Questions and Answers (1 Viewer)

skyrockets1530

Member++
Joined
Sep 10, 2004
Messages
184
Location
Sydney
Gender
Male
HSC
2005
Just post a question and then let someone else answer it, the person who answers the question gets to post a new one.

Should be kinda like the mathathon thing only with IPT

I'll start it off
Question 1
John is creating an online photo gallery for his images, explain the methods of image compression available to John.
 

frangipani13

Member
Joined
Nov 6, 2004
Messages
36
Gender
Undisclosed
HSC
2006
okay then....

There are two types of compression available:
1) Lossy: This is when a number of bytes are removed from the file size. This results in a smaller file size, but means that the picture will have poorer quality as some parts or colours of the image may be missing.
2) Lossless: This is when repeated data in the image is replaced with something that takes up less room. It is usally used in text files, eg. replacing 'and' with &. It has a compression ration of 3:1 and means that the quality of the picture will remain the same. It is supported by most image formats such as jpeg.SInce John is compling a photo gallers, I would suggest that he use lossless compression.


hope these are the right types of compression!....okay question 2 is:
Describe the two different ways of creating an animation.
 

Nerd Queen

Member
Joined
Feb 20, 2005
Messages
66
Location
"Oh God, I could be bounded in a nut-shell, and co
Gender
Female
HSC
2005
k let me hav a crak at this

animation can b created by:

Cell-based animation: Is the traditional method of animation. It involves using a frame-by-frame animation. This means that every frame or cell is individually drawn and displayed. they are displayed rapidly one after an other to create the animation effect.

Path-based animation: This is when the moving object (or watever) is placed against a set backround (ie doesnt move - lol). This means that it is only the object moving and not the pixels in the backround. this works by drwing the object in a certain position on the backround, wiping it out and re drawinhg in a new position. this process is made easier through tweening, that is the generation of intermediate frames between the two objects.

I really hope that they r rite! prob not! do morphing and warping count? i hav no idea wat im doing in this course lol. n i cant explain things to save my life ...

k next question:

describe the 5 basic components of all communication systems.
 

jake2.0

. . .
Joined
Sep 17, 2005
Messages
616
Gender
Male
HSC
2005
here are 7:
Sender – the source of the message
Receiver – the target of the message
Signal – the information in a communication
Medium – the message is transmitted through this
Encoder – device which converts the information into a signal
Decoder – device which recovers information from the signal
Feedback – indicates whether the communication is successful

next q: define metadata and describe its purpose
 

skyrockets1530

Member++
Joined
Sep 10, 2004
Messages
184
Location
Sydney
Gender
Male
HSC
2005
Metadata is information about data. It is used to give a description or details to a set of data. In the context of databases, an example of metadata would be a data dictionary. Metadata is also used in webpages for the purpose of providing a description or other information about the page to search engines.

next question: A business is planning on linking a bus network and a token ring network, state the device which would be used to link the two networks and describe the different types of cabling which can be used for the wired network.
 

th

No.1 Asset
Joined
Sep 21, 2004
Messages
304
Location
City
Gender
Male
HSC
2005
skyrockets1530 said:
Metadata is information about data. It is used to give a description or details to a set of data. In the context of databases, an example of metadata would be a data dictionary. Metadata is also used in webpages for the purpose of providing a description or other information about the page to search engines.

next question: A business is planning on linking a bus network and a token ring network, state the device which would be used to link the two networks and describe the different types of cabling which can be used for the wired network.

Gateway
is a combination of hardware and software to link two different types of networks.

there are many differnet devices which will a successfull transfer of data between these two entily different networks to name a few

Repeater used to rebuiled a fading signal to its original strength and shape before transmitting the data
*Repeater is less eminent or less intelligent then a gateway

Router will be used to determine where data packets is sent to between the bus and token ring networks

CABLING

three main types are

Twisted Pair
- cable consists of two thin copper wires twisted formin a spiral
- 2 main types are (UTP) or (STP)
- Slowof bandwith up to 56kbp

Copper Wie
- Consist of a single copper wire sourronding an insulator and a grounded shield
- Used in distances of less than 10 or less kilometres
- bandwith 10Mps

Fibreoptic
- uses a laser of light carry data in small glass fibres which bounce and reflect of them to reach the destination
- free from electromagnetic & radio inference
-Bandwith 400mbps
 

th

No.1 Asset
Joined
Sep 21, 2004
Messages
304
Location
City
Gender
Male
HSC
2005
th said:
What is normalisation?
k ill answer this
process of studying the schema from a database and orgaizing it into a group of tables
- This will minizer data redundancy( undesirable duplication of data )
- i dont get the types of normalisation can someone clarify
 

skyrockets1530

Member++
Joined
Sep 10, 2004
Messages
184
Location
Sydney
Gender
Male
HSC
2005
th said:
k ill answer this
process of studying the schema from a database and orgaizing it into a group of tables
- This will minizer data redundancy( undesirable duplication of data )
- i dont get the types of normalisation can someone clarify
I am aware of two different types of normalisation, there may be more but i dont know how much the syllabus requires.

