500-Word Summary of Article About Computer Network courses in Information Management

TO: Prof. Ellis
FROM: Brandon Sosa
DATE: September 22nd, 2021
SUBJECT: 500 Word Summary of The Article about Computer Network courses in Information Management 

The following is a 500-word summary of a peer-reviewed article about the research of Computer Network courses within Information Management and Information Systems. The article talks about how the course in information management and information systems is to be outdated and that it needs to be revised to be up to par. Professors know about what they are doing but it would be best to bring in individuals from technology companies to show the students how/what they’ll be doing in the real world. According to the article, a quote that stood out to me is “The entire class is composed of the blackboard students who only are the “audience” and teacher who is saying “storytelling” with the traditional teaching method.” 

Making Information and information systems understandable to the people. By teaching participants how to use and understand what a Computer network really is. This can be done by having students memorize the teaching learned in the course and in the textbook. The computer network has evolved over time and some of the courses might need to be re-edited to make the updated technology. Teachers/Professors can focus merely on what the student is going to be doing such as “Local Area Network”. With online learning, the basic teaching norm is thrown out the window because students are forced to learn online instead of face-to-face interaction. Classes are not up to par with the computer network for students to use be able to use online learning. The teacher/professor’s lack of experience in Computer networks can be hurtful to the students. The work given to the students is broken down into 3 types which the student can use to understand Computer networks. Content Architecture includes 5 parts (Sketch, Physical Layer, Data Link Layer, Packet Switching, Transport Layer, and Application layer network). Teaching is the most important element a teacher can have to be able to pass on the knowledge they have. Case-based teaching is a method used by teachers and students use this method by researching and training capacity through cases under their guidance. Exposing these students to other Computer networks such as Cisco, Linux, and Lenovo is a good idea because it’s not the only operating system. Case teaching by selecting teaching is a way the students can master the information that has been taught to the students. Network simulation is defined as using computer technology and creating a topology of other computer networks. Network simulation is used in the network to structure the topology and simulate the network traffic. Network simulation is great for students and another way to teach the students the overall concept of Computer networks. Students change from passive learners to active participation inquirers. While hiring people from companies to come in and teach the students what needs to get taught to ensure employment is met after graduation. Due to the online teaching situation, we must adapt to this new trend if the students are going to be taught efficiently in the real world. 

Reference

[1]     Yong-min Lin and Wei-dong, “Research on computer network course in information management and information system,” 2010 2nd International Conference on Education Technology and Computer, 2010. doi: 10.1109/ICETC.2010.5529707.

Expanded Definition of Virtual

TO:              Prof. Jason Ellis
FROM:        Jiaqi Huang
DATE:         Oct 27, 2021
SUBJECT:  Expanded Definition of Virtual

Introduction

The purpose of this document is to elaborate on the word I pick for the expanded definition project. I picked three words at the beginning, virtual, network and space. The term Network is kind of a new word, it doesn’t have that much history than the other two terms. I can not get enough information for the expanding project. For the term space, we know it is a big prerequisite for everything to work normally, computer systems are no exception. But the term space is an old word and has various meanings in different areas. It can represent time, the universe, etc. Though it has such various meanings, the term virtual is more related to my major computer information system, and it is also more representative in the computer field, which means it is more close to a special word for a specific area. At least people now heard the term virtual will associated with computer stuff immediately. The term space is not only used in academic fields, we also use it in our daily life. That’s why I chose the term virtual instead of space. The term virtual has been clearly pointed out to the “virtual technology” in the past few years. As new technology in these years, virtual technology is relatively mature than others and there is considerable room for development, no matter the technology itself or in the applied fields.

Definition

The origin of the term “virtual” is borrowed from Latin and has a long history we can look back on. There are a lot of meanings of “ virtual”. At first, it represented “Inherently powerful or effective owing to particular natural qualities”[1] in “See if the Virtuall Heat of the Wine, or Strong Waters will not mature it.” from Sylva sylvarum. Most of the Other definitions at first also related to power. However, they were Obsoleted because it is no longer in line with usage habits or we can say it was too far away from how we use the term now. When people talk about virtual, it mainly means a kind of technology. In Proc. Eastern’s Joint Computer Conf actually used the term virtual at a description “The sole function of the virtual memory is to increase machine speed”,  which we can conclude it “being on or simulated on a computer or computer network.”[2]

Context

In the article “Virtual reality environment using a dome screen for procedural pain in young children during intravenous placement: A pilot randomized controlled trial ” there is a description using the term virtual. It stated, “Virtual reality (VR), often referred to as a virtual environment, is a computer technology that enables users to view or ‘immerse’ themselves in an alternate world, and it is attracting attention as a digital distraction technique”.[3] in this statement, the term virtual had been clearly defined as a kind of computer technology. The term virtual inherently carries a fake meaning, it presents something that does not truly exist in reality. That’s why the article used the statement “immerse’ themselves in an alternate world”, a world built by a computer that can not physically touch it. And just like what I stated in the definition section, the term virtual has totally different meanings in the past. Based on P. Miller’s Gardeners & Florists Dict, we can find the used the term virtual in a sentence that “the virtual Qualities of the Sun and Air, [vapours] are formed into Clouds.”[4] In this situation, we can consider that virtual is an inherent power of nature. In the 1700s, the secret of nature had not yet deciphered. The science ability in that age was not enough to figure out the physical principle so it is suitable to use the word virtual to present something powerful while unreachable. 

Work Definition

Obviously, in the computer information system field, the term virtual is the name of a kind of computer technology. From the past till now, virtual always carries the meaning of fake and out of understanding in the past, and artificially created, non-physical existing in modern science. Virtual is a technology with a lot of possibilities in various areas and it has a big room to develop. In industry and the medical field, it can provide a safer and more efficient environment for users’ training. In-game areas, it brings a totally new experience to gamers and a new direction to game makers, same for other art areas. So I will define the term virtual as a technology “being on or simulated on a computer or computer network”.

References

[1]”virtual, adj. and n.” OED Online, Oxford University Press, September 2021, www.oed.com/view/Entry/223829. Accessed 6 October 2021. 

[2]“Virtual.” Merriam-Webster.com Dictionary, Merriam-Webster, https://www.merriam-webster.com/dictionary/virtual. Accessed 6 Oct. 2021.

[3]Lee, Ha Ni, et al. “Virtual Reality Environment Using a Dome Screen for Procedural Pain in Young Children during Intravenous Placement: A Pilot Randomized Controlled Trial.” PLoS ONE, vol. 16, no. 8, Aug. 2021, pp. 1–11. EBSCOhost, doi:10.1371/journal.pone.0256489.

[4]P. Miller, “Gardeners & Florists Dict,” The Oxford English Dictionary, Oct. 12, 2021. Available: https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/223829?redirectedFrom=virtual#eid

Mid-Semester Grades

Hello, all! Mid-semester grades are available via the “Check My Grade” link on the left side of our OpenLab Course Site. These grades do not appear on your transcript. They are intended to show you how you are doing in the class. In some cases, they confirm that you are doing well, and in other cases, they serve as a wake-up call. They are based on completing major projects on-time and keeping up with the Weekly Writing Assignments and homework.

Expanded Definition of Cloud Computing

To: Prof: J. Ellis
From: Quazi Hedayet
Date: 10/27/2021
Subject: Expanded Definition of Cloud Computing

INTRODUCTION

The goal of this article is to explore the history of a phrase for computer system technology students. “Cloud Computing” is the word I am defining. While the majority of people are chasing short-term advancement of technologies and networking policies, so I would like to take a different approach to representing the concept of cloud computing, one in which the user’s privacy and security concerns are paramount in the development of a long-term cloud computing solution. In this paper, I’ll go through the definitions of the phrase as well as the context in which it is used.

DEFINITION

The Oxford English Dictionary defines cloud computing as “the use of networked facilities for the storage and processing of data rather than a user’s local computer, access to data or services typically being via the internet.” Cloud computing is the distribution of on-demand computing resources over the internet and on a pay as you go basis, ranging from software to storage and processing power. Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active control by the user. In other words, cloud computing is the use of network facilities for the storage and processing of data rather than a user’s local computer, access to data or services. Cloud computing is on-demand access, via the internet, to computing resources applications, servers, data storage, development tools, networking capabilities, and more hosted at a remote data center managed by a cloud services provider (CSP). The CSP makes these resources available for a monthly subscription fee or bills them according to usage. The term “cloud computing” also refers to the infrastructure that enables cloud computing to function. This includes virtualized IT infrastructure, which consists of servers, operating system software, networking, and other infrastructure that has been abstracted using special software and can be pooled and divided across physical hardware boundaries.

