Skip to main content

Home/ IB ITGS/ Group items tagged Portfolio 3

Rss Feed Group items tagged

Sheila Trudgett

As Classrooms Go Digital, Textbooks May Become History - NYTimes.com - 5 views

  •  
    Possible Portfolio piece.
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
anonymous

HowStuffWorks "How Credit Cards Work" - 1 views

  •  
    Credit card history, how it has come along since 1999. This is from How Stuff Works, and talks about the size of the credit card: "A credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8 inches in size, that contains identification information such as a signature or picture, and authorizes the person named on it to charge purchases or services to his account -- charges for which he will be billed periodically." he first universal credit card -- one that could be used at a variety of stores and businesses -- was introduced by Diners Club, Inc.
Chalana Perera

OLPC's Netbook Impact on Laptop PC Industry - OLPC News - 1 views

  • 1. Windows XP would have been discontinued in 2007 or 2008 as was Microsoft's original plan
  • 2. The Windows XP licence for netbooks was lowered to $30 per device
  • 3. Netbooks are selling at a rate of 35 million units per year and represent more than 30% of the notebook market and this share is increasing.
  • ...3 more annotations...
  • 4. Intel's profits shrank 90% between Q4 2007 and Q4 2008
  • OLPC is going to make the PC/Laptop industry realize that there is an alternative to X86 for full sized keyboard/screen computing.
  • prices and market trends obviously do matter for the education aspect of the OLPC project
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
1 - 8 of 8
Showing 20 items per page