Sunday, January 23, 2011

IT320 Project Management Documentation Template

Click here to download the file.


If it doesn't work try this link:

http://projectarchive.comuf.com/upload/325.doc

Note: Unfinished document. Items will be added next week. This it for now to help you prepare.

Read more...

Tuesday, January 11, 2011

IT16 Case Study 9: Security technologies

Using the additional readings, or a suitable online search engine, research one of the following security technologies, focusing on a particular application or example. Discuss some of the problems of implementing this technology and create a SWOT (strengths, weaknesses, opportunities, threats) analysis.

  • Biometrics
  • Encryption
  • Access Control Software
  • Honeypot
Instruction:
  • Due: January 28, 2011

Read more...

IT16 Case Study 8: Technology Abuse

Watch at least two of the following movies:
  1. Die Hard 4
  2. Wall e
  3. 9
  4. Surrogates
  5. The fifth element
  6. The Island
  7. Babylon AD
  8. I, Robot
  9. Equilibrium
  10. Minority Report
  • Make a comprehensive reaction paper for the two movies in no less than 300 words each.
  • Make a comparative analysis of the two movies you chosen.
  • Short bond paper, choose your own format.
  • Due: January 24, 2011

Read more...

IT16 Case Study 7: Computer Lab Security Measures

As the use and the advancement of computer networks especially the Internet has increased dramatically during the past few years, I.T. security is fast becoming the top priority for most of the companies implementing and using I.T. as part of their business process.

The National Cyber Security Alliance (NCSA) provided some guides to both the home and corporate users to help prevent their computer systems from being compromised. Here are the top ten security tips that you should always put in mind:
1. Use anti-virus software and keep it up to date.
Make sure you have anti-virus software on your computer. Anti-virus software is designed to protect you and your computer against known viruses. But with new viruses emerging daily, anti-virus programs need regular updates. The more often you keep it updated, the better.
2. Don’t open emails or attachments from unknown sources.
A simple rule of thumb is that if you don't know the person who is sending you an email, be very careful about opening the email and any file attached to it. Should you receive a suspicious email, the best thing to do is to delete the entire message, including any attachment. Remember that
even friends and family may accidentally send you a virus or the e-mail may have been sent from their machines without their knowledge.
3. Protect your computer from Internet intruders by using firewalls and internet security appliance.
Equip your computer with a firewall and with internet security appliance. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other valid data/request to reach your computer.
4. Regularly download security updates and patches for operating systems and other software.
Most major software companies today release updates and patches to close newly discovered vulnerabilities in their software. You need to be sure you download and install the patches and getting it from the correct patch update site.
5. Use hard-to-guess passwords.
Passwords will only keep outsiders out if they are difficult to guess. Don’t share your password, and don’t use the same password in more than one place. If someone should happen to guess one of your passwords, you don’t want them to be able to use it in other places.
6. Back-up your computer data on disks or CDs regularly.
Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network.
7. Don’t share access to your computers with strangers.
Unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Don’t share access to your computer with strangers.
8. Disconnect from the Internet when not in use.
Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you’re not online lessens the chance that someone will be able to access your computer. Someone could infect your computer or use it to
harm someone else on the Internet.
9. Check your security on a regular basis.
You should evaluate your computer security and policies at least twice a year. Look at the settings on applications that you have on your computer. Check what settings you have and make sure you have the security level appropriate for you.
10. Make sure your family members and/or your employees know what to do if your computer becomes infected.
It’s important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password.

Instruction:
  • In your own little way, suggest 10 more ways to help prevent the computer systems from being compromised. Also suggest ways to HELP our laboratory from being compromised.
  • Due: January 17, 2011

Read more...

Saturday, January 8, 2011

IT311 OOP SampleFrame Example

//SampleFrame.java


package sampleframe;
import javax.swing.*;
/**
*
* @author Mark Van Buladaco
*/
public class SampleFrame extends JFrame {
JPanel p1=new JPanel();
JButton b1=new JButton("Ok");
JButton b2=new JButton("Clear");
JLabel lab1=new JLabel("Contact Name");
JLabel lab2=new JLabel("Contact Number");
JLabel lab3=new JLabel("Address");
JTextField tf1=new JTextField(7);
JTextField tf2=new JTextField(7);
JTextField tf3=new JTextField(7);
public SampleFrame(){
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
p1.add(lab1);
p1.add(tf1);
p1.add(lab2);
p1.add(tf2);
p1.add(lab3);
p1.add(tf3);
p1.add(b1);
p1.add(b2);
add(p1);
}

}

//Main.java

package sampleframe;

/**
*
* @author Mark Van M. Buladaco
*/
public class Main {

public static void main(String[] args) {
SampleFrame sf=new SampleFrame();
sf.setTitle("Phonebook");
sf.setSize(200,250);
sf.setVisible(true);


}

}

Read more...

Wednesday, January 5, 2011

IT5 OOP Lab Exercise: ARRAYS

Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week, plus 9% of their gross sales for that week. For example, a salesperson who grosses $5000 in sales in a week receives $200 plus 9% of $5000, or a total of $650. Write a program (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson’s salary is truncated to an integer amount):
a) $200–$299
b) $300–$399
c) $400–$499
d) $500–$599
e) $600–$699
f) $700–$799
g) $800–$899
h) $900–$999
i) $1000 and over

Instruction:
  • Send the .vb file to celticguardiandancingelf@yahoo.com
  • Due: January 6, 2010 5 pm

Read more...

Monday, January 3, 2011

IT 5 OOP Arrays Lec Note

Download VB.NET Arrays Lecture notes



If it doesn't work, try this link:

http://projectarchive.comuf.com/upload/309.pdf

Read more...

Sunday, January 2, 2011

CS10 Assignment

AB2A, ECE, TLE and MAPEH

Watch at least two of the following movies:
  1. Die Hard 4
  2. Wall e
  3. 9
  4. Surrogates
  5. The fifth element
  6. The Island
  7. Babylon AD
  8. I, Robot
  9. Equilibrium
  10. Minority Report
  • Make a comprehensive reaction paper (SWOT analysis) for the two movies in no less than 300 words each.
  • Make a comparative analysis of the two movies you chosen.
  • Short bond paper, choose your own format.
  • Due: January 10, 2011 5:00 pm

Read more...

About

My photo
Hi! Mabuhay everyone! I am Mark Van M. Buladaco! I am from Davao City! Hope you enjoy my blog!

Contact me

476 alley Malvar St., Davao City, Philippines
celticguardiandancingelf@yahoo.com
Web Marketingdrive recovery software