Monday, January 24, 2011

Extra Credit mcgheny



Where:

You can take an IC3 exams at Certiport Testing Centers.
CERTIPORT CENTER BENEFITS are help Centers make the most of their certification offerings through extensive support and expertise.


How Much:


The cost of the IC3 certification is around $30.00 per exam. There is a total of 3 exams. Some testing sites offer discounts because they purchase their exams



When:


You have to make an appointment.


FinalProjectmcghenykerniuspd 7

This year in Computer Fundamentals, I have learned a lot about computers. I learned the uses of all the programs on the computers. we learned about Powerpoint, Word, Office and many more.  We were able to use different programs in the computer and learn their function and the purpose of each button on the window.
                 we were told that we would need this knowledge to any job we applied for, it would be very important to take this class. in the future no matter what job I will apply for, the basics will come in handy. Since one of the job I will like to pursue have to do in computer programming I will have to learn the more advance functions rather than the basics.   I plan on taking classes for computer programming, things that I learn will have a major impact on the careers I choose to pursue in my future because most things are going to be solved using computers.

Wednesday, January 19, 2011

My Future

-Basketball
   * Syracuse- You are going to need good basketball skills and good grades.
   * Duke- Good Grades and Good Basketball skills.
   * Uconn- Good Grades and basketball skills.
-Technology(programming)
  *MIT- Good grades and an interest in programing.
  *Stanford- Really good grades and interest in computer programing.
  *Washington University- Its a great school all you need is good grades, but it's really expensive.  
-Football
  *Auburn-  Great college you need good grade and really good football skills
  * North Carolina- Great college you need good grade and really good football skills
   * Notre Dame- Great college you need good grade and really good football skills

Sunday, January 16, 2011

IC3 Certification Exam

IC3 Certification Exam is the world's first validated, standards-based training and certification program for basic computing and internet knowledge .

Transport Security Layer

Transport Security Layer are protocols that provide communications security over the internet.

strong password

A strong password is a password that is difficult to detect.

Spyware

Spyware is a computer software that obtains information from a user's computers without the user's knowledge of consent.

Sniffer

Sniffer is a software that monitors activities over the network.

Secure Sockets Layer

Secure Sockets Layer is a security technology that is commonly used to secure serverto browser transactions.

Repetitive strain Injury

Repetitive strain Injury is an injury caused by doing an action over and over again.

Public key

Public key is one pair keys that is used by public key encryption or cryptography.

private key

A private key is a signature key pair used to create a digital signature.

Key logging

Key logging is the practice of tracking the keys struck on a keyboard.

Hardware firewall

Hardware firewall is firewall that is built into a router or a stand-alone device.

Hacking

Hacking is when you break into a computer.

Brute force attacks

Brute force attacks are methods of obtaining a user's authentication credentials.

Browser hijacking

Browser hijacking is when changes are made on the browser without being permitted.

Telecommuting

Telecommuting is when you employed but you work at home while communicating with the workplace using a phone or fax or modem.

Online learning

Online learning is when you get educated on the internet. 

keyless entry

A keyless entry system was designed to remotely permit or deny access to premises or automobiles.

Electronic commerce

Electronic commerce refers to buying or selling products electronically.

Digital cash

Digital cash refers to money that is exchanged electronically.

Critical thinking

Critical thinking means determining the meaning of something that you observed or expressed.

Business-to-government

Business-to-government means companies that are marketing products and services to various government levels.

Business-to-customer

Business-to-customer means communication between a business and a customer.

Business-to-business

 means transactions or communication between businesses.

wildcard character

A wildcard character is a character that may be substituted for any of a defined subset of all possible characters.

Wiki

Wiki is a website that allows the easy creation of and editing of any number of interlinked web pages.

Trademark

A trademark is symbol, design or writing that specifies the sources of goods.

Shared bookmark

A shared bookmark is a bookmark that is used in many computers. 

Search Engine

A search engine is a site that you can go to, to find  information.

Related Search

A related search is a search operator that allows the user to find websites similar to the site you specify. 

Public Domain

property rights that are held by the public at large

Podcatcher

A podcatcher is user that uses a series of digital media files.

Plagiarism

a piece of writing that has been copied from someone else and is presented as being your own work 

Phrase Searching

phrase search  means you want to search for a phrase. 

Peer-to- Peer (P2P)

Peer-to-peer network are common in small offices, its a network of computers that allow certain files and folders to be shared with everyone or with selected users.

News Feed

A news feed is a data format that provides users with updated contents.

Math Symbols

math symbols can contain the addition symbol which allows adding. The multiplication symbol which allows you to multiply. The division symbol which allows you to divide, and the subtraction symbol which allows you to subtract.

Link List

A link list contains data fields and one or two links pointing to the next and/or previous nodes.

Libel

A libel is a false document or publication printed for the purpose of defaming a living person.

Keywords

Keywords are the words that are used to reveal the internal structure of an author's reasoning.

Indexes

A database index is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.  

Tuesday, January 11, 2011

Secure Sockets Layer

Secure sockets layer is a set of rules for managing the security of a message transmission on the Internet.

Feed

Feed is a general term for the electronic distribution of text, audio, or video.

Directories

Directories are books with alphabetical lists of names and addresses.

Copyright

A copyright is the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something.

Boolean logic

Boolean logic is a system of symbolic logic devised by George Boole.

Blog

A blog is a journal that can be edited, read, and written on-line.

Wiki

Wiki is a piece of server software that allows users to freely create and edit Web page content using any Web browser.

Webapp

A webapp is a application that is accessed via a web browser on the internet.

Website

A website is a computer connected to the Internet that maintains a series  of web pages.

Web Cache

A web cache stores copies of documents passing through it.

Web 2.0

Web 2.0 is the second version of the world wide web.

Uniform Resource Locator

Uniform resource locator is the address of a website on the world wide web.

Social Networking Site



A social networking site is a site that focuses on building a social relation with people. 

Really Simple Syndication (RSS)

Really simple syndication allows you to collect news and postings from newspapers, blogs, libraries, etc and to read them in one place. 

Portal

A portal is a website or service that offers a broad array of resources and services.