Friday, January 21, 2011

Final Project Computer Fundamentals.

This semester what I learned in Computer Fundamentals was all about computer science and what it did was it enhance my technology skills. I learned how to create and form documents and learn how to use many computer programs. These new skills can help me with my future goals by giving me some kind of knowledge towards everyday use in technology. Any job does have some kind of computer usage and its a great way to be already advanced when being close to my future goals and careers. 


Why is technology important for any career i try to pursue? Well its because people in any type of career do use some kind of technology to store and save data and information. Having some sort of technology skill can enhance the chances of accomplishing and achieving my future careers and goals. People use any type of computer system in most careers. It is very important how to use computer devices and programs in order to be hired and do a well job in any career you try to pursue in.


Another future technology skill i would like to learn is visual design because if i do choose to become a journalist i will need the training and knowledge for programs that journalist use to edit, create, design and etc.This will really give me a good record to any college that provides programs for journalism. 




The Academy major I would like to pursue in during my high school career would be apple because the training and knowledge intrigues me and comes to interest. This can really help me with all apples creations and computer devices in the near future. As time passes technology will be so much more advanced and better to all people in the media or world. 


Wednesday, January 19, 2011

3 Of My Future Careers...



  • Three of my future careers would be either training in nursing, journalist or an veterinary, nice huh? One college that majors for being a nurse is New York University of Nursing. This College offers a Bachelor of Science in Nursing; Master of Science and Post-Master's Advanced Certificate Programs; a Doctor of Nursing Practice (DNP), and a Doctor of Philosophy in Research Theory and Development (PhD). In order I can get into this college i will need at least this average on my SAT score for current freshmen which is 1300-1400 with a GPA of 3.63. Another college that helps me major in Journalism is Columbia University for journalism. It provides journalists with the skills and knowledge to lead the future of digital journalism and serves as a research and development center for the profession. I will need at least a 3.8-3.9-4.0 average. Another college that helps me with my dream of becoming a vetenarian is Cornell University of Veterinary Medicine. This college provides me the training and knowledge in veterinary medicine. GPA needed in order to be accepted is at least a 3.55-4.0.  

Saturday, January 15, 2011

IC3 Certification Exam

  • IC3 Certification Exam includes extensive hands-on computer training, students will be trained to earn the globally recognized Microsoft Office certification for proficiency in one of five business applications.

Transport Layer Security (TLS)

  • Transport Layer Security (TLS) are cryptographic protocols that provide security for communications over networks such as the Internet.

Strong Password

  • Strong Password is a password that is difficult to detect by humans and computer programs. A strong password consists of at least six characters including a combination of upper and lower case letters, numbers and symbols.

Spyware

  • Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge.

Sniffer

  • Sniffer Software that monitor activities over the network (private or public).

Secure Sockets Layer (SSL)

  • Secure Sockets Layer (SSL) is a security technology that is commonly used to secure server to browser transactions.

Repetitive strain Injury (RSI)

  • Repetitive strain Injury (RSI)  is the common cause of discomfort of the wrist and arm which usually occurs in typists and computer users and is now a common cause of litigation.

Public Key

  • Public Key  is one of the pair of keys that is used by public key encryption or (or cryptography).

Private Key

  • Private Key is used by the server to decrypt the session key. The server stores private keys in its database, so no physical file exists.

Keylogger

  • Keylogger is a device or program that captures activities from an input device. Malicious people can make use of keyloggers to capture personal information being input into a computer system.

Hardware Firewall

  • Hardware Firewall s a device to which you connect your computers or network in order to protect them from unauthorized access.

Hacking

  • Hacking allows access to administrative controls.

Brute Force Attacks

  • Brute Force Attacks An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords. 



Browser hijacking

  • Browser hijacking is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission.

Telecommuting

  • Telecommuting is the act of a remote employee using telecommunications technology in order to interact with an employer or office environment opposed to physically working in the office. 

Online Learning

  • Online Learning is basically education that occurs online via computer

Keyless Entry System

  • Keyless Entry System is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar.

Electronic Commerce (e-comerce)

  • Electronic Commerce (e-comerce)  is a catch-all term for trading via electronic telecommunications such as the Internet or WAP.

Digital Cash

  • Digital Cash is a system that allows a person to pay for goods or services by transmitting a number from one computer to another.

Critical Thinking

  • Critical Thinking involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true.

Business-to-government (B2G)

  • Business-to-government (B2G) is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing. 

Business-to-Consumer (B2C)

  • Business-to-Consumer (B2C) describes activities of businesses serving end consumers with products and/or services.

Business-to-Business (B2B)

  • Business-to-Business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Contrasting terms are business-to-consumer (B2C) and business-to-government (B2G).

Wildcard Character

  • Wildcard Character has the following meanings: In telecommunications, a wildcard character is a character that may be substituted for any of a defined subset of all possible characters.

Wiki

  • Wiki is a website designed for multiple people to collaborate by adding and editing content. 

Trademark

  • Trademark is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify that the products or services to consumers with which the trademark appears originate from a unique source, and to distinguish its products or services. 

Shared bookmark

  • Shared bookmark are basically ways to connect to web sites, resources,social networks and etc.  





Search Engine

  • Search Engine  is designed to search for information on the World Wide Web.

Related Search

  •  Related Search helps users drill down further on each search result by offering suggestions related to each individual result. These are positioned below the search result, helping to increase the chance of a relevant result for the user.

Public Domain

  • Public Domain refers to the knowledge that is freely available, commonly shared throughout the world without any access restrictions.

Podcatcher

  • Podcatcher  is a series of digital media files (either audio or video) that are released episodically and often downloaded through web syndication.

Plagiarism

  • Plagiarism is submitting material that in part or whole is not entirely one's own work without attributing those same portions to their correct source.

Phrase Searching

  •  Phrase Searching is a search process that allows you to combine words so that you only get records where the words are next to each other in the order specified.

Peer-to- Peer (P2P)

  • Peer-to- Peer (P2P) is a term used to describe a group of methods for more efficiently delivering content to a consumer over the Internet. 

News Feed

  • News Feed is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it.

Math Symbols

  • Math Symbols is a listing of common symbols found within all branches of mathematics. Each symbol is listed in both HTML, which depends on appropriate fonts to be installed, and in , as an image.

Link List

  • Link List is a list of links that exchange is a confederation of websites that operates similarly to a web ring.

Libel

  • Libel Defamation—also called calumny, vilification, slander (for transitory statements), and libel (for written, broadcast, or otherwise published words)—is the communication of a statement that makes a claim, expressly stated or implied to be factual, that may give an individual, business, product.

Keywords

  • Keywords is a word or identifier that has a particular meaning to the programming language. 

Indexes

  • Indexes is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.