Friday, April 16, 2010

Chapters 9&10 quiz

1. 1) For windows use a junk-cleaning program. This keeps your computer free of files that you don't really need. 2) Use windows disk cleanup utility. This gets rid of things that aren't needed if you are running out of space on your hard drive. 3) For Macs you can get rid of unwanted applications. If you only use the application for a little bit just get rid of it if you aren't going to use it anymore. 4) Delete files that are no longer needed. If you are running out of hard disk space delete files that you no longer need. 5) Delete printer drivers that you no longer need. The mac has space for all printer drivers but you can delete the ones you don't need to make more space for the ones you do need.

2. I try not to download things i don't need. I also delete files if they are no longer needed. I haven't tried all his methods but I bet they will help get my computer running faster.

3. Data scrubbing is deleting the files and then writing over them with ones and zeros to get rid of the magnetic particles that store the info so there is no way to find out what was in the files.

4. A cookie file allows websites to know who you are if after being on their web site at an earlier time. The good cookies are for sites like amazon that remember who you are and show you products that you might be interested in. Bad cookies are when advertising companies use them to track what web sites you go to and they keep a record of the sites that belong to the network that they visited.

5. Key logging is when a program records every key stroke you make and then sends it to a hacker who then goes through it looking for your passwords, banking information etc. He recommends you use Ad-Aware Personal and Webroot Spy Sweeper. Some companies offering free spyware are actually spyware promulgators. Before downloading anything that says is a free spyware look it up at symantec.com.

6. People send emails out to people pretending that they are a website trying to get the persons information like the credit card number there drivers license number and other things that would help them steal their money. Pharming is a type of identity theft when you land on a fake website.

Friday, April 9, 2010

Chapter 8 assessment

1. Wi-Fi is a wireless internet connection. Wireless phone headsets can interfere with your Wi-Fi connection and baby monitors and microwaves. Interference happens because some things use the same 2.4 or 5-GHz bands.
2. There is a logging system that lets you see what websites have been used recently. Norton anti virus has a Intrusion Detection Software which tells you if there is someone using your connection. You can also get free shareware programs. Or you could just use your WEP or WPA to lock your connection and keep them out.
3. I agree with the author. I believe it was ridiculous that the man was fined $250 just for using someones wi-fi connection. He wasn't trying to break into their computer system so why should he get in trouble for using their internet? If people can't keep others from using their wi-fi connection then it is their fault.
4. You need to get a separate phone line for your DSL or it wont work. 911 doesn't work on VoIP. If your power goes out or if you lose internet connection then you will not have a phone line. Other communication businesses charge you more than businesses like comcast and they have hidden fees.
5. Delete the email if it is something you know you don't need to read. Answer the email if it is something you can answer fast. Let someone else deal with it if they know how to answer the email better than you. Save the email if it is something you want to keep like a password or a receipt. Tag if for later action if you cant deal with it move it into a different folder and deal with it later.
6. 1. don't let spammers know you exist, don't post your email address online. 2. Never reply to spam or click the link. 3. Don't ever buy anything that is advertised using spam. 4. use you internet providers spam filtering options. 5. Use the spam filtering that comes with your email service. 6. use a third party filter.

Friday, March 26, 2010

Blog assessment chapter 6

1. I typed in Pittsburgh and one of the things it told me to do was under what hotel to go to and it says to go to the spring hill suites. Also, under things to do it says go to the Silver eye center for photography. The recommended restaurant is Shootz Cafe.

2. Twitter is a social network and also acts as a blog. I do not use twitter.

3. It says major credit reporting agencies have to give you a free credit report every 12 months. You should check it to see if anyone has opened you credit account using your name and your social security number. Your FICO score is what lenders look at to see if they should give you a loan or not.

4. Microfinancing is lending money to individuals in countries that are poor. The author recommends you use kiva.org. Kiva combines microfinancing with the internet so people can send money to other people in poor countries. Kiva was built on beliefs such as, people are generous and will help others, The poor can be highly motivated if you help them out, and giving them money can help people come together and have a global community. They promote dignity, accountability and transparency. Two groups giving money are Kiva Christians and Team Europe.

5. It will take 18 months to pay of the debt if it is done correctly. You will pay $381 in interest. It goes up a little and then goes back down.

6. It tells you ways to get rich quick by investing in the market. This is interesting because getting rich would be kick ass.

Friday, March 5, 2010

Chapter 5 Assessment

1. Get the real story on questionable stories. Snopes.com is the clearing house for urban legends and other things like that. Two people look at hundreds of emails a day to look for viruses and other bad things that can be in an email. Cell phone numbers will be given to telemarketers. This was proved false. A plea to help find missing girl Ashley Flores. This was also proved false.
2. Go to changedetection.com and type in the address of the site you want to know about and your email. This site will check the site everyday and let you know if there were any changes done.
3. It can help you organize a block parties with your neighbors who are a part of the same political party as you and you can raise money for your party. Jerry Springer donated $4,600 to Hilary Clinton and $2,000 to Dennis Kucinich.
4. It will help you find music you like based on the music it knows you like. It tried to find other artists that are like the one I searched. It put the name of the bands in circles and linked them together and puts the bands or artists that are closest to the one you searched in the circles in the middle.
5. It’s a web site where you can get different media over the internet. If you have an account only you can use it. Don’t break any of the copyright laws.

Monday, March 1, 2010

My PowerPoint Ideas

My first ideas is I can teach the class how to light paint. Light painting is freezing light and drawing with it in a photo. I could go through all the steps that you need to take to make a light painting photo graph.

My other idea is teaching beginner guitar. I could teach the class different chords, how to pick the strings, where to put your fingers on the fret board etc.

Friday, February 26, 2010

Chapters 3&4 assessment

1. Get anti-Virus software, Dumper internet explorer and use firefox, use a fire wall to block things that are not authorized access to your computer.
2. Automatically bidding after you get out bid. Ebay will automatically bid for you if you are out bid on something you are trying to purchase.
3. Sniping is entering your bid at the last second. This is a technique used so other bidders do not have enough time to out bid you.
4. The police can find the buyer of a stolen product by tracing it through the company then through the seller and finally coming to you. To avoid this never make a payment using wire transfer.
5. It is a different credit card number your bank gives you online so you can shop online. If a hacker tries to use the credit card they will get denied/

Thursday, February 18, 2010

Chapter one assessment

1. Domain names are human readable internet addresses. The IP address is the address for each computer when connected to the internet. The IP address lets the network know where the computer is. The domain name remembers the IP address.
2. ICANN overseas the domain name system.
3. Write about what you are interested in. Don’t worry about being the first person to post something. Limit the links you have in an entry.
4. RSS is a way to subscribe to blogs. The book recommends feed reader or aggregator. I have never used RSS.
5. Choose a name for your podcast. Record your podcast. Add the audio. Publicize your podcast. I have never listened to podcast.