Monday, November 21, 2011
Wednesday, October 26, 2011
Malware- short for malicious software, consists of programming code, scripts, active content, and other software designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.
File sharing- is the practice of distributing or providing access to digitally stored information, such as computer programs, audio, images, and video, documents, or e books.
cloud - when information is stored over a network rather than a direct soucre
cookies- is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site other known as a ditigal trace
vocab terms to study taylor perry
File sharing- is the practice of distributing or providing access to digitally stored information, such as computer programs, audio, images, and video, documents, or e books.
cloud - when information is stored over a network rather than a direct soucre
cookies- is used for an origin website to send state information to a user's browser and for the browser to return the state information to the origin site other known as a ditigal trace
vocab terms to study taylor perry
Monday, October 17, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
What is a podcast?
A podcast is a non streamed webcast that can be downloaded for free by users.
it usally is a audio or a video file that can be veiwed or heard at the users delight.
it usally is a audio or a video file that can be veiwed or heard at the users delight.
Wednesday, October 5, 2011
identity theft
o What mistakes did this woman make to have her identity stolen?
she gave out her information a bit too quick. She should have checked to see if she was the proper person to give it to.
o Why do you feel ID Theft is such a common problem these days?
It can happen to anybody, also there are more ways than ever that can put you at risk.
o What type of documents or personal belongings would someone have to obtain to steal a person’s identity?
They would need to steal multiple things or just some depending on what acts there going to commit. They could steal a credit card number,your liscence number ,soical secturity number, or just plain out use your name and address.
o What are some ideas that you would suggest to someone to protect their identity from being stolen.
I would say Ask questions! see if the site and or place is a safe or legititmit place you can trust with your information. Dont give it out if you dont have too.
o Who do you think is to blame, the person stealing the identity, or the person who is not protecting themselves from identity theft?
I would think both in a sense but mostly the person commiting the crime is more at fault for breaking the law doing it.
Wednesday, September 21, 2011
Tuesday, September 20, 2011
about me
its my first blog post im in the us army and im attending high school and im going to use this blog for personal use, work, and school.
Subscribe to:
Posts (Atom)