Saturday, January 22, 2011

How technology will impact our future?

Dear Journal Entry,
In Computer Fundamentals (this semester) I learned a lot. I learned from creating tables and power point presentations to placing posts on my blog. These skills will definitely help me towards achieving my long term goals. In order for my dreams of careers to come true, I need to know these basics of computers.
     Technology is important when you're an FBI agent which is the career I want to pursue, because it's hard to investigate without a computer. A computer can hold a huge amount of data which is necessary. To be a Forensic Scientist you need to store digital fingerprints in a computer. Therefore, Computer Fundamentals is truly helpful.
      In the future I would like to learn about photoshop. I have always been intrigued by this subject. I also want to learn about taking apart a computer and putting it back together. For the rest of my high school years I would like to follow the apple academy. I'd like to know more about apple and I think the apple academy would be helpful.

Wednesday, January 19, 2011

Careers for me

Forensic scientist-University of Central Florida,Michigan State University,Syracuse University.
  Requirements- Minimum have to have High school diploma, and a high GPA of perhaps 92 or higher.
FBI agent- University of Phoenix, Capella university, Concord law school
  Requirements- Minimum 23 years of age, citizen of this country, 4 year bachelor's degree
Private Investigator- CUNY John jay college, Detective Training Institute
 Requirements- have to have a high school diploma, knowledge of criminology, and Minimum of 2 years in college.

Saturday, January 15, 2011

40. IC3 Certification Exam

IC3 Certification Exam- the certificated exam one can take based on IC3.

39. Transport Layer Security (TLS)

Transport Layer Security (TLS)- A protocol that is used for establishing a secure connection between a client and a server.

38. Strong Password

Strong Password- A password that is hard to detect by humans and computer programs.

37. Spyware

Spyware- Computer software that obtains information from a user's computer without the user's knowledge or consent.

36. Sniffer

Sniffer- software that monitor activities over the network private or public.

35. Secure Sockets Layer (SSL)

Secure Sockets Layer (SSL)- a protocol developed by Netscape for transmitting private documents via the internet.

34. Repetitive strain Injury (RSI)

Repetitive strain Injury (RSI)- Any of a number of debilitating disorders caused by the stress of repeated movements.

33. Public Key

Public Key- A cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key algorithms.

32. Private Key

Private Key- the unpublished key in a cryptographic system that uses two keys.

31. Keylogger

Keylogger- The practice of tracking the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

30. Hardware Firewall

Hardware Firewall- a system designed to prevent unauthorized access to or from a private network.

29. Hacking

Hacking- The process of breaking into computers, usually by gaining access to administrative controls. 

28. Brute Force Attacks

Brute Force Attacks- A strategy used to break the encryption of data.

27. Browser hijacking

Browser hijacking- The modification of a web browser's settings by malware.

26. Telecommuting

Telecommuting- Employment at home while communicating with the workplace by phone or fax or modem.

25. Online Learning

Online Learning- education that happens online via computer.

24. Keyless Entry System

Keyless Entry System- a system made to remotely permit or deny access to premises or cars.

23. Electronic Commerce (e-commerce)

Electronic Commerce (e-commerce)- The buying and selling of products or services over electronic systems such as the internet and other computer networks.

22. Digital Cash

Digital Cash- a system that permits a person to pay for goods or services by transmitting a number from one computer to another.

21. Critical Thinking

Critical Thinking- Mental skills employed in problem-solving and intellectual consideration and innovation.

20. Business-to-Goverment (B2G)

Business-to-Government (B2G)- symbolizes online communication between business entities and government.

19. Business-to-Consumer (B2C)

Business-to-Consumer (B2C)- Describes activities of businesses serving end consumers with products and services.

Thursday, January 13, 2011

17. Wildcard Character

Wildcard Character- A character that may be substituted for any of a defined subset of all possible characters.

16. Wiki

Wiki- A website that lets the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor.

Wednesday, January 12, 2011

15. Trademark

Trademark- a word, symbol, or phrase used to identify a particular company's product and differentiate it from other companies' products.

14. Shared bookmark

Shared bookmark- a shared marked document.

13. Search Engine

Search Engine- A computer program that retrieves documents or files or data from a database or from a computer network.

12. Related Search

Related Search- Search related to your original search.

11. Public Domain

Public Domain- Property rights that are held by the public at large.

10. Podcatcher

Podcatcher- A computer program used to download various media via an rss or xml feed.

9. Plagiarism

Plagiarism- A piece of writing that has been copied from someone else and is presented as being your own work.

8. Phrase Searching

Phrase Searching- a search engine may provide an option to search a set of words as a phrase.

7. Peer-to- Peer (P2P)

Peer-to- Peer (P2P)- a system in which two or more nodes or processes can initiate communications with each other.

6. News Feed

News Feed- a data format used for providing users with frequently updated content.

5. Math Symbols

Math Symbols- symbols that represent mathematical equations.

4. Link List

Link List- a data structure that consists of a sequence of data records such that in each record there is a field that contains a reference to the next record in the sequence.

3. Libel

Libel- a false and malicious publication printed for the purpose of defaming a living person.

2. keywords

Keywords- a keyword is a word or identifier that has a particular meaning to the programming language.

1. Indexes

Indexes- a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.