Tungkol sa Akin

Aking larawan
clumsy(sometimes),friendly,and kind-hearted..hehe, char lng,hmp

Lunes, Agosto 8, 2011

quiz9 #S1-3

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Cybercrime-refers to online or Internet-based illegal acts
Hacker-refers to someone whom accesses a computer or network illegally; the intent of their security breaches is to improve security


Cracker-someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions


Script kiddie-has the same intent as the cracker but does not have the technical skills and knowledge; often use prewritten hacking and cracking programs to break into computer

Corporate spies-have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information

Unethical employee-break into their employer's computer for a variety of reasons;some simply want to exploit a security weakness, others seek financial gains from selling confidential information
Cyberextortionist-someone who uses e-mail as a vehicle for extortion; these perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flow, or launch an attack that will compromise the organization's network-if they are not paid a sum of money
Cyberterrorist-a programmer who breaks into computer systems in order to steal or change or destroy information;including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses


2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

viruses-is a computer program that can copy itself and infect a computer

worms-is a self-replicating malware computer program which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention
Trojan horses-is a destructive program that masquerades an application; the software initially appears to perform a desirable function for the user prior to installation and/or execution, but steals information or harms the system
rootkit- a software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications
botnets-is a grouped of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks usually for nefarious purposes
denial of service attacks-is an assault whose purpose is to disrupt computer access to an Internet services such as the Web or e-mail
backdoors-a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected
spoofing-the process of deception by which an individual or system alters its identity or creates additional identities, thereby causing another person or system to act incorrectly

To take precautions against this malware:
1. Do not start a computer with removable media in the drives or ports.
2. Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.
3. Disable macros in documents that are not from a trusted source.
4. Install an antivirus program and a personal firewall.
5. Stay informed about any new virus alert or virus hoax.
6. To defend against a botnet, a denial of service attack, improper use of a back door, and spoofing, users can install a firewall, install intrusion detection software, and set up a honeypot.
3. Discuss techniques to prevent unauthorized computer access and use
Some safeguards that improve the security of wireless networks include reconfiguring the wireless access point and ensuring equipment uses one or more wireless security standards such as Wi-Fi  Protected Access and 802.11i.
-a wireless access point (WAP) should be configured so that it does not broadcast a network name. The WAP also can be programmed so that only certain devices can access it.
-Wi-Fi Protected Access (WPA) is a security standard that improves an older security standards by authenticating network users and providing more advanced encryption techniques.
-an 802.11i network, sometimes called WPA2, the most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.

By implementing these security measures, you can help to prevent an unauthorized access to wireless networks.

quiz9 #s 4-6

4. Identify safeguards against hardware theft and vandalism
  Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. Physical devices and practical security measures, such as locked doors and windows, can help protect equipment. Passwords, possessed objects, and biometrics can reduce the risk of theft or render a computer useless if it is stolen.
Safeguards Against Hardware Theft And Vandalism Restricted access (locked doors and windows) Alarm systems Cables Locking devices for hard disk, other drives
 

5. Explain the ways software manufacturers protect against software piracy.
Software piracy is the unauthorized and illegal duplication of copyrighted software. To protect themselves from software piracy, manufacturers issue a license agreement and require product activation.


6. Discuss how encryption works, and explain why it is necessary
Encryption is the process of converting readable data into unreadable characters to prevent unauthorized access. You treat encrypted data just like any other data. That is, you can store it or send it in an e-mail message. To read the data, the recipient must decrypt, or decipher, it into a readable form.

quiz9 #s 7-9

7. Discuss the types of devices available that protect computers from
system failure
A system failure is the prolonged malfunction of a computer. A common cause of system failure is an electrical power variation such as noise, an undervoltage, or an overvoltage. A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment. An uninterruptible power supply (UPS) contains surge protection circuits and one or more batteries that can provide power during a temporary loss of power.

