Monday, December 14, 2009

Alice


  1. Alice is an innovative 3D programming environment that makes it easy to create an animation for telling a story, playing an interactive game, or a video to share on the web

  2. To download Alice you would have to go to http://www.alice.org/, then click download.

  3. It offers four different worlds, and a ton of sprites such as anything from stuff that has to deal with high school, to Egypt, to outer space

  4. To make short skits and make games.

  5. The pros of Alice are that you can create your own little world and make the objects do what you want them to do, think, and say.

  6. The cons of Alice it that it is difficult to figure out how works and how to get your animations to move a certain way

  7. In Alice I made a snow world that had three penguins dancing.

  8. I enjoyed Alice it was a fun experience

  9. I think I would use Alice again because it kept me entertained and that it was just really fun to work with.

Friday, November 20, 2009

Cyber Bullying

Megan Meirer committed suided at the age of 13 due to cyber bullying. Megan was a vitcim, a group of individuals had created a fake myspace of a boy whom they named "Josh Evans" a 16-year-old boy who had taken a liking to Megan. On October 16, 2006, "Josh" told Megan, that the world would be a better place without her in it. Later that day Megan hanged herself in a closet at her family's O'Fallon, Missouri home. I think that it was wrong for a group of individuals to do that to a poor innocent girl, just because she didn't fit in with the "cool" crowd. Nobody really knows what happend to the bully's but the person who was bullied killed herself. This could have been prevented if Megan had more self asteam.

Thursday, November 19, 2009

Staying Civil Online


a.) 5 rules for Internet etiquette.
1. Use your personal cell phone for personal phone calls
2. Don't write anything in your email that you don't want your boss to read
3. Your Internet usage can be monitored, so don't do any personal web surfing at home
4. Don't use your personal email account from work, since an employer can tap into exactly what you see on your screen
5. Don't talk on the phone if it doesn't involve work

b.) 7 "netiquettes"
1.Behaving as though you are communicating in person.
- act as if you were face to face with the person your emailing
2. Remember that your words are open to interpretation
- when you are posting or sending something becareful of what you say so that you don't offend anyone.
3. Do not "shout" online
- don't not use all caps when talking to someone
4. Do not "flame" online
- don't post or say anything derogatory
5. Do not send spam
- don't send junk mail, or addvertisments.
6. Do not distribute copyrighted material
- don't take somebody elses words and not give credit to them
7. Do not be a coward
- don't say or do anything stupid

c.) I think and netiquette is important because it lets you know what your limits are.

Wednesday, November 18, 2009

Acceptable Use Policy


a.) An AUP is a set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used.

b.) AUP is used at Glenvar by the dress code.
- 5 important rules
1. Short must be longer than mid thigh
2. No spaghetti straps
3. No holes in jeans
4. No inappropiate wrighting on your clothing
5. No showing mid-drift

c.) An AUP policy could be put in place at a job by

d.) AUP's are necessary because it reduces the potential for legal action that may be taken by a user, and often with little prospect of enforcement

e.) If I was the boss of a large company and each employee had their own computer and access to internet, the rules and regulations I would have would be, no usage of cells phones or internet unless it involes work.

Emoticons



a.) An emotion is any strong feeling.

b.) An emoticon is representation of a facial expression created by typing a sequence of characters in sending email.

c.) 10 examples of emoticons and what they mean.
1. O:-) Angel
2. (: Happy
3. =^.^= Cat
4. :( Frown
5. \VVV/ King
6. :-o Shocked
7. (: Tired
8. ;) Winking
9. -@--@- Eyeglasses
10. <:3 )~ Mouse

d.) An acronym is a word formed from the initial letters of the several words in the name.

e.) 10 appropriate examples texting/IMing acronyms. 1. BTW - By the way 2. FWIW - For what it's worth 3. GTG - Got to go 4. hw - Homework 5. LOL - Laughing out loud 6. MYOB - Mind your own business 7. N/A - Not Available 8. ROTFL - Rolling on the floor laughing 9. U2 - You too 10. FUBAR - Fouled up beyond all recognition

