Feb 15, 2009
ONLY IN ASSCAT!!!!!!!!!!!!!!!!!!!!!
Please visit the following sites... and be part of it....
SIGN UP DAYON!!!!
www.asscatcampus.ning.com
www.asscatbarkadahan.ning.com
Feb 1, 2009
FIRST WEEK OF FEB. REQUIREMENT
Read chapter 5 and 6 of Ethics in Information Technology book
OR
You can download from this link:
http://rapidshare.com/files/192718319/ethics_chap_5_6.doc.html
Download procedure:
Copy and paste the link to URL (address) bar
Hit Enter key or press GO
Select or click FREE user
Wait until the word DOWNLOAD appears and click it
After reading, answer the following questions:
Chapter 5
What is first amendment? To whom does it apply?
What is obscene speech? Is it protected under the first amendment?
What was the Communications Decency Act (CDA)? Why was it ruled unconstitutional?
Discuss the role that anonymous expression played in the early formation of the United States?
What are some actions you can take if you wish to remain anonymous on the internet? Are there ways in which your identity can be uncovered?
Give several examples of speech that is not protected by the first amendment.
What are the two extreme viewpoints taken by companies when dealing with pornography?
Chapter 6
What types of works can be copyrighted or patented?
What is meant by independent creation? Is it an allowable defense to a copyright infringement claim? To a patent infringement claim? To a trade secret infringement claim?
Define trade secret. What actions must an organization take to ensure its ability to file a successful Economic Espionage Act claim?
What options do companies have to protect their trade secrets?
What is trademark? What is its purpose?
What is cyber squatter?
What is reverse engineering as it applies to hardware or software?
What is the difference between competitive intelligence and industrial espionage?
Submit / E-mail your answers to jelashly@yahoo.com before February 7, 2009 and prepare for a test next week.
For IT 226 – Data Structure and Algorithm
Read and study Data Structure from this link:
http://rapidshare.com/files/192720912/Part_II_Data_Structure.doc.html
and prepare for a TEST next week.
Discuss the following:
Structure
Malloc
Sizeof
Alloc
FILE
Submit / E-mail your answers to jelashly@yahoo.com before February 7, 2009 and prepare for a test next week.
Jan 30, 2009
SMS SEMINAR SLIDES
here's the link of SMS seminar slides........
http://rapidshare.com/files/191524546/SMS_SEMINAR.ppt.html
Jan 7, 2009
PAYABLES...........hUHh!!!
- SMART Bro
- Room Rental (for business)
- Electric Bill
- Water Bill
- BIR Registration (Book Reg., Monthly Tax)
- Business Permit (CTC, Brgy. Clear., Police Clear., Med., Bus. Tax, etc) .. grabeh..
- Washing Machine
- UIC Tuition fee
- Brother and Sis Tuition fee
- Loan ( daily...hehehe)
KUKULANGIN na ang CASH ....huhuhuh...
Jan 4, 2009
I dunno!..!..
.., what are those things i really wanna do... they're too many.... i'll tell you some other time...
..how about you? Ano ba gusto nyo..?
..are you happy? depress? or what? hehehee..
..wala lang talaga akong magawa noh....
first 3 days of the year.. i stayed at home... watched movies.. kahit di naliligo.. (yaks,, hehehe..)
nakakatamad kasi... hmmmmmmmm....
Dec 6, 2008
Ethics for IT Pro. Requirements
MONTH OF DECEMBER 2008
CLASS REQUIREMENTS
CASE NO. 1
For IT 125 & IT 326 (BSIT IA & BSIT III)
MISSING WHITE HOUSE E-MAIL
E-mail problems in the Clinton White House became public in February, 2000, through a $90 million class-action suit filed by Judicial Watch, a conservative group that had brought multiple law-suits against the
In a sworn affidavit given in February 2000, Sheryl Hall, a computer specialist at the White House, said that she learned that beginning in August 1996, incoming e-mails to the Executive Office of the President were not transferred to computer systems in the White House. This transfer is part of a process called records management. Successful records management would allow the text of the e-mails to be searched in response to subpoenas and other inquiries. The e-mails involved were those sent to much of the West Wing staff, including the President and the top staff of the President and Mrs. Clinton.
