Tuesday, November 18, 2014

End of year exam

1-      Give three examples of expert systems and explain clearly why they are expert systems and how they are different from other AI software.
2-      How would you evaluate a simulation? What criteria would you use?
3-      Explain, giving clear technical details, why each of the following situations would happen:
a.       You attempt to load an Internet page and the browser returns “DNS not found”
b.      You type a URL and the browser returns “Access denied”
c.       The Internet is running very slowly and you change the proxy server settings in the browser and it goes faster. 
4-      How is e-commerce different from normal physical stores and shops? What needs to be taken into account when setting up an e-business?
5-      Choose one of the optional topics in the list and explain the implications of the technological developments in that area. The answer should address each off the following:
a.       Area chosen
b.      Description of technological development
c.       How it impacts that area, effects, changes.
6-      A friend of yours is worried that his company, which specializes in keeping medical records for their customers, might be vulnerable to hacking attacks. What countermeasures can be put in place for your friend not to worry about these attacks. Focus both on how to prevent the break in as well as to how eventually to recover if security is compromised.
7-      Give examples of when you would use data encryption, as well as of two methods that can be used for such purposes.

8-       A restaurant has two branches and a warehouse where they keep all supplies. At their downtown site they have a small restaurant and their central office. The restaurant has two computers where they register what each table orders, and prints invoices. These computers are connected to the warehouse, where one computer monitors the level of supplies that are need for each branch and handles stock control. In this same downtown branch there are three networked computers at the office, where they coordinate purchases, advertising, marketing and other administrative functions. Then the restaurant has another branch at the local airport, where two computers are used for the orders and tables and another computer at a back office is sued for all other administrative purposes. Using the  Interactive Network Design Simulator, design the network, adding printers as needed, explaining how the three sites are connected.

When you finish, send your test as a Word document to itgs.sass@gmail.com 

Thursday, October 16, 2014

5 Technologies that will change the world

The subsequent and final assignment consists in compiling information to write a book on "The 5 Technologies that Will Change the World".

In order to do that we must, collectively:

- Select these 5 technologies based on what you have researched for your previous assignment.
- Create a common structure for the chapters.
- Choose the best collaborative platform to carry out the project.
- Investigate the roles entailed in the process of writing a book.
- Assign roles and responsibilities.
- Plan stages and deadlines.




Thursday, September 4, 2014

AI Test

  1. What defines a robot? Explain how a robot can be different to an automated process.
  2. Giving examples, explain how an expert system is a particular type of AI system.
  3. Using appropriate technical terms, explain how the evolution of AI can lead to developing feelings for robots and the potential impact and consequences.
  4. What is the Turing test? What is it applied for? Try to find a very common application of the Turing test that users have to undergo very frequently.
  5. Can robots eventually turn against humans and dominate Earth? Discuss.
  6. Why are scientists analyzing animal systems to try to develop more advanced AI software?

Send Word file to itgs.sass@gmail.com 

Thursday, July 3, 2014

Robotics

Our next topic will be Robotics, and our goal is to analyze the various applications on robotics in modern society as well as the ethical and social implications of a more widespread use of robotic technology.

We will first watch a video on Robots:


We will be initially using the Tech Museum’s Robotics: Sensing, Thinking, Acting page as the main source to learn about this very important technological development.

Thursday, June 26, 2014

Networks Test 2

  1. A company sells insurance plans to customers. Its headquarters are located in Capital Federal, and they have there one network that comprises 5 computers in the administration area that share one printer. They also have 3 other computers that are in a small commercial office that sells policies to customers within the same site and that have one printer. There is a file server at this location that hosts all records from customers and that should be accessed by all computers in this central office as well as the other branch. This central office accesses the Internet through a dedicated cablemodem.
    The company also has one commercial office in Olivos, where it sells directly to customers. In the Olivos branch there are 4 computers that are linked using Token Ring sharing a printer, and 3 computers that are used for administration purposes. They all share one coulour printer. This branch is connected to the Internet though a cablemodem and needs to instantly access the database in Headquarters.Using the Network Design Simulator, design a suitable network for this configuration and add any explanation that you think is relevant as to the choices made.
  2. Give an example of a firm where you would justify investing on the complete refurbishing of furniture to conform to ergonomic standards. Explain the reason for your choice.
  3. A bank offers its clients an electronic service by which they can handle their accounts and another personalized service by which they can have access to safety vaults to store their valuables. What authentication method would you use for each and why? Justify your decisions.
  4. What is the role and function of an operating system? Can a computer function without an operating system? Why?
  5. .       Explain clearly how, in a network:
    a.       Users are prevented from accessing unauthorized web sites.
    b.      Outside hackers are stopped from gaining access to the network.
    c.       A single broadband Internet connection can be shared by many users in the network.
  6. How is data transformed into information?