CONTEXT

According to this journal article “Secure Integration of IOT and Cloud Computing”, “Cloud infrastructure involves the hardware and software components required for proper implementation of a cloud computing model. Cloud computing can also be thought of as utility computing, or on-demand computing” (Stergiou et al., 2018, p. 964). Instead of owning their own computer resources or data centers, companies can rent access to anything from apps to storage from a cloud service provider, according to the authors. One advantage of cloud computing is that companies can escape the upfront costs and complexities of owning and managing their own IT infrastructure by paying only for what they need, when they use it. Mobile Cloud Computing is a relatively modern technology that refers to an infrastructure that stores and processes data outside of the mobile device. The Internet of Things is a relatively new technology. Another article “cloud computing acceptance among public sector employees” stated that “However, in today’s rapidly changing technology, with the transition to the industrial revolution 4.0 (IR 4.0) environment, it has opened a new dimension to the world computing. The emergence of cloud computing technology as a new platform for computing has opened the eyes of technology industry players to further benefit from this innovation. Many studies have proven that this technology provides many benefits to the industry and users such as its ability to reduce operating costs, improve collaboration, more secure security levels and more mobile accessibility” (Amron et al., 2021, p.124). The idea of business agility is often stated by cloud proponents as a major advantage. Companies that use cloud platforms can move faster on projects and try out ideas without having to go through lengthy procurement processes or incur large upfront costs because they only pay for the tools they use. Turning the eyes into the mobile clouding the authors states that, “Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device” (Stergiou et al., 2018, p. 964). The ability to spin up new services without the time and effort associated with traditional IT procurement should mean that is easier to get going with new applications faster. The Internet of Things (IoT) is a relatively new telecommunications technology that is quickly gaining popularity. The authors also stated that, “Cloud computing also cuts costs related to downtime. Since downtime rarely happens in cloud computing, companies don’t have to spend time and money to fix any issues that may be related to downtime” (Stergiou et al., 2018, p. 964).

WORKING DEFINITION

Cloud computing is related to the key computer system technology, according to the definition and quotes I discussed. Cloud computing, in my perspective, is the supply of a variety of services, including data storage, servers, databases, networking, and software. It also enables us to save or work on files remotely in databases, as well as recover them as needed. Cloud computing is incredibly convenient since it eliminates the need for us to be concerned about computer crashes. It saves files and allows access to them via the internet.

REFERENCES

Expanded Definitions of Data Structures

To: Prof. Ellis
From: Hamzat Olowu
Date: 10/27/2021
Subject: Expanded Definition Term: Data Structure

Introduction

The objective of this document is to accentuate one of the most important term for programmers and software engineers. This term is Data Structures, the focus of this paper will be on the etymology of the term, then it will discuss the term and its uses in different backgrounds under computer science. This paper will also focus on the way the term is used depending on the context of the articles or books in which the term has been used. The official definitions of the term will be provided first, term’s etymology will be provided after which the context of the words will be discussed. At the end another definition will be provided which will come from understanding the term’s etymology, definition, and the context in which it’s used.

