Monday, October 31, 2011
Wednesday, October 26, 2011
Test Review
1.) Creative Commons- in notes
Intellectual property- in notes
Copyright- in notes
Public domain- in notes
Freeware- Software that is free of charge.
Shareware- Software distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly.
Open source- Denoting software for which the original source code is made freely available and may be redistributed with or without modification.
Attribution- in notes
Commercial use- in notes
Derivative- Something that is based on another source.
Share-alike- descriptive term used in the Creative Commons project for copyright licenses which include certain copy left provisions.
Firewall- Any barrier that is intended to thwart the spreads of destructive agent.
Virus- A program that enters a computer usually without the knowledge of the operator
Hacking- To gain access to (a computer file or network) illegally or without authorization
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation: tips on finding and removing viruses ,spyware, and other malware.
Phishing- to try to obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake Web site that replicates the real one.
Identity theft-in notes
Data back-ups- In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
Cloud- in notes
Cookies (as pertaining to computers and Internet search)- A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.
File sharing- Peer-to-peer file sharing is a form of file sharing using peer-to-peer networking.
2.) FTC duties: The duties of the FTC are, in general, to promote fair competition through the enforcement of certain antitrust laws; to prevent the dissemination of false and deceptive advertising of goods, drugs, curative devices, and cosmetics; and to investigate the workings of business and keep Congress and the public informed of the efficiency of such antitrust legislation as exists, as well as of practices and situations that may call for further legislation. In addition, any copyrighted work that consists predominantly of material produced by the FTC or other U.S. government agency must provide. Commons is a freely licensed media file repository
Intellectual property- in notes
Copyright- in notes
Public domain- in notes
Freeware- Software that is free of charge.
Shareware- Software distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly.
Open source- Denoting software for which the original source code is made freely available and may be redistributed with or without modification.
Attribution- in notes
Commercial use- in notes
Derivative- Something that is based on another source.
Share-alike- descriptive term used in the Creative Commons project for copyright licenses which include certain copy left provisions.
Firewall- Any barrier that is intended to thwart the spreads of destructive agent.
Virus- A program that enters a computer usually without the knowledge of the operator
Hacking- To gain access to (a computer file or network) illegally or without authorization
Piracy- the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product, etc
Malware- software intended to damage a computer, computer system, or computer network, or to take partial control over its operation: tips on finding and removing viruses ,spyware, and other malware.
Phishing- to try to obtain financial or other confidential information from Internet users, typically by sending an e-mail that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake Web site that replicates the real one.
Identity theft-in notes
Data back-ups- In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.
Cloud- in notes
Cookies (as pertaining to computers and Internet search)- A message given to a Web browser by a Web server. The browser stores the message in a text file. The message is then sent back to the server each time the browser requests a page from the server.
File sharing- Peer-to-peer file sharing is a form of file sharing using peer-to-peer networking.
2.) FTC duties: The duties of the FTC are, in general, to promote fair competition through the enforcement of certain antitrust laws; to prevent the dissemination of false and deceptive advertising of goods, drugs, curative devices, and cosmetics; and to investigate the workings of business and keep Congress and the public informed of the efficiency of such antitrust legislation as exists, as well as of practices and situations that may call for further legislation. In addition, any copyrighted work that consists predominantly of material produced by the FTC or other U.S. government agency must provide. Commons is a freely licensed media file repository
Friday, October 21, 2011
Copyright Music and Lyrics
When writing music you get the copyrights for that for 95 years, if you did you get the copyright for 70 years after your death. Having the copyrights to music or lyrics is saying that know one else can copy that. January 1st, 2019 is the current public domain music in the U.S. Public Domain is where anyone can use it without citing the source, including where it came from and who it came from. Proof of Public Domain is where you have to site the source of the music, movie, book, etc.
The song was on the album “Seven Dreams” originally by Gordon Jenkins. Fifteen years after Johnny Cash wrote “Sweet Dreams: The Conductor” , the two songs were compared and some of the lyrics were word for words or only a couple of words were changed. Although, Johnny Cash’s song was a more talented piece, it was still copyright. In 1968 the out of court settlement was about one-hundred-thousand dollars.
The song was on the album “Seven Dreams” originally by Gordon Jenkins. Fifteen years after Johnny Cash wrote “Sweet Dreams: The Conductor” , the two songs were compared and some of the lyrics were word for words or only a couple of words were changed. Although, Johnny Cash’s song was a more talented piece, it was still copyright. In 1968 the out of court settlement was about one-hundred-thousand dollars.
Wednesday, October 19, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
Podcast
1.) A podcast is a file that allows you to download things to a potable media player, such as and MP3 or Ipod. It is a multimedia digital file.
2.) Podcast could be used for many different things. It could be usd for entertainment, teaching, or music.
3.) You can locate podcasts on many websites. You can usually find a podcast on any subject. One website you can find it on is ITunes.
2.) Podcast could be used for many different things. It could be usd for entertainment, teaching, or music.
3.) You can locate podcasts on many websites. You can usually find a podcast on any subject. One website you can find it on is ITunes.
Wednesday, October 5, 2011
Identity Theft
2.) She shouldn’t of used her debit card, because that Is not wise if you want to protect your bank account. Also if you use a debit card you don’t get reimbursed fully especially if you don’t notice it right away. If you use a credit card then you do get reimbursed all the way.
If someone wants to steal from you or get revenge on you they could use identity theft, that’s why its so popular, anyone can do it.
To steal a person’s identity you would need their credit card number, social security number, name, basic physical features, personal info (address, phone#, and birthday etc.)
To protect your identity from being stolen check bank frequently to see what had been being bought.
The person who is stealing the identity, because the person who gets their identity stolen can be doing every day regular stuff, and not doing anything wrong.
Tuesday, October 4, 2011
Emerging Technology
A new emerging technology is "Noah" . This incandescent yellow capsule is made my a small Japenese company. It floats and it is used in the case of an earthquake or tsunami. It could save the lives of up to 4 adults. It is also water and fire resistant. "Noah" is made from enhanced fiber glass, and the sphere include a porthole window, air vents, and a bright yellow covering so it is easily noticed. The reason why it is a sphere is because it has to withstand hits, shocks, and landslides.

http://www.gizmag.com/floating-tsunami-capsule/20043/
http://yelekci.com/2011/10/04/floating-tsunami-capsule-is-designed-to-save-lives/?utm_source=rss&utm_medium=rss&utm_campaign=floating-tsunami-capsule-is-designed-to-save-lives
http://www.washingtonpost.com/world/asia-pacific/small-japanese-factory-has-answer-to-next-tsunami-and-quake-mini-noahs-ark/2011/09/30/gIQAwNAZ9K_story.html

http://www.gizmag.com/floating-tsunami-capsule/20043/
http://yelekci.com/2011/10/04/floating-tsunami-capsule-is-designed-to-save-lives/?utm_source=rss&utm_medium=rss&utm_campaign=floating-tsunami-capsule-is-designed-to-save-lives
http://www.washingtonpost.com/world/asia-pacific/small-japanese-factory-has-answer-to-next-tsunami-and-quake-mini-noahs-ark/2011/09/30/gIQAwNAZ9K_story.html