Monday, June 16, 2014

Networks Test

  1. 1.       A manufacturer of auto parts has a shop where they sell parts to the public and a warehouse where they store the parts. At the shop, they have three computers where they sell to the public, together with a printer that they use to print invoices. At the same shop, they have and administrative office where employees use 4 computers to handle transactions and do frequent videoconferences with their suppliers in Europe. They also use a printer, but very occasionally. At the warehouse, there are 4 computers in an office with a laser printer and two computers at the warehouse itself, which are used for automated stock control and inventory. It is important to know that stock control database is unique for both locations. Using the Interactive Network Design Simulator, design the network and explain why you made the choices you made.
  2. 2.       Under what circumstances would you recommend that somebody work from home? What type of occupation lends itself to teleworking?
  3. 3.       Explain in detail how the operating system:
    1. a.       Can simulate multitasking.
    2. b.      Handles multiple users if it is a multi-user operating system.
    3. c.       Helps software to use hardware such as different printers, a mouse, etc.
  4. 4.       Millions of dollars are lost every year due to repetitive stress injuries. How could that be avoided?
  5. 5.       Discuss why more biometric checks are expected to be present even in consumer hardware. What are its advantages and disadvantages over passwords?
  6. 6.       What makes a router more expensive than others? When would you justify spending on a very expensive router?

Thursday, May 8, 2014

Test Search Engines

  1. 1-      Explain each of the following, including technical terms and the underlying mechanisms that take place:
    1. a.       A user types an address and the computer returns “DNS domain not found”.
    2. b.      If a new IP addressing system is not created the Internet will run out of IPs.
    3. c.       The difference between the World Wide Web and the Internet.
  2. 2-      How does a search engine know what pages to return when a search has been entered? What makes a search engine better than others?
  3. 3-      The owner of a company that sells used cars hires you to position their company higher in the search engine rankings. How would you do it?
  4. 4-      In the future, wearable devices (Google glasses, Sixth Sense) will allow users to find information in real time about people, objects, etc. Explain in detail how this can be accomplished technically.
  5. 5-       How can search engines become a threat to people’s privacy? Can search customization limit the scope of the result of the search? Discuss. 

Monday, April 28, 2014

Presentation

We have covered several technical topics lately, and this assignment will focus on discussing some of the implications on individuals and societies of the their technological applications.
Working in pairs, you will develop a PowerPoint presentation that addresses one of the following topics/statements:

- Users are forced into buying expensive computers in order to sustain operating systems that do not give extended functionality. Open source operating systems would not require a constant upgrading.
- Most organizations or firms do not adequately address the issue of ergonomics and as such millions of dollars are lost every year as a consequence of repetitive stress injuries.
- In the future, most people will work from home and many important social interactions will be lost, as well as the ability to function as a team.
- Passwords are an unsafe and inadequate method to gain data access. Biometric recognition will be the standard in the near future, since affordable and accurate biometric recognition methods are now available.


During today's lesson, you will plan and find resources for the presentation. You have to show me the plan before the end of the lesson.

Each presentation must address the above issues including external links, at least two multimedia elements (videos) linked from the presentation, and arrive at a conclusion with respect to the statement presented.

You must post your finished presentation to your blogs by the end of the lesson next Thursday.

In order to learn about effective and ineffective PowerPoint presentations, we will browse the Death by PowerPoint presentation.

Monday, April 14, 2014

Search Engines Test

Answer all of these questions on a Word document and, before leaving the room, send your Word file to itgs.sass@gmail.com

Important instructions: please answer all questions fully and including the technical terms that we studied. Provide detailed explanations for each question.

  1. A student at  school is loading a web site at one of the computers in the lab. From the moment they type the URL until the page gets loaded on the computer, describe in detail, using technical terms, how the information flows from the workstation in the lab, through the school network towards the server and back.  
  2. 2) Explain, using all technical terms that are relevant, how a search engine can perform a search. How does it know which sites best match the search query? What technically makes a search engine better than the others?
  3. 3) An Argentine rugby web site hires you to make sure that whenever people are searching for information on rugby in the country their site appears at the top of the search.  How would you do that? Give details using technical terms.
  4. 4) What are the privacy risks faced by users when searching and using the Internet in general? Give examples.
  5. 5) Can somebody jokingly or with bad intentions create a web site to damage your reputation? How would that be done?
  6. 6) Write some ideas about the future of search engines? What type of search engines can we expect for the future?