Definition

 The term data structure according to the oxford English dictionary means “Computing the form in which a collection of data is organized, typically allowing for efficient access or manipulation of the data.” [1] According to this definition we know this term is coined for the computer science field, which makes this a unique term. If we look at the term’s etymology, the term was first used in 1960 in a sentence from the IRE Transactions on Space Electronics and Telemetry which states “The decoding program also includes provision for recognizing the time and data structure when partially camouflaged by noise.” [1] The sentence provides a better understanding of the term and shows that the term is being used in a computer science environment. The second time the term was used officially was in 1973 in a book called Introduction to computer science which was what set the standard for later uses of the word. Data structure can also be defined as “The logical or mathematical model of a particular organization of data.” [2] This definition is essentially the same as the first definition but it’s defining the term based on logic and math.             For computer science students the term data structure is made known from either a mathematics course or computer science course called data structures and algorithm. This shows how deeply entrenched in computer science the term is, other definitions for this term still haven’t escaped from the scope of computer science. According to a definition from the Britannica encyclopedia, data structure is a “way in which data are stored for efficient search and retrieval.” [3] The definition from the oxford English dictionary and the Britannica encyclopedia both have different wordings but the same meaning, one says, “efficient access” and the other says “efficient search and retrieval” which attest to the same meaning, further corroborating the fact that the term has the same meaning across different definitions, and it is most suitable to be used in a computer science environment.

Context

Perceiving the essence of the term entails more than just the definition of the term. The context of in which the word or term is used needs to be discussed to come to any kind of conclusion about the term. For this document, the focus is on data structures and in what context it is used. Based on what has been discussed in the previous paragraph data structure is a term that is mainly used in computer science settings, so the context of the word would hold a fair amount of computer science mixed within. This is seen in the book called Python Data Structures and Algorithms which states “A good understanding of data structures and algorithms cannot be overemphasized. It is an important arsenal to have in being able to understand new problems and find elegant solutions to them.” [4, P.1] The book was stating the importance data structures and its counterpart which is algorithm. The book teaches the different types of data structures and algorithms which uses them using a programming language called python. The term data structure in this book is an important concept that is being taught to students interested in computer science. Looking at how the term is being used in context from a different type of source might explain more about the term itself. A different type of source is an article and the one that was chosen for the sake of this writing is by Rhoda M. Gilinsky, a freelance writer who wrote about Teachers Learning Computer Methods: “Students with previous academic preparation in computer science or who want supplementary preparation can also select from more advanced courses, such as Information Structures and Algorithms, Computer Architecture and Programming Languages.” [5] The use of the term here is different as we did not detect the term data structure in the sentence instead term information structure was spotted. In this context, information structure is replacing data structure as data and information can be used interchangeably. The usage of the term in both contexts truly demonstrates the interpretation of the term data structure.

Working Definition

After the juxtaposition of the term’s usage in different context, another definition can be derived from the information provided in the last two paragraphs. Using this knowledge data structure can be defined as any layout information/data is stored. Whilst the definition is in essence equivalent to the ones provided by the sources of this document, it is less specialized. The difference between this definition and the others is that it is presented with generalized wordings which allows for the word to be used in almost any other settings rather than only in computer science.

References

[1]    “Data Structures,” in Oxford English Dictionary, 3rd ed. Oxford, UK: Oxford Univ. Press, Mar. 2012, data n, c2. [Online]. Available: https://www.oed.com

[2]    R. S. N. and S. P. Suman, “The Role of Data Structures in Multiple Disciplines of Computer Science A Review,” The Role of Data Structures in Multiple Disciplines of Computer Science A Review – IJSER Journal Publication, Jul-2013. [Online]. Available: https://www.ijser.org/researchpaper/The-Role-of-Data-Structures-in-Multiple-Disciplines-of-Computer-Science-A-Review.pdf

[3]   “Data structure.” In Britannica Academic EncyclopĂŠdia, 12 Apr. 2017, [Online]. Available: academic-eb-com.citytech.ezproxy.cuny.edu/levels/collegiate/article/data-structure/472173

[4]     B. Baka, Python data structures and algorithms: Improve the performance and speed of your applications. Birmingham, UK: Packt Publishing Limited, 2017. [Online]. Available: ProQuest Ebook Central.

[5]    R. M. Gilinsky, “TEACHERS LEARNING COMPUTER METHODS,” The New York Times, Jun. 3, 1984. [Online]. Available: https://www.nytimes.com/1984/06/03/nyregion/teachers-learning-computer-methods.html?searchResultPosition=5

Weekly Writing Assignment, Week 8

Write a 250-word memo addressed to Prof. Ellis with the subject, “Other Sections for Instruction Manual,” in which you strategize what other sections to include in your instruction manual document. Below, you will find some suggestions. Also, look at the Instructions chapter and Instruction examples in David McMurrey’s Online Technical Writing Textbook for models that you can look to about how they are organized. Copy-and-paste your memo into a comment made to this post.

