Dear Journal Entry,
In Computer Fundamentals (this semester) I learned a lot. I learned from creating tables and power point presentations to placing posts on my blog. These skills will definitely help me towards achieving my long term goals. In order for my dreams of careers to come true, I need to know these basics of computers.
Technology is important when you're an FBI agent which is the career I want to pursue, because it's hard to investigate without a computer. A computer can hold a huge amount of data which is necessary. To be a Forensic Scientist you need to store digital fingerprints in a computer. Therefore, Computer Fundamentals is truly helpful.
In the future I would like to learn about photoshop. I have always been intrigued by this subject. I also want to learn about taking apart a computer and putting it back together. For the rest of my high school years I would like to follow the apple academy. I'd like to know more about apple and I think the apple academy would be helpful.
Saturday, January 22, 2011
Wednesday, January 19, 2011
Careers for me
Forensic scientist-University of Central Florida,Michigan State University,Syracuse University.
Requirements- Minimum have to have High school diploma, and a high GPA of perhaps 92 or higher.
FBI agent- University of Phoenix, Capella university, Concord law school
Requirements- Minimum 23 years of age, citizen of this country, 4 year bachelor's degree
Private Investigator- CUNY John jay college, Detective Training Institute
Requirements- have to have a high school diploma, knowledge of criminology, and Minimum of 2 years in college.
Requirements- Minimum have to have High school diploma, and a high GPA of perhaps 92 or higher.
FBI agent- University of Phoenix, Capella university, Concord law school
Requirements- Minimum 23 years of age, citizen of this country, 4 year bachelor's degree
Private Investigator- CUNY John jay college, Detective Training Institute
Requirements- have to have a high school diploma, knowledge of criminology, and Minimum of 2 years in college.
Saturday, January 15, 2011
39. Transport Layer Security (TLS)
Transport Layer Security (TLS)- A protocol that is used for establishing a secure connection between a client and a server.
37. Spyware
Spyware- Computer software that obtains information from a user's computer without the user's knowledge or consent.
35. Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)- a protocol developed by Netscape for transmitting private documents via the internet.
34. Repetitive strain Injury (RSI)
Repetitive strain Injury (RSI)- Any of a number of debilitating disorders caused by the stress of repeated movements.
33. Public Key
Public Key- A cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.
31. Keylogger
Keylogger- The practice of tracking the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
29. Hacking
Hacking- The process of breaking into computers, usually by gaining access to administrative controls.
23. Electronic Commerce (e-commerce)
Electronic Commerce (e-commerce)- The buying and selling of products or services over electronic systems such as the internet and other computer networks.
22. Digital Cash
Digital Cash- a system that permits a person to pay for goods or services by transmitting a number from one computer to another.
21. Critical Thinking
Critical Thinking- Mental skills employed in problem-solving and intellectual consideration and innovation.
20. Business-to-Goverment (B2G)
Business-to-Government (B2G)- symbolizes online communication between business entities and government.
19. Business-to-Consumer (B2C)
Business-to-Consumer (B2C)- Describes activities of businesses serving end consumers with products and services.
Thursday, January 13, 2011
17. Wildcard Character
Wildcard Character- A character that may be substituted for any of a defined subset of all possible characters.
16. Wiki
Wiki- A website that lets the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.
Wednesday, January 12, 2011
15. Trademark
Trademark- a word, symbol, or phrase used to identify a particular company's product and differentiate it from other companies' products.
13. Search Engine
Search Engine- A computer program that retrieves documents or files or data from a database or from a computer network.
9. Plagiarism
Plagiarism- A piece of writing that has been copied from someone else and is presented as being your own work.
7. Peer-to- Peer (P2P)
Peer-to- Peer (P2P)- a system in which two or more nodes or processes can initiate communications with each other.
4. Link List
Link List- a data structure that consists of a sequence of data records such that in each record there is a field that contains a reference to the next record in the sequence.
2. keywords
Keywords- a keyword is a word or identifier that has a particular meaning to the programming language.
1. Indexes
Indexes- a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.
Subscribe to:
Posts (Atom)