Friday, January 21, 2011

How technology will impact our future?

A) What did you learn this Semester in Computer Fundamentals? I have learned many things in this semester not only about computers but also about being responsible and being respect. Computers will help me a lot in my future because there just becoming more and more apart of daily life. They help with many things and can do many things.

B) How these new skill would help you achieve your long term goals? The skills that i have learned in this course will help me out in my long term goals because knowing about computers will always be a good thing and could possible get me a better job just because of it. Which will also pay more and thats always better.

C)Why is technology important for any career you would be pursuing?(give examples) Technology is a important for any career because not most jobs depend on technology. Every job needs a telephone don't they ? Everyone depends on technology in general.

D) What other technology skill would you like to learn in the immediate future? I would like to learn how to take a computer apart and know every single part about it and know how to put it back together. Also some tricks with computers. Maybe learn how to even program them.

E) What Academy major would you follow for the rest of your high school career? (Multimedia, Cisco, Apple, Programing, or General Tech?) Multimedia and Programing. I choose these one because i love music and making videos and just anything to due with that. Also programing because i just always thought it would be cool to be able to program computers and know a lot about them.

Thursday, January 13, 2011

IC3 Certification Exam


is the abbreviation and registered trademark of the "Internet and Computing Core Certification."

Transport Layer Security (TLS)


A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape.

Strong Password


A password that is hard to detect both by humans and by the computer.

Spyware


Any malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user.

Sniffer


An analog computer in which networks are used to simulate power line systems or physical systems and obtain solutions to various problems before the systems are actually built.

Secure Sockets Layer (SSL)


The most common security protocol used on the World Wide Web and commonly known as SSL. It was originally developed by the Netscape Corporation, but is now supported by all the major browsers .

Repetitive strain Injury (RSI)


Damage to tendons, nerves, and other soft tissues that is caused by the repeated performance of a limited number of physical movements and is characterized by numbness, pain, and a wasting and weakening of muscles.

Public Key


An encryption key that can be made public or sent by ordinary means such as an e-mail message.

Private Key


The unpublished key in a public key cryptographic system, which uses a two-part key: one private and one public.

Keylogger


A KeyLogger is a program that runs invisibly in the background, recording all the keystrokes, usually saving the results to a log file.

Wednesday, January 12, 2011

Hardware Firewall


A firewall that is built into a router or a stand-alone device.

Hacking


Use of a computer system without a specific, constructive purpose, or without proper authorization.

Brute Force Attacks


An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

Browser hijacking


is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission.