Friday, January 21, 2011

Final Project

What did you learn this term in Computer Fundamental?
This term i learned a lot about computer fundamentals starting with the hardware of the computer and what is their role in the computer for instance the hard drive is used to store data or save document and or programs into your computer we also learned about input and output devices. Besides we learned about software we used Microsoft Word,Excel and PowerPoint we used these to complete projects and or labs in which we had to follow steps and learn how to use the software. Finally we learned how to navigate the web and how to use our e-mails properly.

How these new skill would help you achieve your long term goals?
These new skill will help me using a computer and in the future it will help in either other classes or in any job. These skill will help because i will be able to manage doing basic stuff without the need of help like using Microsoft office and being able to write an email or to surf the web.

Why is technology important for any career you would be pursuing?
I believe technology is important for any career because in the future technology is going to advance and you will at least know the basic for a computer this will help you in any job because in my opinion i would rather hire the person with more knowledge in computers
What Academy major would you follow for the rest of your high school career?
I would like to follow computer programming because that what interests me more

Wednesday, January 19, 2011

My Future

Forensic science

University of Central Florida

The application process is quick and easy. Be sure to send us the signature page and residency affidavit with your application fee. If you prefer, you can send us a paper application. UCF accepts applications year-round, but with rolling deadlines for each semester.

Strayer University

Completed application form.

Proof of completion of a Baccalaureate degree from an accredited college or university. Any undergraduate major will be considered, but if it varies widely from a proposed graduate major, you may need to take certain undergraduate foundation course.

Evidence of graduate potential. Special consideration may be given to applicants who show graduate potential and have a minimum of three years of professional or business experience. A personal interview with a Campus Dean is required.

Pennsylvania State University - Main CampusMinimum high school course requirements for admission to baccalaureate (four-year) degree programs are listed below.

Keep in mind that specific programs may have additional requirements or recommendations.

EnglishFour units, including one unit each in composition and literature, are required.

Foreign Language/Social Studies/Art/HumanitiesFive units in any combination of foreign language, social studies, arts, and humanities are required, and two units of the same foreign language are recommended.

Science

MathThree units of mathematics are required (four are recommended), selected from any combination of algebra, geometry, and trigonometry

Doctor

University of Pennsylvania

Essay(s) required

Required: SAT Reasoning Test and SAT Subject Tests; or ACT

If submitting ACT, the writing section is required

Very important admission factors:

Character/Personal Qualities

Rigor of secondary school record

Standardized Test Scores

Walden University

1. An official transcript of a bachelor’s degree, or equivalent, from a U.S. school accredited by a regional, professional/specialized, or national accrediting organization recognized by the Council for Higher Education Accreditation (CHEA) or the U.S. Department of Education, or from an appropriately accredited non-U.S. institution, in a discipline or field related to the program/specialization for which application is made

2. A minimum grade point average (GPA) of 2.5 on a 4.0 scale in bachelor’s degree coursework (Specific program requirements may apply.)

Completed application form

Kaplan University

Must be a high school graduate or completed GED

Must be a permanent resident or citizen of the U.S.

Must have access to a computer

Computer Programming

Strayer University

Completed application form.

Proof of completion of a Baccalaureate degree from an accredited college or university. Any undergraduate major will be considered, but if it varies widely from a proposed graduate major, you may need to take certain undergraduate foundation course.

Evidence of graduate potential. Special consideration may be given to applicants who show graduate potential and have a minimum of three years of professional or business experience. A personal interview with a Campus Dean is required.

Pennsylvania State University - Main CampusMinimum high school course requirements for admission to baccalaureate (four-year) degree programs are listed below.

Keep in mind that specific programs may have additional requirements or recommendations.

EnglishFour units, including one unit each in composition and literature, are required.

Foreign Language/Social Studies/Art/HumanitiesFive units in any combination of foreign language, social studies, arts, and humanities are required, and two units of the same foreign language are recommended.

Science

MathThree units of mathematics are required (four are recommended), selected from any combination of algebra, geometry, and trigonometry

DeVry University

Interview Requirement

To be granted unconditional admission to DeVry University, for an education online, onsite or through a combination of both, a prospective student must interview with a DeVry University Admissions Advisor (called an Admissions Representative in Florida, Minnesota, Nebraska and Oregon) and complete an application for admission. In addition, all other general and specific admission requirements must be met, including those regarding age, prior education and evaluation of proficiency in the basic and prerequisite skills needed for college-level work.

Age Requirement

Each applicant for either an online or onsite education must be at least 17 years old on the first day of classes.

Capella University

Graduate learners are required to maintain a cumulative grade point average (GPA) of 3.0 or better and complete a minimum of one out of every two total attempted credits (completion ratio of 50 percent of cumulative attempted credits).

Additionally, graduate learners will not be eligible for federal financial aid for any attempted credits that exceed 200 percent of the graduate degree requirements as described in their catalog.

Doctoral learners engaged in the comprehensive examination and dissertation phases of their program must meet additional requirements as described in the procedures section of this policy.

Friday, January 14, 2011

IC3 Certification Exam


Is the abbreviation and registered trademark of the "Internet and Computing Core Certification." The IC3 is a certification program in the United States that is designed to teach individuals the digital literacy skills associated with basic computer and Internet use

Transport Layer Security (TLS)


A security protocol from the IETF that is based on the Secure Sockets Layer (SSL) 3.0 protocol developed by Netscape. TLS uses digital certificates to authenticate the user as well as authenticate the network (in a wireless network, the user could be logging into a rogue access point).

