
Sevier County Public Library System is a level 5 library system with a service
population of ~89,000. It consists of three libraries and one satellite. The
location, hours and services offered by each library is shaped by the local
community it serves. This input is received via surveys, community forums,
assessment of services already in place and staff interaction with the community.
Approximately four years ago the system adopted the tag line to ‘…its about
more than books’ as the need to change the perception and increase our methods
of interacting/engaging with our community. Since then we have secure more
of the technological agility needed to implement these changes through our
hiring practices and requirements. Every year a budget is allocated to further
develop how we reach and engage our community as well as maintain our
networks. Currently we make use of the web 2.0 technologies blogging,
Facebook, Pinterest and youTube. Our blog is used to capture and showcase the
events that have taken place at the library. Facebook is used notify users of all
upcoming events, general notices, book clubs post questions for discussion and
other points of interest with the system as its main focus. Our Pinterest account
provide another way to connect to our community via crafts, quotes and other
general interests. Our youTube channel is used to provide video clips on “How
to” or a library tour. We plan to have video so patrons can listen to a story time
if they cannot be there. These are just a few ways we are using some of the web
2.0 technologies in our library system.
3. Cloud, Parallel, and Distributed Computing in Information Environments
1. Discuss any three key features of Hadoop. (6)
Three key features of Hadoop are its accessibility, robustness and simplicity. Hadoop runs on
large clusters of commodity machines or on cloud computing services making is accessible.
Hadoop is robust in that it is intended to run on commodity hardware (Computer hardware that
is affordable and easy to obtain). It is architected with the assumption of frequent hardware
malfunctions therefore handling most such failures. Finally Hadoop’s simplicity allows users to
quickly write efficient parallel code.
2. What are the three distinct types of cloud computing services? (6)
1. Private cloud – functions solely for one organization on a private
network and is highly secure.
2.
Public cloud – is owned by the cloud service provider and offers the
highest level of efficiency of shared resources.
3. Hybrid cloud – is a combination of the private and public cloud
deployment models. In a hybrid cloud specific resources are run or used
in a public cloud and others are used or run in a private cloud. This
provides increase efficiency and security where needed most.
3. Define parallel computing and give any two advantages of it. (4)
1. Parallel computing is when a task is given to multiple processors within
one computer. Two advantages of parallel computing are high speed
processing and reduction in power consumption.
4. Define distributed computing and give any two disadvantages of it. (4)
1. Distributed computing is when a problem is divided into many tasks,
each of which is solved by one or more computers, which communicate
with each other by message passing. Two disadvantages of distributing
computing can be the difficulty in troubleshooting and security issues due
to the number of remote nodes and/or the connections of these nodes.
4. IT Outsourcing & Programming
1. Discuss two advantages and two disadvantages of outsourcing library services.
(8)
ADVANTAGES:
Outsourcing library services can provide expertise not in employee pool
such as IT. For example, this can allow for the organization to have a website
designed and maintained without the expense of having the developer on staff.
This has a value added advantage that it can provide a freeing up of time and
resources with regards to management, as they can notify the ‘expert’ of the
issue and then move on the next item at hand.
DISADVANTAGES:
Outsources can be viewed by employees of the organization in a negative
manner. Some may perceive that outsourcing is a reflection on the financial
strength of the organization. That cuts are needing to be made and that jobs
may be on the line. It is important that management address this with
employees before the outsourcing begins. Another concern many may have is
with the security of the information that will be handled. It needs to be
addressed who and how personal data will be handled.
2. Explain any three paradigms of programming languages using examples. (9)
1. Imperative (or procedural) paradigm – Emphasizes linear steps that provide
the computer with instructions on how to solve a problem or carry out a
task. Examples are BASIC, Pascal, COBOL, Fortran, and Ada.
2. Applicative (or functional) paradigm – Emphasizes the evaluation of
expressions, called functions. Examples are LISP, Scheme and Haskell.