Sheryl Hall went on to testify that because of this problem, when a searched of e-mails was done in the White House in response to a subpoena from an independent counsel, e-mails for the time period of November 1996 through at least November 1998 could not be searched. Although the White House officials learned of the records management problem (and its impact on searches in response to subpoenas) in May 1998, the problem was not fixed until after November 1998. As a result, six additional months on incoming e-mails were not records managed so that they could be searched for subpoenas.
The lost e-mails occurred at a time when members of Congress, the Justice Department, and the Office of Independent Counsel had issued subpoenas demanding all relevant White House documents related to campaign funding, the Branch Davidian siege in
The White House insisted that the error that cause the e-mail problem was entirely unintentional and blamed it on the technicians who inadvertently capitalized the name of the mail server, designed to store the messages, effectively sending them to a storage server that didn’t exist.
According to further testimony from the contractors responsible for the e-mail system to the House Government Reform Committee in March 2000, the problem was first detected in January 1998 by Daniel A. Barry, a member of the White House computer staff. When lawyers asked him to search the server for e-mails related to Lewinsky, Barry found two messages sent to Lewinsky, but he couldn’t find the corresponding e-mails from Lewinsky. Barry reported the incident to his supervisor, but he wasn’t sure whether the missing e-mails were a minor glitch or an indication of a bigger problem.
In March 2000, White House counsel Beth Nolan wrote to Representative Dan Burton, chairman of the House Government Reform Committee, that back-up copies of the e-mail were stored on computer tapes, but that reconstructing them would cost between $1 million and $3 million and take as long as two years.
QUESTIONS:
- State your reactions about the readings.
- What is the White House records management process? What is the significance of the records management process?
- Daniel Barry discovered a problem with that records management process in January 1998, but didn’t determine the extent of the problem. What further actions might he have taken to correctly assess the situation while avoiding potential personal repercussions?
- What could Barry’s supervisor have done to identify the extent of the problem earlier? Why might he have failed to follow through on resolving the problem? Can you identify any reasons why there was a six-month delay from the time the problem was finally recognized until it was fixed?
Note:
Two students in one answer will be allowed, but individual will be much better. No text and paragraph formats required, but don’t forget the FrontPage which will contains the name(s) of student(s), course and section, date submitted, course description, case number, case title and the words “ANSWERS TO QUESTIONS”. Submit your computerized clear answers on “3-piece” plain papers (Frontpage included) before CHRISTMAS VACATION. No answers will be marked ZERO for this undertaking. STRICTLY: Late papers will not be accepted. Stapled papers will be good enough; do not place it in folder. Make use of your 2-weeks time wisely. Please follow instructions (as stated line-by-line in this paragraph). God Bless.
Source: Ethics in Information Technology by George Reynolds, Thomson Asian Edition, copyrighted @ 2006 by Course Technology (For sale in the
------------------------------------------------------------------------------------------
CASE NO. 2
For IT 125 (BSIT IB)
ONLINE BROKERS EXPERIENCE PROBLEMS
In January 2001, Te Office of Compliance Inspections and Examinations of the Securities and Exchange Commission (SEC) released a report calling for brokerage firms and securities dealers to evaluate their online trading programs – especially their processing capabilities. The most common complaints submitted to the SEC by users of Web trading sites are related to inadequate operational capabilities – failures or delays in processing orders online, difficulty in accessing online accounts, and the errors in processing orders. As a preventive measure, the SEC recommended that online brokers maintain detailed records of capacity evaluations, system slowdowns, and systems outages, including information about the causes and impacts of problems. The SEC also urged companies to use every reasonable effort to notify customers when they are experiencing operational difficulties.
