Monday, January 24, 2011

How technology will impact our future

a) i didn't really learn anything in computer fundamental i already knew most of the things i learn how to use spreadsheets more for calculating things
b)These new skills will help me achieve your long term goals by knowing how to use them better when it is needed.
C)Technology is important for any career i would be pursing because some jobs now a days you have to know how to use a computer most of the work you do is on a computer
d) will when i started school back in freshmen year i started off with multimedia.

Saturday, January 22, 2011

IC3 Certification Exam

IC3 is a standards-based certification program for basic computing and Internet literacy. It provides specific guidelines for the knowledge and skills required to be a productive user of computer hardware, software, networks and the Internet.

Transport Layer Security (TLS)

A protocol that guarantees privacy and data integrity between client/server applications communicating over the Internet.

Strong Password

A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access.

Spyware

computer software that obtains information from a user's computer without the user's knowledge or consent

Sniffer

A program and/or device that monitors data traveling over a network

Secure Sockets Layer (SSL)

a protocol developed by Netscape for transmitting private documents via the Internet.

Repetitive strain Injury (RSI)

Damage to tendons, nerves, and other soft tissues that is caused by the repeated performance of a limited number of physical movements and is characterized by numbness, pain, and a wasting and weakening of muscles.

Public Key

The public one of the two keys used in asymmetric cryptography

Thursday, January 20, 2011

Private Key

A Private Key is a secret key, used in Asymmetric Encryption. It is mathematically equivalent to a Public Key, but is kept secret. This is one half of a matching key-pair.

Keylogger

A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted.

Hardware Firewall

a device to which you connect your computers or network in order to protect them from unauthorized access.

Hacking

a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures

Brute Force Attacks

An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

Browser hijacking

Software that tends to Hijack your browsers web connections to do their own purposes.

Telecommuting

employment at home while communicating with the workplace by phone or fax or modem

Online Learning

Education that occurs online via computer.

Keyless Entry System

A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles

Wednesday, January 19, 2011

Electronic Commerce (e-comerce)

Often referred to as simply ecommerce (or e-commerce) the phrase is used to describe business that is conducted over the Internet using any of the applications that rely on the Internet, such as e-mail, instant messaging, shopping carts, Web services, UDDI, FTP, and EDI, among others.

Digital Cash

A system that allows a person to pay for goods or services by transmitting a number from one computer to another

Critical Thinking

The application of logical principles, rigorous standards of evidence, and careful reasoning to the analysis and discussion of claims, beliefs, and issues

Business-to-Goverment (B2G)

the exchange of services, information and/or products from one business to a government agency, as opposed to between a business and a consumer (see B2C) or between two businesses .

Business-to-Consumer (B2C)

Business-to-consumer (B2C, sometimes also called Business-to-Customer) describes activities of businesses serving end consumers with products and/or services.
Business To Consumer Credibility Through Optimization Of Content

Business-to-Business (B2B)

Also "B2B" and "B-to-B." The area of marketing and commerce in which a company sells to other businesses as opposed to individuals.

Wildcard Character

A wildcard character is a special character that represents one or more other characters.

Wiki

A wiki is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.

Trademark

A Trademark in computer security is a contract between code that verifies security properties of an object and code that requires that an object have certain security properties

shared bookmark

a method for Internet users to organize, store, manage and search for bookmarks of resources online

three careers after high school

1. forensic psychologist
 st.francis college


Visual/Performing Arts 1
Recommended units: 18.5 total
Electives 5.5
English 4
Math 2
Science 2
Social Studies 4



mercy college
Required units: 21 total
Electives 3
English 4
Foreign Language 3
History 2
Math 4
Science 3
  Of Science, units that must be lab 1
Social Studies 2

saint joseph college
Required units: 18 total
Electives 3
English 4
Foreign Language 2
Math 3
Science 2
Social Studies 4
Recommended units:
Foreign Language 3












2. genetic counselor
baurch college

Required units: 16 total
English 4
Foreign Language 2
Math 3
Science 2
  Of Science, units that must be lab 2
Social Studies 4
Recommended units:
Electives 1
Math 4

columbia university
Recommended units:
Electives 4
English 4
Foreign Language 4
History 4
Math 4
Science 4
  Of Science, units that must be lab



city college
Required units: 19 total
Electives 1
English 4
Foreign Language 3
Math 3
Science 2
  Of Science, units that must be lab 2
Social Studies 4


3. criminal justice lawyer
1. john jay
Required units: 14 total
English 4
Foreign Language 2
Math 3
  Of Science, units that must be lab 2
Social Studies 2
Visual/Performing Arts 1
Recommended units: 19 total
Foreign Language 3
Math 4
  Of Science, units that must be lab 3
Social Studies 4

2. st.francis college
Required units:
Visual/Performing Arts 1
Recommended units: 18.5 total
Electives 5.5
English 4
Math 2
Science 2
Social Studies 4

3. st.joseph college
Required units: 18 total
Electives 3
English 4
Foreign Language 2
Math 3
Science 2
Social Studies 4
Recommended units:
Foreign Language 3

Tuesday, January 18, 2011

Search Engine

A program that searches documents for specified keywords and returns a list of the documents where the keywords were found.

Related Search

A Google search operator that allows a user to find websites similar to the site you specify in the search query.

Public Domain

The total absence of copyright protection.

Monday, January 17, 2011

Podcatcher

software or other device that can receive a podcast

Plagiarism

a piece of writing that has been copied from someone else and is presented as being your own work

Phrase Searching

A type of search that allows users to search for documents containing an exact sentence or phrase, rather than single keywords.

Peer-to- Peer (P2P)

any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central

News Feed

is a data format used for providing users with frequently updated content

Math Symbols

his is a listing of common symbols found within all branches of mathematics. Each symbol is listed in both HTML, which depends on appropriate fonts to be installed, and in , as an image

Link List

A method of organizing stored data in a computers memory or on a storage medium based on the logical order of the data and not the physical order.

libel

a false and malicious publication printed for the purpose of defaming a living person

Keywords

a keyword is a word or identifier that has a particular meaning to the programming language

Indexes

an index can be: # an integer which identifies an array element # a data structure that enables sublinear-time lookup

Secure Sockets Layer

 a protocol developed by Netscape for transmitting private documents via the Internet.

Feed

is a data format used for providing users with frequently updated content.

Directories

a listing of the files stored in memory

Copyright

secure a copyright on a written work

boolean Logic

a system of symbolic logic devised by George Boole; used in computers

Blog

read, write, or edit a shared on-line journal

Wiki

a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.

webapp

a web application is an application that is accessed via a web browser over a network such as the Internet or an intranet

Website

a computer connected to the internet that maintains a series of web pages on the World Wide Web;

Web Cache

A web cache stores copies of documents passing through it; subsequent requests may be satisfied from the cache if certain conditions are met.