8. Explain the options available for backing up computer resources.
A backup is a duplicate of a file, program, or disk that can be used to restore the file if the original is lost, damaged, or destroyed. Users can opt for a full backup or a selective backup. Some users implement a three-generation backup policy that preserves three copies of important files: the grandparent, the parent, and the child. Others use RAID or continuous backup. Most operating systems and backup devices include a backup program.

9. Identify risks and safeguards associated with wireless communications.
Wireless access poses additional security risks. Intruders connect to other wireless networks to gain free Internet access or an organization's confidential data. Some individuals intercept and monitor communications as they transmit. Others connect to a network through an unsecured wireless access point (WAP), sometimes using the techniques of war driving or war flying. Some safeguards include firewalls, reconfiguring the WAP, and ensuring equipment uses a wireless security standard, such as Wi-Fi Protected Access (WPA) and 802.11i.

quiz9 #s10-12

10. Discuss ways to prevent health-related disorders and injuries due to
computer use.
A computer-related repetitive strain injury (RSI) can include tendonitis and carpal tunnel syndrome (CTS). Another health-related condition is eyestrain associated with computer vision syndrome (CVS). To prevent health-related disorders, take frequent breaks, use precautionary exercises and techniques, and use ergonomics when planning the workplace. Computer addiction occurs when the computer consumes someone's entire social life.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.
Computer ethics govern the use of computers and information systems. Issues in computer ethics include the responsibility for information accuracy and the intellectual property rights to which creators are entitled for their works. An IT (information technology) code of conduct helps determine whether a specific computer action is ethical or unethical.
intellectual property rights-are the rights to which creators are entitled for their work;certain issues arise surrounding IP today because many of these works available digitally
green computing-involves reducing the electricity and environmental waste while using a computer;people use, and often waste, resources such as electricity and paper while using the computer
 
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.
Information privacy-the right of individuals and companies to deny or restrict the collection and use of information about them. Issues surrounding information privacy include the following.  
electronic profile-combines data about an individual's Web use with data from public sources, which then is sold.  
cookie-a file that a Web server stores on a computer to collect data about the user. 
Spyware-a program placed on a computer that secretly collects information about the user.
Adware-a program that displays an online advertisement in a banner or pop-up window. 
Spam-an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. 
Phishing-a scam in which a perpetrator attempts to obtain personal or financial information. 
The concern about privacy has led to the enactment of many federal and state laws regarding the disclosure of data. As related to the use of computers, social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. Employee monitoring uses computers to observe, record, and review an employee's computer use. Content filtering restricts access to certain materials on the Web.  

Lunes, Agosto 1, 2011

quiz8 #s 1-4

1. Define the term, database, and explain how a database interacts with data
and information.
Database-a collection of data organized in a manner that allows access, retrieval, and use of that data. Database software often called a database management system (DBMS), allows users to create a computerized database; add, modify, and delete the data; sort and retrieve the data; and create forms and reports from the data. Data is a collection of unprocessed items, which can include text, numbers, images, audio, and video. Computers processed data into information. Information is processed data; that is, it is organized, meaningful, and useful. in addition to documents, information can be in the form of audio, images, and video.


2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.
File maintenance refers to the procedures that keep data current. File maintenance procedures include adding records when new data is obtained, modifying records to correct inaccurate data or to update old data with new data, and deleting records when they are no longer are needed.

Validation is the process of comparing data with a set of rules or values to find out if the data is correct. Many programs perform a validity check that analyzes data, either as you enter it or after you enter it, to help ensure that it is correct. Types of validity checks include an alphabetic check, a numeric check, a range check, a consistency check, a completeness check, and a check digit.


3. Discuss the terms character, field, record, and file.
A bit is the smallest unit of data a computer can process. Eight bits grouped together form a byte, and each byte represents a single character, which can be a letter, number, space, punctuation mark or other symbol.

A field is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses.

A record is a group of related fields.

A data file is a collection of related records stored on a storage medium such as a hard disc or optical disc.