On February 12, 2001, Charles Schwab & Co. was forced to switch its online trading Web site to a backup server for six hours. During this time period, the discounted broker’s customers were unable to either receive trade confirmation messages or view of previous transaction records. As a backup process, Schwab customers were notified to contact Schwab representatives by telephone. Customer database problems were caused by a glitch in off-the shelf software or a homegrown system, not processing capacity limitations. This disruption occurred barely one month after the SEC issued its warning to brokerage firms and securities dealers; however, no SEC fines or sanctions were levied against Charles Schwab as a result of this incident.
In the same month as the Charles Schwab incident, the New York Stock Exchange (NYSE) fined online brokerage TD Waterhouse Investor Services $225,000 and censured it for problems related to Web site failures that temporarily stopped it from filling online stock orders and for inadequate customer service related to the outages. According to a NYSE statement, TD Waterhouse was unable to process online customer orders on 33 different trade days over an 18-month period starting in late1998. During this time period, TD Waterhouse had approximately 250,000 online customer accounts placing an average of 48,000 trades per day with webBroker, its online order entry systems. The Web site failures ranged from a couple of minutes to nearly two hours.
The NYSE also said in its decision that TD Waterhouse didn’t maintain adequate telephone routing systems to handle orders that would have been placed online, resulting in lengthy telephone hold times for customers Furthermore, TD Waterhouse failed to adequately advise customers of an alternative touch-tone telephone order entry system, TradeDirect, that was available during all webBroker outages. As a result, many customers were unable to place orders.
To further compound their problems, it is alleged that TD Waterhouse failed to report some 18,000 verbal and 2300 e-mail complaints related to these outages to the SEC as required by Exchange Information Memorandum 98-3. The statistical information on customer complaints is important because the information discloses trends and issues that may be used in determining the focus of future SEC examinations.
TD Waterhouse accepted the penalties without admitting or denying its guilt. A TD Waterhouse spokesperson said that the firm was sanctioned for the way it handles the outages, not the actual outages. The software issues that caused the outages have been corrected and no webBrowser outages have been reported since April 2001.
QUESTIONS:
- State your reactions about the readings.
- What material differences exist between the outage experienced by Charles Schwab versus those of TD Waterhouse? Do you think that the differences were significant enough that it was fair that the one firm received no fine or sanctions while the other was heavily fined? Why or why not?
- Do any elements of negligence present themselves in the actions of Charles Schwab? TD Waterhouse? Which company might be at greater risk of a negligence lawsuit on behalf of its customers? Why?
- Imagine that you are an outside consultant assigned to a TD Waterhouse team charged with responsibility to “put an end” to customer service interruptions. One focus area you wish to explore is the need for a professional code of ethics, licensing, and/or certification of employees that have anything to do with the online brokerage systems. How would you assess if such actions are appropriate?
Note:
Two students in one answer will be allowed, but individual will be much better. No text and paragraph formats required, but don’t forget the FrontPage which will contains the name(s) of student(s), course and section, date submitted, course description, case number, case title and the words “ANSWERS TO QUESTIONS”. Submit your computerized clear answers on “3-piece” plain papers (Frontpage included) before CHRISTMAS VACATION. No answers will be marked ZERO for this undertaking. STRICTLY: Late papers will not be accepted. Stapled papers will be good enough; do not place it in folder. Make use of your 2-weeks time wisely. Please follow instructions (as stated line-by-line in this paragraph). God Bless.
Source: Ethics in Information Technology by George Reynolds, Thomson Asian Edition, copyrighted @ 2006 by Course Technology (For sale in the
IT 226-Data Struct & Algo Requirements
Class Requirements for the Month of December 2008
- Write a program using standard string functions that accepts a price of an item and display its coded value base on the following keys:
0 1 2 3 4 5 6 7 8 9
X O M A C H I N E S
Sample Output:
Enter price: 489.50
Code Value: CES.HX
- Write a program using string functions that will accept the name of the capital as input value and will display the corresponding country.