Strong Password


A password that is hard to detect both by humans and by the computer. This password may contain number and special characters (#).

Spyware


Software that sends information about your Web surfing habits to its Web site. Often quickly installed in your computer in combination with a free download you selected from the Web, spyware transmits information in the background as you move around the Web. Also known as "parasite software," "scumware," "junkware" and "thiefware,"

Sniffer


To watch packets traversing a network. Most often in the phrase packet sniffer, a program for doing same

Secure Sockets Layer (SSL)


The leading security protocol on the Internet. Developed by Netscape, SSL is widely used to do two things: to validate the identity of a Web site and to create an encrypted connection for sending credit card and other personal data. Look for a lock icon at the top or bottom of your browser when you order merchandise on the Web.

Repetitive strain injury


Ailments of the hands, neck, back and eyes due to computer use. The remedy for RSI is frequent breaks which should include stretching or yoga postures.

Public Key


An encryption key that can be made public or sent by ordinary means such as an e-mail message. See private key for more details.

Private Key


The unpublished key in a public key cryptographic system, which uses a two-part key: one private and one public. The private key is kept secret and never transmitted over a network.

Keylogger


Is a program that runs invisibly in the background, recording all the keystrokes, usually saving the results to a log file

Thursday, January 13, 2011

Hardware Firewall


A firewall that is built into a router or a stand-alone device. Although such units may, in fact, be computers with firewall software, they are still considered "hardware" firewalls.

Hacking


Use of a computer system without a specific, constructive purpose, or without proper authorization.

Brute Force Attacks


An attempt to gain unauthorized access to a computing system by generating and trying all possible passwords.

Browser hijacking


Is the modification of a web browser's settings by malware. The term "hijacking" is used as the changes are performed without the user's permission.

Telecommuting


Performing job-related requirements using Telecommunications to transmit data and textual messages to the central organizational office without being physically present

Online Learning


An umbrella term for providing computer instruction (courseware) online over the public Internet, private distance learning networks or inhouse via an intranet

Keyless Entry System


Is a system designed to remotely permit or deny access to premises or automobiles. There are several RKE systems on the market, including but not limited to KeeLoq by Microchip

Electronic Commerce (e-comerce)


Commerce that is transacted electronically, as over the Internet.

Digital money


Negotiable store of value maintained digitally in a smart card or computer record that can be debited as the stored value is depleted; also called near money. Digital cash is most often used in the form of loyalty program points or premiums

Critical Thinking


Critical thinking clarifies goals, examines assumptions, discerns hidden values, evaluates evidence, accomplishes actions, and assesses conclusions.

Business-to-Government (B2G)


Is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing communications techniques such as strategic public relations, branding, marcom, advertising, and web-based communications.

Business-to-Consumer (B2C)


Business conducted between companies and individual consumers, rather than between two companies.

Business-to-Business (B2B)


Describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer.

Wildcard Character


In SQL, wildcard characters can be used in "LIKE" expressions; the percent sign (%) matches zero or more characters, and underscore (_) a single character

Wiki


Wiki websites are designed to enable users to make additions or edit any page of the site. They often have a common vocabulary and consider themselves a "Wiki" community.

Trademark


In computer security is a contract between code that verifies security properties of an object and code that requires that an object have certain security properties. As such it is useful in ensuring secure information flow.

Shared bookmark


Is a method for Internet users to organize, store, manage and search for bookmarks of resources online. Unlike file sharing, the resources themselves aren't shared, merely bookmarks that reference them.

Search Engine


A website whose primary function is providing a search engine for gathering and reporting information available on the Internet or a portion of the Internet.

Related Search


A software program that searches a database and gathers and reports information that contains or is related to specified terms.

Public Domain


The jurisdiction of the general public. It refers to intellectual property that has either been voluntarily placed in the public domain by its author or that has passed its copyright, trademark or patent expiration date

Podcatcher


A podcasting client. Software in a user's machine that downloads and aggregates podcasts for synchronization to a digital music player.

Plagiarism


Using ideas, plots, text and other intellectual property developed by someone else while claiming it is your original work.

Phrase Searching


Is a type of full text search that matches only those documents that contain a specified phrase, such as "Wikipedia, the free encyclopedia."

Peer-to- Peer (P2P)


From user to user. Peer-to-peer implies that either side can initiate a session and has equal responsibility. Peer-to-peer is a somewhat confusing term, because it has always been contrasted to a central system that initiates and controls everything

News Feed


Is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed, thereby allowing users to subscribe to it

Math Symbols


This is a listing of common symbols found within all branches of mathematics. Each symbol is listed in both HTML, which depends on appropriate fonts to be installed, and in , as an image.

Tuesday, January 4, 2011

Link List


Also called "reciprocal linking," it is an agreement between Web sites to provide hyperlinks to each other in order to increase visitors and search engine page ranking. Three-way linking links site A to B, B to C and C to A, creating a less obvious relationship than between two sites and considered better for search engine optimization

Libel


A false publication, as in writing, print, signs, or pictures, that damages a person's reputation.

Keywords


is a word or identifier that has a particular meaning to the programming language The meaning of keywords and, indeed, the meaning of the notion of keyword differs widely from language to language.

Indexes


A list of record surrogates arranged in order of some attribute expressible in machine-orderable form. To produce a machine-orderable set of record surrogates, as in indexing a book. To compute a machine location by indirection, as is done by index registers. The portion of a computer instruction which indicates what index register (if any) is to be used to modify the address of an instruction.