4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.
With a database management system (DBMS), users can create, access, and manage a computerized database. Most DBMS perform common functions. 
A data dictionary contains data about cache file in the database and cache field within those files. A DBMS offers several methods to retrieve and maintain data, such as query languages, query by example, forms, and report generators. A query language is consists of simple, English-like statements that allow users to specify the data to display, print, or store. A query by example (QBE) has a graphical user interface that assists users with retrieving data. A form is a window on the screen that provides areas for entering or modifying data. A report generator allows users to design a report on the screen, retrieve data into the report design, and display or print the report. A backup is a copy of the database. A log is a listing of activities that change the contents of the database. A  recovery utility uses the logs and/or backups to restore the database.

quiz8 #s 5-7

5. Differentiate between a file processing approach and the database
approach.
File processing system- each department or area or area within an organization has its own sets of data files. Two major weaknesses of file processing systems are redundant data and isolated data.
Databse approach- many programs and users share the data in a database. The database approach reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.
A database, however, can be more complex than a file processing system, requiring special training and more computer memory, storage, and processing power. Data in a database also can be more vulnerable than data in file processing system.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.
Relational database-stores data in tables that consists of rows and columns
Object-oriented database (OODB)- stores data in objects;often use an object query language to manipulate and retrieve data
Multidimensional database-stores data in dimensions;allows users to access and analyze any view of the database data and no standard query language exists

7. Explain how to access Web databases.
A Web database links to a form on a Web page. To access data in a Web database, you fill on the form or enter search text on a Web page. A Web database usually resides on a database server, which is a computer that store and provides access to a datbase

quiz8 #s 8-10

8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Cybercrime-refers to online or Internet-based illegal acts
Hacker-refers to someone whom accesses a computer or network illegally; the intent of their security breaches is to improve security

Cracker-someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions

Script kiddie-has the same intent as the cracker but does not have the technical skills and knowledge; often use prewritten hacking and cracking programs to break into computer

Corporate spies-have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information

Unethical employee-break into their employer's computer for a variety of reasons;some simply want to exploit a security weakness, others seek financial gains from selling confidential information
Cyberextortionist-someone who uses e-mail as a vehicle for extortion; these perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flow, or launch an attack that will compromise the organization's network-if they are not paid a sum of money
Cyberterrorist-a programmer who breaks into computer systems in order to steal or change or destroy information;including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses


9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.
Database analysts and database administrators are responsible for managing and coordinating all database activities. A database analyst focuses on the meaning and usage of data. A database administrator requires more technical inside view of the data. The DBA creates and maintains the data dictionary, manages database security, monitors database performance and checks backup and recovery procedures.


10. Discuss techniques to prevent unauthorized computer access and use
Some safeguards that improve the security of wireless networks include reconfiguring the wireless access point and ensuring equipment uses one or more wireless security standards such as Wi-Fi  Protected Access and 802.11i.
-a wireless access point (WAP) should be configured so that it does not broadcast a network name. The WAP also can be programmed so that only certain devices can access it.
-Wi-Fi Protected Access (WPA) is a security standard that improves an older security standards by authenticating network users and providing more advanced encryption techniques.
-an 802.11i network, sometimes called WPA2, the most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.

By implementing these security measures, you can help to prevent an unauthorized access to wireless networks. 

Biyernes, Hulyo 22, 2011

quiz7#s 1-4

1. Discuss the components required for successful communications.

Sender, beneficiary, and a atmosphere. That's in the order of the most chief definition of the components of computer network.

2. Identify various sending and receiving devices.
Sending device initiates the transmission of data, instructions, and information while a receiving device accepts the items transmitted.
·        Microcomputers
·        Minicomputers
·        Mainframes
·        Internet appliances and web enabled hand held computers

3. Describe uses of computer communications.



Computer-mediated communication (CMC) is defined as any communicative transaction that occurs through the use of two or more networked computers.While the term has traditionally referred to those communications that occur via computer-mediated formats (e.g., instant messages, e-mails, chat rooms), it has also been applied to other forms of text-based interaction such as text messaging. Research on CMC focuses largely on the social effects of different computer-supported communication technologies. Many recent studies involve Internet-based social networking supported by social software.