First Norm Form 1NF moving data to different tables with similar data types, each table is given a primary key and is then linked to by those tables requiring the data. Most often used type of normalisation

Domain/Key Normal Form requires that each key uniquely identifies each row in a table. A domain is the set of permissible values for an attribute. By enforcing key and domain restrictions ensures that there are no problems when modifying the database.
 

skyrockets1530

Member++
Joined
Sep 10, 2004
Messages
184
Location
Sydney
Gender
Male
HSC
2005
Next question

Describe three social and etthical issues related the storage of information in a database.
 

word.

Member
Joined
Sep 20, 2005
Messages
174
Gender
Male
HSC
2005
Describe three social and etthical issues related the storage of information in a database.

Privacy - When collecting information from customers it is important that no irrelevent information is collected e.g. a video store does not need to know about a customer's racial background. Also the participant must ensure all information is kept confidential and not released to others.

Security - The data collected must be protected from malicious users and also physical damage. This can be achieved through the use of a firewall or password, and some sort of backup procedure e.g. grandfather/father/son. This will ensure that the data is safe and can be easily recovered in case of technical errors.

Health and safety - If large amounts of data are being processed, it is essential that the data entry operators are working in an ergonomic environment and take frequent breaks. Without such precautions, RSI and other computer-related diseases may arise.

Accuracy - The data inputted should be accurate in order for it to be useful. Data validation techniques such as a range check and check digit are common methods of aiding accuracy.

Integrity - Data Integrity refers to the reliability of data i.e. the extent to which the data is useful, current and accurate. For example the data collected must be checked and updated with the customer when necessary; it is costly and ineffective to send brochures to an old address if the customer has moved houses.

Access - The Freedom of Information Act states that a person is entitled to view any details stored about him/her at any public body that does not invade another person's privacy. So an organisation should be prepared for such arrangements and hence is an issue of concern.

^ made it all up, someone check.
In the meantime...

Next Question: Describe teleconfrencing and outline the information technology that would be used in a video conference.
 

香港!

Member
Joined
Aug 24, 2005
Messages
467
Location
asdasdas
Gender
Undisclosed
HSC
2010
word. said:
Next Question: Describe teleconfrencing and outline the information technology that would be used in a video conference.
Teleconferencing is using information technology and electronic transmission to allow a meeting to take place at the same time but at different places.
In a video conference information technology required would be a fast processor, modems, cable mediums, good video card, good sound card, Broadband internet connection, digital camera, software to run the video conference.

Describe the Process of analog to digital conversion
 

barnsey88

New Member
Joined
Mar 29, 2004
Messages
29
Gender
Male
HSC
2005
Analogue to digital

The most common technique is Pulse Code Modulation. It takes regular sample measurements of the analogue data. Each sample records the amplitude of the digital signal at the time of the measurement. The number of measurement samples will affect the accuracy of the data collected, however this may take up more space and CPU memory if there are more samples taken.

Analyse encription as a method of protecting data in relation to social/ethical issues.
 

香港!

Member
Joined
Aug 24, 2005
Messages
467
Location
asdasdas
Gender
Undisclosed
HSC
2010
^
Encryption is the process of encoding the data to ensure security during transmission. This protection of data is essential, as socially, people would feel threatened if their information was exposed. Various companies may attempt to hijack company details of rivals to gain economical benefits, Encryption inhibits them from doing so. Ethically, the privacy of individuals or groups may be of great concern. Without the protection offered by Encryption, privacy could be eradicated and the data\information unlawfully obtained by the 'hackers' or unauthorised users could be immorally used.

Outline Data Modelling
 

harvestcows

New Member
Joined
Oct 17, 2004
Messages
27
Gender
Female
HSC
2007
The process of identifying the entities, their attributes and the relationships between entities. Data modelling tools consist of data dictionaries, schematice diagrams and normalisation, data dictionaries help to validate data that is entered into the database by forcing any data entered to conform to a consistent set of validation rules (list, type, length). Normalisation and schematic diagrams aim to reduce redundancy in the database and thus aim towards a more efficient database reducing storage needs, faster retreival of data thorugh a query as less redundancy, more accuracte reports and higher data integrity as data is stored once in a centralised location instead of multipled times throughout the database, thus when a piece of data needs to be editted it only needs to be edited once---> once stored once--> no chance of conflciting values
 

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

Top