3. Object-oriented paradigm – Formulates programs as a series of objects and
methods that interact to perform a specific task. Examples are Smalltalk,
C++, Java and Scratch.
5. Software Security & Piracy
1. Explain the following terms with examples.
1. Botnet (3) – A group of bots (intelligent agents that autonomously
execute commands behind the scenes) under the remote control of a
botmaster, used to distribute spam and denial-of-service attacks.
EXAMPLE – Kelihos Botnet - also known as Hlux, is a botnet mainly
involved in the theft of bitcoins and spamming.
2. Shrink-wrap license (3) - A legal agreement printed on computer
software packaging, which becomes binding when the package is opened.
EXAMPLE –
3. Malware (3) – Malware is short for "malicious software." Malware is any
kind of unwanted software that is installed without your adequate
consent. EXAMPLE - Viruses, worms, and Trojan horses are examples
of malicious software that are often grouped together and referred to as
malware.
4. Trojan (3) - Trojan may give a hacker remote access to a targeted
computer system. EXAMPLE - Zeus is a Trojan horse that steals
banking information by Man-in-the-browser keystroke logging and
Form Grabbing. Zeus is spread mainly through drive-by downloads and
phishing schemes.
5. Worm (3) - A computer worm is a standalone malware computer
program that replicates itself in order to spread to other computers.
Often, it uses a computer network to spread itself, relying on security
failures on the target computer to access it. EXAMPLE - The Morris
worm or Internet worm of November 2, 1988 was one of the first
computer worms distributed via the Internet.
6. Quarantine (3) - To move an undesired file such as a virus-infected file or
spyware to a folder that is not easily accessible by regular file
management utilities. The quarantine option is available in antivirus
software so that companies can keep a record of which users have been
infected, where the file came from and to possibly send the virus to the
antivirus vendor for inspection. EXAMPLE – Norton Antivirus has the
ability to quarantine suspected virus-infected files.
7. Zombie (3) – A computer that has been compromised by malware that
allows it to be controlled by a remote user. EXAMPLE - Zombies can be
used to conduct distributed denial-of-service attacks, a term which refers
to the orchestrated flooding of target websites by large numbers of
computers at once. The large number of Internet users making
simultaneous requests of a website's server are intended to result in
crashing and the prevention of legitimate users from accessing the site.
In 2000, several prominent Web sites (Yahoo, eBay, etc.) were clogged to
a standstill by a distributed denial of service attack mounted by a
Canadian teenager.
6.
See “Issue: How Serious is Software Piracy?” on page 170 of recommended text
1. Do you believe that software piracy is a serious issue? Why? (2) Before
reading the article, I did not feel that software piracy was an issue that
affected me in any real way. Now, I am not so sure. Software needs to be
affordable and shared. Sharing of information and resources is important for
me. I will wonder however if the next time I am on hold for tech support if
one of the reasons I am on hold is because the company’s lost revenues meant
another CS rep could not be hired. I guess my need for sharing the
information and resources out ways profit, therefore I do not see it as a
‘serious’ issue.
2. Do you know any instances of software piracy? (2)
Probably. In my university days I can remember sharing music. The
thought of piracy never crossed my mind. I wanted to share the music and so
it made sense to let people borrow the CD, but I never asked them or told
them that they could not rip the CD.
3. Do you think that most software pirates understand that they are doing
something illegal? (2)
I think it depends of education and technical level. My son is 6 and knows
about piracy. I do not think piracy registered with me until my late twenties.
4. Should software publishers try to adjust pricing for local markets? (2)
This may prove to be helpful. For the instances of privacy in the US I would
say that a good deal would be around high school and college student where
expense plays a big role in the decision. Not to mention ease. Another
consideration would be ease. If the student needs the software now and only
for one or two projects that perhaps paying for a 90 day download that
provides full functionality. Afterwards they can view the work only.
Download