 4. List advantages of using a network.
  • share software
  • share information with others on networks
  • share peripherals
  • speed of sharing software and information files
  • cheaper than buying individual software and hardware for each standalone especially if for a school, network software often offers deals for amount being purchased
  • security, files can be copy inhibit mode
  • centralized software management- software being loaded onto one computer but also this loads software to entire network at one time
  • electronic mail(e-mail) between network users, ideal for office memos
  • flexible access- access you files from any computer on the network unlike standalone which would mean only being able to access your data from the one computer you uploaded data onto

quiz7 #s 5-7

5. Differentiate among client/server, peer-to-peer, and P2P networks.
Client/server-describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request.

Peer-to-peer (P2P)-computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.


6. Describe the various network communications standards.





Networks may be classified according to a wide variety of characteristics such as medium used to transport the data, communications protocol used, scale, topology, organizational scope.

7. Explain the purpose of communications software.
Communication software is used to provide remote access to systems and is also used to exchange messages in text, audio and video format for the purpose of communication. This software sends and receives data over telephone lines through modems. The communication software allows computers in different geographical regions to communicate with each other through terminal emulators, file transfer programs, chat and instant messaging programs.

quiz7 #s 8-11

8. Describe various types of lines for communications over the telephone network.


Telex, Fax and dial-up Internet communication.
9. Describe commonly used communications devices.
Radios are communication systems that send and/or receive electromagnetic waves and consist of a transmitter, receiver, and antenna. 
Pagers are electronic communications devices that are used to notify or alert a user. Communication received by pagers may be numeric or alphanumeric, depending on the model and complexity of the device.
Other types of communication devices include navigation systems, such as global positioning systems (GPS) instruments and radar systems. GPS communication devices receive satellite communications and use it to provide position information.  
Radar communication devices use synchronized transmitters and receivers to send radio waves and detect their reflections from objects, surfaces and sub-surface structures.

10. Discuss different ways to set up a home network.



11. Identify various physical and wireless transmission media.
For physical transmission Media there are:  


  • Twisted-Pair Cable 
  • Coaxial Cable
  • Fiber-Optic Cable
For wireless transmission media there are:

  •   Broadcast Radio
  • Cellular Radio
  •   Microwaves
  •   Communication Satellite

Miyerkules, Hulyo 20, 2011

quiz6

1.Define system software and identify the two types of system software.
System software is computer software designed to operate the computer hardware and to provide a platform for running application software. 
The most basic types of system software are:
  • The computer BIOS and device firmware, which provide basic functionality to operate and control the hardware connected to or built into the computer.
  • The operating system (prominent examples being Microsoft Windows, Mac OS x and Linux, which allows the parts of a computer to work together by performing tasks like transferring data between memory and disks or rendering output onto a display device. It also provides a platform to run high-level system software and application software.
  • Utility software, which helps to analyze, configure, optimize and maintain the computer.

2.Briefly describe various server operating systems: Windows Server, c,Linux, Solaris, and NetWare.


Windows Server is a brand name for a group of server operating systems released by Microsoft Corporation. 
Linux refers to the family of Unix-like computer operating systems using the Linux kernel. Linux can be installed on a wide variety of computer hardware, ranging from mobile phones, tablet computers, routers and video game consoles, to desktop computers, mainframes and supercomputers. Linux is a leading server operating system, and runs the 10 fastest supercomputers in the world.

NetWare is a network operating system developed by Novell, Inc. It initially used cooperative multitasking  to run various services on a personal computer, with network protocols based on the archetypal Xerox Network Systems stack.