1.0    Introduction
1.1    Purpose
1.2    Intended Audience
1.3    Scope
1.4    Organization Description
1.5    Conventions (abbreviations, left/right)
1.6    Motivation (answers the “so what” question)
1.7    Safety and Disclaimers
2.0    Description of the Equipment
2.1    Illustration of the Equipment
2.2    Description of the Equipment’s Parts
3.0    List of Materials and Equipment Needed
3.1    Illustration of the Parts Needed to Carry Out the Instructions
3.2    Tools needed
3.3    Table of the parts with description of each
4.0    Directions
4.1    Assemble the Skateboard
4.1.1    Step 1 (don’t write Step 1--write a brief statement on what the first step is)
4.1.2    Step 2
4.1.3    Step 3...Step n (write as many steps--briefly--as you can think of--you can fill this list out later)
5.0    Troubleshooting
6.0    Glossary
7.0    Reference List

Expanded Definition of Linux

TO:                Prof. Jason Ellis
FROM:          Rameen Khan
DATE:           Oct. 27, 2021
SUBJECT:     Expanded Definition of Linux

Introduction

The goal of the Word Expanded Definition Term memo is to emphasize on technical terms and temporal development, as well as compare and contrast its interpretation. And to highlight the most used words in the Computer Information System major. I looked up concepts such as networks, information technology and data analysis beside others related to CIS Major, and considered how extensive the word may be. Linux is the word I’ve picked for my Expanded Word Definition project. Other names I considered include Hardware, Software, CPU, RAM, Encryption, CenOS and Decryption. Based on my preliminary research, I would first describe the word’s historical use, implication, and signification. The earliest use of this word started in 1991 by L. B. Torvalds and in this project, I will talk about how this word has been used differently based on this use of a term over time. Sources that I looked into through (The City Tech) library database will be used to perform my expanded definition, and I wound up utilizing the Oxford English Dictionary, Gale eBook, Oxford English and IEEE Xplore to look for these phrases. My main area of interest in computers is networking and Linux is an important part of the operating system which manages a system’s hardware and resources, like CPU, memory and storage. Linux is also compatible with personal computers, mobile devices, tablet computers, routers, and other embedded systems.

Definition

Linux has a long history, dating back to 1991. This phrase has evolved over time to mean different things while maintaining the same notion. The Oxford English Dictionary Linux defines it as “An open-source operating system modelled on Unix, available in a number of different varieties for use in PCs, servers, and other computing devices” [1]. This Definition tells us that Linux is an open-source operating system which is the software that controls the hardware and functions of a computer, such as the CPU, memory, and storage. Continuing on to the next phase, the word’s definition had been more comprehensive of what it truly is. By 2002 a book was published which was named as “Advanced Linux Networking” by Roderick W Smith. This book talked about Linux being one of the most reliable, secure and worry-free operating systems available and embedded systems across the globe. According to Gale eBooks “Since its inception in 1991, it has attracted widespread attention because of its compatibility with different platforms, and also because Linux is considered by many users to be faster, more robust, and more economical compared to other operating systems.” [2]. The Linux operating system for computers was developed by a Swedish computer scientist. Torvalds began developing this system while a university student in Finland, and it is now freely available over the Internet. A Software developer Torvalds not only made one of the most widely supported operating systems. But also gave freedom to study how the program works and freedom to run the program, for any purpose.

Context

While Linux has been useful for over two decades, and how It is built in a variety of ways. Technology Researchers, Suchakrapani Datt Sharma, D.N Sonawane, Tanushri Chakravorty, Tushar Patil wrote in an article, the e-Learning era has brought in new ways of influencing education. According to this novel, “An E-learning system is networked, which makes it capable of instant updating, storage/retrieval, distribution and sharing of instruction or information; It is delivered to the end-user via a computer using standard Internet technology; It focuses on the broadest view of learning solutions that go beyond the traditional paradigms of training” [3]. In another word, E-learning methodologies are essential for both student education and employee career progression in the workplace. Moving forward to a different journal by Vincent F. Scalfani, who talks about how he switched from Microsoft Windows to Linux and why he now prefers using Linux. One of the reasons is, “Some of the reasons reported for using Linux are that it is available at no cost, can be customized, runs well on older hardware, and offers an opportunity to support free and open-source communities, which may be more in-line with personal or institutional motivations and philosophies” [4]. As I mentioned earlier, Linux is an open-source operating system which is software. And one of the most dependable, secure, and there’s no cost to enter… as in, it’s free. Linux can be installed on as many computers as you want without having to pay for software or server licensing.

