Monday, January 24, 2011

Final Project

I learned alot in computer class. I learned different parts of the computer and alot of definitions. I learned what the parts are used for and what they look like. I also learned how to use microsoft office like word, excel, and powerpoint.
The things i learned in computers can help me in the future because i can make a powerpoint for my job or use excel for charts and stuff. These skills can help me get a job and keep that job. It can help me get more money in my career instead of minimum wage.
Technology is important for any career because most careers you need powerpoint. Since i learned how to make animation and use masterslides. Since i learned these skills the boss of my career will give me a raise since i can make a good powerpoint or use excel.
The other technology skills i would like to learn is how to take apart a computer and fix it because incase my computer ever brakes i can fix it myself. Then i won't have to pay any money to get someone at the computer company to fix it.
The academy major i would want to pursue is cisco becasue you can get the most money. My grandfather and dad also know cisco so it will be easier for me to learn. Also i think that cisco is fun because it has to do with networking and i can fix things through networking.

Sunday, January 23, 2011

private key

private key- a secret key used in asymmetric encryption. it is mathematically equivalent to a public key but is kept secret. this is one half of a matching key pair

keylogger

keylogger- programs that record keystrokes while a user is logged onto a computer

hardware firewall

hardware firewall- a firewall that is built into a router or a stand alone device although such units may infact be computers with firewall software they are still considered hardware firewalls

hacking

hacking-unauthorized attempts to by pass the security mechanisms of an information system or network

Thursday, January 20, 2011

brute force attacks

brute forces attacks- the systematic exhaustive testing of all possible methods that can be used to break a security system

browser hijacking

browser hijacking- the modification of a web browser's settings by malware

telecommuting

telecommuting- working from home for a buisness and communicating through the use of a personal computer equipped with modem and communications software

online learning

online learning- education that occurs online via computer

keyless entry system

keyless entry system- a system designed to remotely permit or deny access to premises or automobiles

electronic commerce

electronic commerce- commonly known as e-commerce consists of the buying and selling of products or or services over electronic systems such as the internet and other computer networks

digital dash

digital dash- a system that allows a person to pay for goods or services by transmitting a number from one computer to another

critical thinking

critical thinking- the identification and evaluation of evidence to guide decision making

buisness to government

buisness to government- a platform for buisness to bid on governement opportunities

buisness to consumer

buisness to consumer- a buisness that provides products or services direct to the concumer

buisness to buisness

buisness to buisness- buisness that sells products or provides services to other buisnesses

wildcard character

wildcard character- a special symbol that stands for one or more characters

wiki

wiki- a collaborative website comprises the perpetual collective work of many authors

trade mark

trade mark- a name, symbol, or other device, identifying a product officialy registered and legally restricted it to the use of the owner or manufacturer

shared bookmark

shared bookmark- a method for internet users to search for bookmarks of resources online

search engine

search engine- a website that collects and organizes content from all over the internet

related search

related search- allows a user to find websites similar to the sit you specify in the search query

public dormain

public dormain- refers to any program that is not copyrighted. public dormain software is free and can be used with restrictions

podcatcher

podcatcher- software in a user's machine that downloads and aggregates podcasts for synchronization to a digital music player

plagiarism

plagiarism- the unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work

phrase searching

phrase searching- a type of search that allows users to search for documents containing an exact sentence or phrase rather than single keywords

peer to peer

peer to peer- a term that originated from the popular concept of peer to peer computer application design poularized by large distributed file sharing systems such as napster.

news feed

news feed- a web ffed or news feed is a data format used for providing users with frequently updated content

math symbols

math symbols- a listing of common symbols found within all branches of mathematics. each symbol is listed in both HTML

link list

link list- a group of items each of which points to the next item. it allows for the organization of a sequential set of data in no contiquous storage locations

libel

libel- use of print or pictures to harm someones reputation

keywords

keywords- words or phrases that describe content. They can be used as metadata to describe images text documents databas records and web pages

indexes

indexes- in database design list of keys each of which identifies a unique record

Wednesday, January 19, 2011

My future

The careers i chose were apple and cisco networking. The college you could go to for cisco networking is Metropolitan community college. For apple you could go to ITT tech. For ITT tech is 4 years of high school. You don't really need a GPA all you need is a G.E.D. ITT tech cost about 30,000. My 3rd career is a baseball player. The college you can go into for baseball is Villanova in Pennsylvania. You need a GPA of #3.25 or higher. The price for this college is 39,930$.