3.Summarize the features of several embedded operating systems: Windows Embedded CE, Windows Mobile, Palm OS, iPhone OS, BlackBerry, Google Android, Embedded Linux, and Symbian OS.
Microsoft Windows CE (now officially known as Windows Embedded Compact and previously also known as Windows Embedded CE ,and sometimes abbreviated WinCE) is an operating system developed by Microsoft for embedded systems . Windows CE is a distinct operating system and kernel, rather than a trimmed-down version of desktop Windows.
Windows Mobile is a mobile operating system developed by Microsoft that was used in smart phones  and  mobile devices,  but by 2011 was rarely supplied on new phones.
Palm OS (also known as Garnet OS) is a mobile operating system initially developed by Palm, Inc., for personal digital assistants (PDAs) in 1996.  Palm OS is designed for ease of use with a touchscreen-based  graphical user interface. It is provided with a suite of basic applications for personal information management.  Later versions of the OS have been extended to support smart phones.Several other licensees have manufactured devices powered by Palm OS. 
iOS (known as iPhone OS before June 2010) is Apple's mobile operating system. Originally developed for the iPhone, it has since been extended to support other Apple devices such as the iPod touch, iPad and Apple TV.


4. Explain the purpose of several utility programs: file manager, search utility, image viewer, uninstaller, disk cleanup, disk defragmenter, backup and restore utilities, screen saver, personal firewall, antivirus programs, spyware and adware removers, Internet filters, file compression, media player, disc burning, and personal computer maintenance.


File manager or file browser is a computer program that provides a user interface to work with file systems.
Web search engine is designed to search for information on the World Wide Web and FTP servers.
Image viewer or image browser is a computer program that can display stored graphical image; it can often handle various graphics file formats.
Uninstaller, also called a deinstaller, is a utility software designed to remove other software or parts of it from a computer. It is the opposite of an installer.
Disk Cleanup is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive.
Defragmentation is a process that reduces the amount of fragmentation in file systems it does by physically organizing the contents of the mass storage device to store files in a contiguous region if possible, or in the smallest possible number of regions (fragments) if not.
Backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event.
Screensaver is a type of computer program initially designed to prevent phosphor burn-in on CRT and plasma computer monitors by blanking the screen or filling it with moving images or patterns when the computer is not in use.
Personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy.
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware.
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge.
Data compression, source coding or bit-rate reduction is the process of encoding information using fewer bits than the original representation would use.
Content-control software, also known as censorware or web filtering software is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web.
Media player is a term typically used to describe computer software for playing back multimedia files.
Optical disc authoring is the process of assembling source material—video, audio or other data—into the proper logical volume format to then be recorded ("burned") onto an optical disc (typically a compact disc or DVD).
Computer maintenance is the practice of keeping computers in a good state of repair.




quiz5

1. Differentiate between storage devices and storage media.

Storage device refers to the apparatus for recording computer data. Examples are the RAM, floppy drives, ZIP drives, and other disks drives. While, storage media are the materials on which data are written and stored. Examples are the floppy disks, optical discs, hard disks, etc.

2. Identify the uses of tape, magnetic stripe cards, smart cards, microfilm and microfiche, and enterprise storage.

Tape- Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. A tape drive reads and writes data and information on tape. Business users utilize tape most often for long-term storage and backup.
Magnetic stripe cards- First used in the early 1960s, magnetic stripe technology, occasionally called "magstripe," remains as an effective form of information storage. While other technologies have come onto the market, magnetic stripe cards are still a cheap, easily implemented system that is seen and used by millions of people every day. The information that is encoded onto the stripe is usually unique to the cardholder and helps to identify that person.
Smart cards- A smart card, which is similar in size to a credit or ATM card, stores data on a thin microprocessor embedded in the card. A smart card reader reads the information on the smart card and updates it if necessary.
Microfilm is a 100- to 215-foot roll of film. Microfiche is a small sheet of film, usually about 4 X 6 inches. Microfilm and microfiche reduce the amount of paper firms must handle, are inexpensive, and have the longest life of any storage media.
 Enterprises use computers, servers, and networks to manage and store huge volumes of data and information. In an enterprise, some storage systems can provide more than 185 TB of storage, and optical disc servers hold hundreds of optical discs.



3. Describe the various types of flash memory storage: solid state drives, memory cards, USB flash drives, and ExpressCard modules.
Solid-state drive (SSD)-is a data storage device that uses solid-state memory to store persistent data with the intention of providing access in the same manner of a traditional block i/o hard disk drive.
Memory card or flash card-is an electronic flash memory data storage device used for storing digital information. They are commonly used in many electronic devices, including digital cameras, mobile phones, laptop computers, MP3 players, and video game consoles. They are small, re-recordable, and able to retain data without power.

USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g (1 oz). Storage capacities in 2010 can be as large as 256 GB with steady improvements in size and price per capacity expected. Some allow 1 million write or erase cycles and offer a 10-year.

Expresscard module-is a new technology that slots into a computer system to allow the addition of hardware capabilities. The Expresscard was introduced by the Personal Computer Memory Card International Association (PCMCIA) in 2003 and is a thinner, lighter and faster modular expansion for users of desktop and notebook computers. Hardware capabilities such as extra memory, wired and wireless communication tools and security devices can be added by inserting these modules into the system.


4. Differentiate among various types of optical discs: CDs, archive discs and Picture CDs, DVDs, and Blu-ray Discs.



Compact Disc (also known as a CD) is an optical disc used to store digital data. It was originally developed to store and playback sound recordings exclusively, but later expanded to encompass data storage (CD-ROM), write-once audio and data storage (CD-R), rewritable media (CD-RW), Video Compact Discs (VCD), Super Video Compact Discs (SVCD), PhotoCD, PictureCD, CD-i, and Enhanced CD. Audio CDs and audio CD players have been commercially available since October 1982.
Picture CD is a product by Kodak, following on from the earlier Photo CD product. It holds photos from a single roll of color film, stored at 1024×1536 resolution using JPEG  compression. The product is aimed at consumers. Software to view and perform simple edits to images is included on the CD. The Picture CD is a standard recordable CD with Kodak software prerecorded.
DVD is an optical disc storage media format, invented and developed by Philips, Sony, Toshiba, and Panasonic  in 1995. DVDs offer higher storage capacity than compact discs  while having the same dimensions.
Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format. The disc diameter is 120 mm and disc thickness 1.2 mm plastic optical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB per layer, with dual layer discs (50 GB), the norm for feature-length video discs.


5. Summarize the characteristics of ink-jet printers, photo printers, laser printers, multifunction peripherals, thermal printers, mobile printers, label and postage printers, and plotters and large-format printers
Inkjet printer-is a type of computer printer that creates a digital image by propelling droplets of ink onto paper.
Laser printer-is a common type of computer printer that rapidly produces high quality text and graphics on plain paper.
MFP (Multi Function Product/ Printer/ Peripheral), multifunctional, all-in-one (AIO), or Multifunction Device (MFD)-is an office machine which incorporates the functionality of multiple devices in one, so as to have a smaller footprint in a home or
small business setting or to provide centralized document management/distribution/production in a large-office setting.
Printer-is a peripheral which produces a text and/or graphics of documents stored in electronic form, usually on physical print media such as paper or transparencies.
Thermal printer (or direct thermal printer) produces a printed image by selectively heating coated thermochromic paper, or thermal paper as it is commonly known, when the paper passes over the thermal print head. The coating turns black in the areas where it is heated, producing an image.
Postage meter is a mechanical device used to create and apply physical evidence of postage (or franking) to mailed matter.
Mobile Imaging and Printing Consortium-is a non-profit industry association formed to promote the usage of mobile devices with digital cameras, particularly camera phones, and the printing of photographs taken with them.
Plotter-is a computer printing device for printing vector graphics. In the past, plotters were widely used in applications such as computer-aided design, though they have generally been replaced with wide-format conventional printers, and it is now commonplace to refer to such wide-format printers as "plotters," even though they technically aren't.
Wide-format printers (contrast to vector-rendering "plotters")-are generally accepted to be any printer with a print width between 17" and 100". Printers over the 100" mark may be called Super-Wide or Grand format.