Tuesday, November 10, 2009

Hyper Text Markup Language

1. What is HTML?
is the predominant markup language for web pages.

2. What is a tag? Give an example
tag is anything between the greater or less than signs

3. Explain "open" and "close" tags
an open tag is a anything between < > and a close tag is anything between
4. Steps to create a HTML site.
- open note pad
- put < html > hit enter < title > hit enter and < body >
- space down a couple of times
- then put hit enter hit enter and

5. Give 3 websites that give good examples of HTML tags to copy and paste
a.) www.quackit.com/html/codes/
b.) www.web-source.net/html_codes_chart.htm
c.) www.htmlcodetutorial.com/quicklist.html

6. How do YOU feel about HTML? What did you know already? What do you know now? Will this help you with anything in the futre? Why/Why not?
HTML is easy for me and i knew have the html codes and know i know how to make a web site and it probley will.

Thursday, October 22, 2009

1. An Ethernet cable is used to directly connect two network devices.

2. Materials: network cable, 2 RJ45 jacks, cable pliers

3. Instructions:
  • Cut wire to desired length

  • Strip blue tubingUntwist and straighten colored wires

  • Place colors in correct order: light orange, dark orange, light green, dark blue, light blue, dark green, light brown, dark brown

  • Cut wires evenly (keep in order)

  • Hold jack with clip down, place wires inside (copper must be meeting copper)

  • Make sure wires are in correct order and in the right slot.

  • Clamp it down.

  • Repeat process on other end of cable.

4. To test, place one end of the cable into a cable modular, and the other end into a second modular. If the lights turn green, the cable works. If the lights have a mixture of green and red, the cable does not work.


5. Building an Ethernet cable is relatively simple, but it is extremely easy to mess up. The colored wires must be in the correct order, and they easily get twisted. Sometimes, the tips of the wires do not reach the copper in the jack. I had to redo mine at least 5 times before it worked. Now that I know what to do, I would make sure that the wires are completely straight and even before placing them into the jack.

Tuesday, October 13, 2009

Charges Filed Involving Interception of Internet Email and Computer Keystrokes.

Scott Graham, age 38 was accused for intercepting and endeavoring to intercept Internet email
and computer keystrokes of others, without their knowledge or consent. If convicted, the defendant’s sentence will be determined by the Court after review of factors unique to this case, including the defendant’s prior criminal record, if any, the defendant’s role in the offense and the characteristics of the violation. In all cases the sentence will not exceed the statutory maximum and in most cases it will be less than the maximum.

Friday, October 9, 2009

- The four benefits of using a network:
1. many users to access programs and data at the same time
2. users to share peripheral devices, such as printers and scanners
3. make personal communications easier
4. make it easy for users and administrators to back up important data files

- WANs are Wide Area Networks that consist of two or more LANs connected together and are generally across a wide geographical area.

- LANs are Local Area Networks of computers that are relatively near each other and are connected in a way hat enables them to communicate.

- Three common network topologies are the bus, ring and star.

- Network Operating System Software Examples:
1. Novell NetWare
2. Microsoft XP
3. Linux
4. Microsoft .NET Server

- Client/Server Networks involves the individual computers sharing the process and storage workload with a central server.

- Peer-to-Peer Networks, sometimes called workgroups, all nodes on the network have equal relationships to all others and they all have similar types of software that support the sharing of resources.


- The difference between the two is that Client/Server Networks work individually while Peer-to-Peer Networks work in groups.

What I think about blogs.

What is the purpose of a blog?
- an online journal you can use to discuss a range of topics.

What pros and cons do you see about blogs?
- pro's you can disscuss how you feel and con's you could give out to much information.

Are they safe? Why/Why not.
- blogging, is 50/50 when it comes to being safe because you can still see everything thing you post but it is still safe because you don't have to give out every little detail about yourself.

Explain how blogs could be used as an educational tool.
- I really don't know how it could be used as an educational tool.