Monday, January 24, 2011

Ic3 certification exam

Where: At Certiport testing centers
Cost: 35 dollars to take it.
When: class is offered every spring and fall semester 3:30 -  6:30pm
Research and Curriculum Unit
c/o Kathy Robbins
PO Drawer DX
Mississippi State, MS 39762

Friday, January 21, 2011

Journal Entry

        I have learned many things during the semester i learned how to use different types of programs and software. Some softwares are Microsoft Excel, word, powerpoint. I learned how to graph on Excel and also some shortcuts within them to make charts. in word i used to use Word Art and also to change the sizes of that text and also put it in a different style. I can make the text different colors and also have the text have shadows and the text will look more decorative. In powerpoint i learned how to use master slides and edit them to make a presentation look more professional. These skills will help me achieve my goals.

      My goal was to learn how to use different types of softwares and shortcuts within them. in these softwares i learned to use there functions and also how to edit text and make i t look decorative. In addition to this, technology is important for my career because the careers i am interested in are software programming, computer engineer and computer science. All these careers involve knowledge about computers. In computer engineering, I have to know about the computers and what makes up a computer and also how people might get viruses while them realizing, If i know this then i can clean up viruses from computers and make them good as new.

   There are some other technology skills that i would like to learn. some skills are how to make a computer. Also how take pieces of a computer and learn how to put them together properly and make your own computer. So  then you can put as how much memory you want and also the speed (GHz). According to this there are a few Academy Majors that i would like for my  high school career.  The Majors are Apple, Cisco and  programming. I would like to like to have these majors because it involves what i want to do for my life in the future. So that is what my careers are and how they will help me in my future.

Wednesday, January 19, 2011

MY future

Computer Engineer
NYU. Requirements are SAT subject tests, essay, interview and a GPA of 94%.
Manhattan college. requirements of a cumulative 3.2 GPA, pass the sat, transcript, teacher reccomendations.
Monroe community college. requires a special placement test and a high Sat score and a GPA of 85%.
Software programmer 
Kaplan University. the courser have to have at least a grade of a C, attend an interview, pass SAT tests.
Fairfield university.  Requires SAT score of 92%, 90% GPA, attend interviews.
Rochester Institute of Technology. At least 85-97% on SAT tests, High School Diploma, GPA of at least 85-95.
Computer Science
Westchester college. Require a regents diploma, attend early admissions program, pass all the regents
Devry University. required to attend interview, GPA of at least 2.00, at least 85% in math and science.
Trinity College. show high priority of academic performance, attend community service, high SAT score.

Friday, January 14, 2011

IC3 Certification Exam

it is a certification exam that tells your knowledge about computers and gives you a better chance of getting jobs

Transport Layer Security (TLS)

protocols that provide security for communication over the internet.

Strong Password

a password that is difficult to detect by humans and other computer programs.

Spyware

software that gathers information over the internet without the user knowing.

Sniffer

program or device that monitors data traveling over the internet.

Secure Sockets Layer

protocols that provide security for communications for communications over the internet.

Repetitive strain Injury (RSI)

injuries that are caused by repetitive tasks or awkward positions.

public key

key like messages that is known to everyone.

private key

encryption key that is known only to parties that exchange secret messages.

keylogger

a surveillance software that has the capability to record keystroke you make to a log file.

Hardware Firewall

this is security that protects a computer from getting viruses from a group of devices.

Hacking

hacking is when a user breaks into a computer and and have access to all the data.

Brute Force Attacks

 Brute Force Attacks are strategies that can be used against any encrypted data. 

Browser hijacking

 Browser hijacking is modification a browsers setting by malware. 

Telecommuting

Telecommuting is a term that describes an office where workers can work at home on a computer and transmit data. 

Online learning

software that teach you stuff like languages online.

Key less Entry System

a system that is designed to remotely permit or deny access to premises or automobiles.  

Electronic commerce

it describes business that is conducted over the internet using application like the internet.

Digital cash

a system that allows a person to pay for goods or services by transmitting numbers from a computer.

Critical Thinking

it is determining meaning and significance of what is observed or expressed.

Business-to-Goverment (B2G)

it is often referred to as a market definition which services to various governments.
 

Business-to-Consumer (B2C)

describes activities of businesses serving consumers with products.

Business-to-Business (B2B)

its commerce transaction between businesses like manufacturers and wholesaler. 

wildcard character

a special symbol that stands for one or more characters.

Wiki

a website that provides information about certain types of  topics.

Trademark

a name or symbol that identifies a product that is registered and legally restricted to use of owner or manufacturer.

shared bookmark

websites that you can put bookmarks in and other people can also see them.

Search Engine

a program that helps you look for what you need to search.

Related Search

functions in Google that automatically show you searches  that might relate to what you are searching for.

Public domain

they are property rights that are held by the public.

podcatcher

a computer program that is used to download types of media.

Plagiarism

this is when a piece of writing or text has been printed from someone else and is presented as its own work.

phrase searching

it is a type of search that allows users to search for documents containing and exact sentence or phrase.

peer-to-peer

it is a type of network and the workstation within them have same amount of capabilities and responsibilities. 

News feed

a type of data format that is used to provide content that is updated frequently. 

Math symbols

these are common symbols that are listed in HTML and a picture.

Link list

this is a type of method of organizing stored data in a computer memory or storage.

Libel

a libel is a a false publication that is printed for the purpose of framing a person.

Keywords

a keyword is an index entry that identifies specific documents.

Indexes

Indexes are keywords in databases and they identify a unique record.