Friday, January 21, 2011

How technology will impact our future?

A) What did you learn this Semester in Computer Fundamentals? I have learned many things in this semester not only about computers but also about being responsible and being respect. Computers will help me a lot in my future because there just becoming more and more apart of daily life. They help with many things and can do many things.

B) How these new skill would help you achieve your long term goals? The skills that i have learned in this course will help me out in my long term goals because knowing about computers will always be a good thing and could possible get me a better job just because of it. Which will also pay more and thats always better.

C)Why is technology important for any career you would be pursuing?(give examples) Technology is a important for any career because not most jobs depend on technology. Every job needs a telephone don't they ? Everyone depends on technology in general.

D) What other technology skill would you like to learn in the immediate future? I would like to learn how to take a computer apart and know every single part about it and know how to put it back together. Also some tricks with computers. Maybe learn how to even program them.

E) What Academy major would you follow for the rest of your high school career? (Multimedia, Cisco, Apple, Programing, or General Tech?) Multimedia and Programing. I choose these one because i love music and making videos and just anything to due with that. Also programing because i just always thought it would be cool to be able to program computers and know a lot about them.

Thursday, January 13, 2011

IC3 Certification Exam


is the abbreviation and registered trademark of the "Internet and Computing Core Certification."

Transport Layer Security (TLS)


A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape.

Strong Password


A password that is hard to detect both by humans and by the computer.

Spyware


Any malicious software that is designed to take partial or full control of a computer's operation without the knowledge of its user.

Sniffer


An analog computer in which networks are used to simulate power line systems or physical systems and obtain solutions to various problems before the systems are actually built.

Secure Sockets Layer (SSL)


The most common security protocol used on the World Wide Web and commonly known as SSL. It was originally developed by the Netscape Corporation, but is now supported by all the major browsers .

Repetitive strain Injury (RSI)


Damage to tendons, nerves, and other soft tissues that is caused by the repeated performance of a limited number of physical movements and is characterized by numbness, pain, and a wasting and weakening of muscles.

Public Key


An encryption key that can be made public or sent by ordinary means such as an e-mail message.

Private Key


The unpublished key in a public key cryptographic system, which uses a two-part key: one private and one public.

Keylogger


A KeyLogger is a program that runs invisibly in the background, recording all the keystrokes, usually saving the results to a log file.

Wednesday, January 12, 2011

Hardware Firewall


A firewall that is built into a router or a stand-alone device.

Hacking


Use of a computer system without a specific, constructive purpose, or without proper authorization.

Brute Force Attacks


An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

Browser hijacking


is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission.

Telecommuting


Performing job-related requirements using Telecommunications to transmit data and textual messages to the central organizational office without being physically present.

Online Learning


An umbrella term for providing computer instruction courseware online over the public Internet, private distance learning networks or inhouse via an intranet.

Keyless Entry System


A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles.

Electronic Commerce (e-comerce)


it saves trasport costs & it saves time to the company

Digital Cash


Negotiable store of value maintained digitally in a smart card or computer record that can be debited as the stored value is depleted; also called near money.

Critical Thinking


in its broadest sense has been described as "purposeful reflective judgment concerning what to believe or what to do.

Business-to-Goverment (B2G)


is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing communications techniques such as strategic public relations, branding, marcom, advertising, and web-based communications.

Business-to-Consumer (B2C)


Business conducted between companies and individual consumers, rather than between two companies.

Business-to-Business (B2B)


describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

Wildcard Character


a wildcard character can be used to substitute for any other character or characters in a string.

Wiki


Wiki websites are designed to enable users to make additions or edit any page of the site. They often have a common vocabulary and consider themselves a "Wiki" community.

Trademark


A trademark is a brand identification for a product or service, the latter technically called a "service mark." The mark can be written text, text in a particular stylized form or a graphic symbol.

Shared bookmark


Users can access their bookmarks from any computer by signing in to their Gmail account. The bookmarks are searchable, and searches are performed on the full text of the bookmarked pages, not just the labels and notes.

Search Engine


A website whose primary function is providing a search engine for gathering and reporting information available on the Internet or a portion of the Internet.

Related Search


Its when you look up something and they might give you other choices because it can be related to the topic you have looked up.

Public Domain


Land owned and controlled by the state or federal government

Monday, January 10, 2011

Podcatcher


A podcasting client. Software in a user's machine that downloads and aggregates podcasts for synchronization to a digital music player.

Plagiarism


A computer network is a set of computers or other devices linked together via various means. Allowing them to communicate and share data between eachother.

Phrase Searching


A computer network is a set of computers or other devices linked together via various means. Allowing them to communicate and share data between eachother.

Peer-to- Peer (P2P)


From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility.

News Feed


A web feed (or news feed) is a data format used for providing users with frequently updated content.

Math Symbols


This is a listing of common symbols found within all branches of mathematics.

Link List


Also called "reciprocal linking," it is an agreement between Web sites to provide hyperlinks to each other in order to increase visitors and search engine page ranking.

Libel


A false publication, as in writing, print, signs, or pictures, that damages a person's reputation.

Keywords


They are the words that are used to reveal the internal structure of an author's reasoning.

Indexes


A statistical measure of change in an economy or a securities market. In the case of financial markets, an index is an imaginary portfolio of securities representing a particular market or a portion of it.

Saturday, January 1, 2011

Secure Sockets Layer


The most common security protocol used on the World Wide Web and commonly known as SSL. It was originally developed by the Netscape Corporation, but is now supported by all the major browsers .

Feed


A general term for the electronic distribution of information, whether text, audio or video.

Directories


A listing of the files contained in a storage device, such as a magnetic disk.

Copyright


The legal right granted to an author, composer, playwright, publisher, or distributor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work.

boolean Logic


a system of symbolic logic devised by George Boole; used in computers

Blog


To write entries in, add material to, or maintain a weblog.

Wiki


Wiki websites are designed to enable users to make additions or edit any page of the site. They often have a common vocabulary and consider themselves a "Wiki" community.

webapp


An application that runs on the Web.

Website


A set of interconnected webpages, usually including a homepage, generally located on the same server, and prepared and maintained as a collection of information by a person, group, or organization.

Web Cache


A folder full of Web pages in the user's computer that is maintained by the Web browser for a period of time.