Friday, January 21, 2011

Computer Fundamentals

                  Throughout the year i have been able to obtain a vast amount of knowledge on how computers function. One of the things that i learned about computers was the interior of the computer. Later on, i learned about word processors and how to  use them properly. At the end we closed off the semester learning about the internet.
                 My long term goal was to educate myself on computers and to learn at least one thing about them. Actually technology would not be that much of help if i become an attorney. The other technology skill i would like to learn is to photoshop.
                  I am not going to follow any academic major involving technology because it is not whaT IM INTERESTED IN.

                

Thursday, January 20, 2011

My Future

-One of the careers that i would like to pursue is a prosecutor attorney. One of the schools that offer this is Harvard Law School. Some of the requirements for entering this school is having a GPA of 3.72 to 3.95, in addition you need good grades and a high score on the LSAT.
-Another one of the careers that i plan on being is a theoretical physicist. One of the schools that offer this major is Princeton University. One of the requirements is to write an essay to display how well you write.
- Another career that i am kind of interested in is being a doctor. One of the colleges that offer this type of program is University of North Carolina at Chapel Hill. Some of the requirements is having a 590 on the critical reading and a 620 on the math and a 590 on the writing part of the SAT.

Saturday, January 15, 2011

IC3 Certification Exam

 This is a pass exam IC3-Exam-3 in first attempt. 231 questions with detailed explanation and 259 study notes. IC3-Exam-3 - Internet - Living Online study notes, articles and mock test. 99% pass rate, 100% money back guarantee. Based on latest Certiport certi fication. Als, when like i pass this class i have i will probably get a Certification exam.

tls

 a protocol that guarantees privacy and data integrity between client/server applications communicating over the Internet.

strong password

A password that is difficult to detect by both humans and computer programs

spyware

Any software that covertly gathers user information through the user'sInternet connection without his or her knowledge, usually for advertising purposes.

sniffer

A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. 

secure socket layer

a protocoldeveloped by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data

RSI

 common form of Repetitive Strain Injury (RSI) produced by repeating the same small movements many times. As more and more people usecomputers, carpal tunnel syndrome and other forms of RSI have become more prevalent. Typical symptoms are numbness or burning in the fingers or wrist. If not addressed early on, the injury can cause permanent damage

public key

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key toencrypt the message. Jane then uses her private key to decrypt it.

private key

 Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret.

key logger

A keylogger is a type of surveillance software (considered to be eithersoftware or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted.

hardware firewall

 system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

hacking

-In computing, a hacker is a person in one of several distinct (but not completely disjoint) communities and subcultures: * A community of enthusiast computer programmers and systems designers, originated in the 1960s around the Massachusetts Institute of Technology (MIT)'s Tech Model Railroad. 

brute force attacks

Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found. A classic example is thetraveling salesman problem (TSP). Suppose a salesman needs to visit 10 cities across the country. How does one determine the order in which cities should be visited such that the total distance traveled is minimized? The brute force solution is simply to calculate the total distance for every possible route and then select the shortest one. This is not particularly efficient because it is possible to eliminate many possible routes through clever algorithms.

browse hijacking

A specific type of spyware that will allow a hacker or malicious perpetrator to spy on the infected computer's Internet browsing activity. Using a browserhijacker the person responsible for the spyware can deliver pop-up ads, reset the browser homepage, or direct the browser to Web sites the victim would not normally visit.

telecommunicating

Refers to all types of data transmission, from voice to video

online learning

-Learning which utilizes the Internet and in which both learner and teacher utilize various subsets of the Internet repetoire of teaching and learning tools. In other words, Education that occurs online via computer.

keyless entry system

A remote keyless system is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar. There are several RKE systems on the market, including but not limited to KeeLoq by Microchip, HITAG by Philips, and AVR411 by Atmel.


Electronic commerce

Often referred to as simply ecommerce (or e-commerce) the phrase is used to describe business that is conducted over the Internet using any of the applications that rely on the Internet, such as e-mail, instant messaging, shopping carts, Web services, UDDI, FTP, and EDI, among others. Electronic commerce can be between two businesses transmitting funds, goods, services and/or data or between a business and a customer.

digital cash

A system that allows a person to pay for goe digital cash numbers are unique. Each one is issued by a bank and represents a specified sum of real money. One of the key features of digital cash is that, like real cash, it is anonymous and reusable. That is, when a digital cash amount is sent from a buyer to a vendor, there is no way to obtods or services by transmitting a number from one computer to another. Like the serial numbers on real dollar bills, thain information about the buyer. This is one of the key differences between digital cash and credit card systems. Another key difference is that a digital cash certificate can be reusense.

critical thinkung

Critical thinking involves determining the meaning and significance of what is observed or expressed, or, concerning a given inference or argument, determining whether there is adequate justification to accept the conclusion as true. 

businness to government

Business-to-government (B2G) is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels - including federal, state and local - through integrated marketing . Also, Denotes online communication between business entities and government. 

business to consumer

Business-to-consumer (B2C, sometimes also called Business-to-Customer) describes activities of businesses serving end consumers with products and/or services. B2C refers to commercial electronic commerce transactions between a business and a consumer. The area of marketing and commerce in which a company sells to individuals as opposed to other businesses (natch).

-Business-to-business (B2B) describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer. Contrasting terms are business-to-consumer (B2C) and business-to-government (B2G).Also, The area of marketing and commerce in which a company sells to other businesses as opposed to individuals. 

wildcard character

A special symbol that stands for one or more characters. Many operating systems and applications support wildcards for identifying files anddirectories.

wikpedia

A wiki  is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language or a WYSIWYG text editor. Also, Wiki software (also known as a wiki engine or wiki application) is software that runs a wiki, or a website that allows users to collaboratively create and edit web pages using a web browser. A wiki system is usually a web application that runs on one or more web servers. 

trademark

A Trademark in computer security is a contract between code that verifies security properties of an object and code that requires that an object have certain security properties. As such it is useful in ensuring secure information flow. Also, it is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify that the products or services to consumers with which the trademark appears originate from a unique source, and to distinguish its products or services. 

shared bookmark

A shared bookmark is an open source. It has data containing classification information would benefit users who are collaborating in similar research areas. They could open a bookmark shown on a page to find other related topics and follow them for bookmarks to other related documents.