Capitals Countries
Manila
NOTE: Answer the problems above using TC. Write your answers on “2-piece” plain papers, first page will be for Problem 1, second page for Problem2. Do not forget to write your name. No need to computerize it, hand written will be accepted. Submit your answers before Christmas Vacation. No answers will be marked ZERO for this undertaking. STRICTLY: Late papers will not be accepted. Stapled papers will be good enough; do not place it in folder. Make use of your 2-weeks time wisely. Please follow instructions (as stated line-by-line in this paragraph). God Bless.
LABORATORY CLASS
Laboratory Assignment #1
Develop a program that determines if a department store customer has exceeded the credit limit on a charge account. For each customer, the following facts are available:
· Account Number
· Balance at the beginning of the month
· Total of all items charged by this customer this month
· Total Amount of items
· Paid Amount/total credit applied
· Allowed credit limit
The program should input as integer each of these facts, calculate the new balance (equals beginning balance + charges this month – credits), display the new balance and determine if the new balance exceeds the customer’s credit limit. For those customers whose credit limit is exceeded, the program should display the message, “Credit Limit Exceeded”, else, “Thank you for Shopping”.
Laboratory Assignment #2
Write a program that uses looping to print the following table of values:
N | 10*N | 100*N | 1000*N |
1 2 3 4 5 | 10 20 30 40 50 | 100 200 300 400 500 | 1000 2000 3000 4000 5000 |
NOTE: The above problems are some of the midterm laboratory requirements. The first thing to do is to create and compile it on your preferred basic compiler e.g. Turbo C. Next is to convert or translate the codes created using TC into CPP file. From CPP you should convert it into Visual Basic programs using Console Application. It is therefore assumed, that you will submit and present SIX types of “run able” programs. Checking will be done at the laboratory (next year-2009) for those who wish to create there. However, if you can be able to work and perform it outside the campus, we can have the evaluation at the eng’g office (if PC’s available).
BSIT 2 – B -------------------------------> BSIT 2B
- Write a program using standard string functions that accepts a coded value of an item and display its equivalent tag price base on the following keys:
X O M A C H I N E S
0 1 2 3 4 5 6 7 8 9
Sample Output:
Enter coded value: CES.HX
Tag Price: 489.50
- Write a program using string functions that will accept a place in CARAGA Region as input value and will display the corresponding Province.
Place Province
Bislig Surigao del Sur
Ampayon Agusan del Norte
Poblacion Surigao del Norte
NOTE: Answer the problems above using TC. Write your answers on “2-piece” plain papers, first page will be for Problem 1, second page for Problem2. Do not forget to write your name. No need to computerize it, hand written will be accepted. Submit your answers before Christmas Vacation. No answers will be marked ZERO for this undertaking. STRICTLY: Late papers will not be accepted. Stapled papers will be good enough; do not place it in folder. Make use of your 2-weeks time wisely. Please follow instructions (as stated line-by-line in this paragraph). God Bless.
LABORATORY CLASS
Laboratory Assignment #1
Develop a program that determines of a student could proceed to the next level of learning (4th year). For each student, the following facts are available:
- Student number/id
- English Grade
- Filipino Grade
- Math Grade
- Science Grade
- P.E. Grade
The program should calculate for the general average of a student, display the average and determine if he could proceed to the next level of learning. For students whose general average is below 85, the program should display the message “Sorry, you have to repeat this level of learning before you can proceed to 4th year”, else “Congrats, you’re qualified for the next level”
Laboratory Assignment #2
Write a program that calculates the squares and cubes of the number 0 to 5 and prints the resulting values in table format as follows:
Number | Square | Cube |
0 1 2 3 4 5 | 0 1 4 9 16 25 | 0 1 8 27 64 125 |
NOTE: The above problems are some of the midterm laboratory requirements. The first thing to do is to create and compile it on your preferred basic compiler e.g. Turbo C. Next is to convert or translate the codes created using TC into CPP file. From CPP you should convert it into Visual Basic programs using Console Application. It is therefore assumed, that you will submit and present SIX types of “run able” programs. Checking will be done at the laboratory (next year-2009) for those who wish to create there. However, if you can be able to work and perform it outside the campus, we can have the evaluation at the eng’g office (if PC’s available).