Working Definition

All these definitions are similar in that they both illustrate how Linux can be useful in a variety of ways. According to definitions dating back to the 1991 and more current definitions. Linux is an operating system, just like Windows, iOS, and Mac OS. An operating system is a piece of software that controls all of the hardware resources on your computer or laptop. Simply explained, the operating system is in charge of coordinating the connection between your program and your hardware. The software would not work without the operating system (OS). Why Linux? To respond to that question, Linux has evolved into one of the world’s most dependable computer ecosystems. When you combine that dependability with the fact that there is no fee of entry, you have the appropriate desktop platform.

Reference

[1]      “Linux,” in Oxford English Dictionary. 3rd ed. Oxford, UK: Oxford Univ. Press, Dec, 2009, def. 1. [Online]. Available: https://www-oed com.citytech.ezproxy.cuny.edu/view/Entry/251510?redirectedFrom=linux

[2]      L. Fundukian. “Gale Encyclopedia of E-Commerce,” L. Fundukian, Ed. Gale, a Cengage Company, 2012. Available: Linux – Document – Gale eBooks (cuny.edu)

[3]      J. Lee, Y. Kim and S. Kim, “Design and Implementation of a Linux Phone Emulator Supporting Automated Application Testing,” 2008 Third International Conference on Convergence and Hybrid Information Technology, 2008, pp. 256-259, DOI: 10.1109/ICCIT.2008.84.

[4]      S. Vincent, “Using the Linux operating system full-time: Tips and experiences from a subject liaison librarian,” College & Research Libraries News. Oct2021, Vol. 82 Issue 9, p428-431. 4p, Oct 2021. [Online]. DOI: 10.5860/crln.82.9.428

Expanded Definition of Encryption

TO: Prof. Ellis

FROM: Ron Bepat

DATE: 10/27/2021

SUBJECT: Expanded Definition of Encryption

Introduction:

The Purpose of this document is to elaborate on the word “encryption,” identify the historical references from where this term started and explain how the term’s definition has evolved throughout history. Both the old and modern versions of the term “encryption” will be compared. I will be discussing the way it’s defined by explaining how encryption works in full detail and outlining what it takes to make sure a piece of data is safe. I will be breaking down the meaning behind encryption and why it’s so important to encrypt data in the tech industry, in a world where there are so many hackers stealing data. Protecting data is as important as protecting a social security number, as it can be easily stolen and manipulated if not managed properly.

Definitions:

According to the Oxford Dictionary, the term “Encryption” was first used in the 1960s in the Navy [1] — “Proc. U.S. Naval Inst. Dec. 38/1  After giving the message..to the waiting code clerk for encryption..I strolled about the Consulate grounds.” The Navy would create secret messages that could only be deciphered by each other, which is essentially what Encryption is in it’s simplest form — taking a message and mixing it up so only certain people can understand given a certain code. Another example from the Oxford Dictionary is a type of language that is similar to encryption, called Morse Code [5], which is defined as “code devised by Morse for use with the electric telegraph, in which the letters are represented by combinations of long and short electrical signals represented audibly or visually, or by long and short flashes of light or (in writing) dashes and dots.” This Definition was first used back in 1867. This connection between Morse code and the modern word “encryption” is similar as only certain people are able to understand Morse code — the only people who can understand the message are the sender and receiver. The sender would be the one who creates the unreadable code to the sender. It doesn’t have to be a message and can be any form of data. Another definition from The Britannica is [2] “Data encryption, also called encryption or encipherment, the process of disguising information as ciphertext, or data unintelligible to an unauthorized person. Conversely, decryption, or decipherment, is the process of converting ciphertext back into its original format. Manual encryption has been used since Roman times, but the term has become associated with the disguising of information via electronic computers. Encryption is a process basic to cryptology.” This form of communication is so secretive that it can help send important information without an untrusted or unauthorized person being able to understand or access that information. The type of encryption where someone sends unorganized info to another is called end – to – end encryption, which is also used today in the form of emails and text messages. These types of messages are only allowed to be viewed by the sender and intended recipient. For example, if a hacker were to pull up a WhatsApp chat, they would just see a bunch of encrypted text.

Context:

This is a quote from Norton a company based on securing and protecting data [3] — “To unlock the message, both the sender and the recipient have to use a “secret” encryption key — a collection of algorithms that scramble and unscramble data back to a readable format.” This process needs an encryption key because without that key, data cannot be locked or unlocked. Here is another quote from an academic journal called “Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain” [4] — “In cryptography, encryption and decryption are used to protect privacy and confidentiality of transmitted data via the process of encoding and decoding, so that the authorized parties are able to access it exclusively.” Encryption keys can be used for both unlocking and locking data. When a hacker doesn’t have a key, they try to make their own by using ransomware to break into the data and reveal the message or what data is being stored.

Working Definition:

Currently encryption is mainly used in the cyber security, database, networking, and programming fields to protect people’s data. To encrypt data in the programming field is to prevent any outsiders from stealing a person’s code. The user may need to use a program to juggle the data into a message that is more obscured and does not look like the original data. This data can only be deciphered by converting the text using a decryption program. A person would need technology, mainly a working computer, to either decrypt or encrypt data. The user has 2 keys — a decryption key and an encryption key. Each key is only used for their specific purposes. For example, a user can’t use the encryption key to decrypt the data —they would need to use the decryption key for that. If a coworker asked to open a certain piece of data that they don’t have access to, they would have to go to the system administrator of the network and ask for permission to this data and obtaining the decryption key. A person can also make their own algorithms to encrypt their data using any code they see fit to edit the data. Once the text is encrypted, it is essentially unreadable, and this text is called cipher text.

References:

            [1] “”encrypt, v.” OED Online. Oxford University Press, September 2021. Web. 14 October 2021,

https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/242722.

[2] “Data Encryption.” Brittanica Academic https://academic-eb-com.citytech.ezproxy.cuny.edu/levels/collegiate/article/data-encryption/2217.

[3] Written by Alison Grace Johansen for NortonLifeLock. “What Is Encryption and How Does It Protect Your Data?” Norton, https://us.norton.com/internetsecurity-privacy-what-is-encryption.html.

[4] Z. Ye, H. Yin and Y. Ye, “Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain,” 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), 2017, pp. 1-6, doi: 10.1109/ICEEE.2017.8108905.

[5] “Morse, n.3.” OED Online. Oxford University Press, September 2021. Web. 14 October 2021.

https://www-oed-com.citytech.ezproxy.cuny.edu/view/Entry/122419?redirectedFrom=morse+code#eid36108929

Expanded Definition of Chromakey

TO:                 Prof. Jason Ellis
FROM:           Ulises Mora
DATE:            10/27/2021
SUBJECT:     Expanded Definition of Chromakey

Introduction

The purpose of this document is demonstrating the definition of the term “Chromakey,” the use of it in different contexts or scenarios, and my own definition. First, I will compare three definitions from three different sources, including an etymology definition. Then, I will collect some context in which this word is used; the use of this word on different fields in which it can be used; and how they are assimilated for the same function. Finally, I will present my own definition after this whole expanded research of the word.

Definitions 

People might be familiar with the word “Green-Screen,” as Chromakey is the technique that allows the Green-Screen to work. Both words are basically the same, but Green-Screen is the most common term used, while Chromakey is the real-fancy term. According to the Oxford English Dictionary, chromakey is: “A technique or process for selectively combining two different images to form a composite scene by filming in front of a coloured screen or background, used esp. for depicting live action in drawn, modelled, or computer-generated settings” [1]. This means that chromakey allows you to put two different images at once; basically, one project and one background, in which the Chromakey is commonly the background. Regarding its etymology, the definition and interpretation has been maintained since its origins, “1958   R. C. Kennedy & F. J. Gaskins in Proc. IRE 46 1798/1   A new process called ‘Chroma-Key’ is described. ‘Chroma-Key’ is an insetting or matting technique intended for color television which utilizes a highly saturated color background for the inset subject.” [1]. Proving that since 1958, Chromakey remains having the same function as it used to have when it originated. A definition from another source, the Canadian Oxford Dictionary, defined Chromakey as: “a technique or process for selectively combining two video images to form a composite picture, in which all areas of the first image that are of a particular colour or chrominance (usually blue) are detected, and are replaced by corresponding parts of the second image.” [2]. This definition shows more in detail how this process ends up as to what Chromakey is. They mentioned “usually blue,” but along the time, the green color became mostly used. This is because the green color “were generally preferred because they tended to produce less video ‘noise’ and ‘static’ during compositing.” [3]. 

Context

I found three sources in which the term “Chromakey” is used. The first source is a book called Broadcast Journalism, which is about different technical aspects of television and news, including personal and everything related to technology. In a section about the weather forecast, Eadie explains the illusion that they can create with the chromakey, where the audience can see the graphic design created behind the subject that gives the forecast: “The visual aids you see behind them on the screen. In reality, there is nothing behind them in the studio except a green wall. A technology called chromakey inserts the graphics electronically.” [4, p. 639]. Letting us know about the background change process, where everything green is digitally exchanged for another background; in this case, the weather graph that is presented in the weather news, due to the chromakey. 

Through an article from the New York Times, we can assimilate chromakey in the same way, and that the definition and use of this word does not change compared to the previous source. The article talks about a science fair for children that happened in Manhattan during the 90’s, in which one of the expositions involved a special background effect. Leimbach says: “While the child manipulates the cameras, including a chromakey, which can superimpose Mom against a snowy backdrop and create the illusion that she’s flying. The results are then projected onto monitors.” [5]. Again, chromakey is where magic happens to completely change the background and create an illusion for anyone looking at something completely different on the monitor, all due to a completely green setting (mostly.) However, the chromakey does not necessarily have to be used only to exchange one background for another background; this technical tool also allows the background to completely disappear. According to streamscheme.com, a website to help anyone who wants to start streaming, Luci says:” Live-streamers generally use a green-screen to block out their backgrounds entirely, allowing their viewers to see more of their content.” [6]. This means that chromakey is used to make more than just a background. In movies, especially fiction movies, chromakey is presented in scenes where people must levitate something; there is a person disguised completely in green, this person becomes invisible through chromakey, allowing this illusion of levitation to occur.

Working Definition 

After having compared chromakey’s definition, of seeing it in action in different contexts and they are similar; I would define chromakey as the technique of using a monotonous color (specifically green) to change, insert or alter the color to create a desired image or fade the color for digital design purposes for any audience that is going to watch it through the screen. This technique will be very helpful for me when I begin to specialize in animation or film productions in special effects; because the movies contain this process in almost all the scenes, but the audience cannot see this magic illusion.

References

[1]        “Chromakey” in Oxford English Dictionary, 3rd ed. Oxford, UK: Oxford University Press, June 2011. Available: https://www.oed.com
[2]        “Green-screen” in Oxford English Dictionary, 3rd ed. Oxford, UK: Oxford University Press, June 2011. Available: https://www.oed.com
[3]        “Chroma-key ” in The Canadian Oxford Dictionary, 2 ed. Edited by Barber, Katherine Oxford University Press, 2004. Available: https://www.oxfordreference.com
[4]        William, Eadie, Broadcast Journalism.” 21st Century Communication: A Reference Handbook, vol. 2, SAGE Publications, 21st Century Reference Series. 2009. pp. 635-642. Available: Gale eBooks
[5]      D, Leimbach, ” For Children,” The New York Times, Aug. 4, 1995. Available: https://www.nytimes.com/1995/08/04/arts/for-children.html?searchResultPosition=1 [6]        Luci, “How to set-up a green screen for streaming [Twitch & YouTube gaming].” Streamscheme, Available: https://www.streamscheme.com/how-to-set-up-a-green-screen-for-streaming-on-twitch