Friday, January 21, 2011

Computer Fundamentals

What did you learn this Semester in Computer Fundamentals?      
        Through the year I learned how to use the computer better. Learned how to use Microsoft Word, Powerpoint, and Excel. Now I can use them, and understand what I'm doing. I have learned a lot of computer terms. And their all in my blog.

Why is technology important for any career you would be pursuing?       
         In the future I would like to make my own website, selling clothes. But clothes I made. Most probably with my dog character I always draw. I've already made a prototype. And so, I would like to make my website. 

What Academy major would you follow for the rest of your high school career?
         I might be going to multimedia because I love cameras. I'm getting a pro-camera. And I always go outside to take pictures. And post it up in "Flickr". I have a pro account already. So yea......I'm going to multimedia, making my own website.

Sunday, January 16, 2011

IC3 Certification Exam

IC3 helps teachers and instructors define their students' proficiency.

Transport Layer Security (TLS)

An alternative name for SSL.

Strong Password

Is a password that is difficult to detect by humans and computer programs.


Computer software that obtains information from a user's computer without the user's knowledge or consent.


Software that monitor activities over the network.

Secure Sockets Layer (SSL)

Set of rules for managing the security of a message transmission on the internet.

Repetitive strain Injury (RSI)

An injury that occurs when the same movement is repeated continuously.

Repetitive strain Injury (RSI)

An injury that occurs when the same movement is repeated continuously.

Public Key

The key in public key cryptography that is openly available and is not kept private.

Public Key

The key in public key cryptography that is openly available and is not kept private.

Private Key

The key of a signature key pair used to create a digital signature.


The keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Hardware Firewall

A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination.


A hacker is a person who breaks into computers, usually by gaining access to administrative controls.

Brute Force Attacks

The systematic, exhaustive testing of all possible methods that can be used to break a security system.

Browser hijacking

Browser hijacking is the modification of a web browser's settings by malware.


Employment at home while communicating with the workplace by phone or fax or modem.

Online Learning

Learning delivered by Web-based or Internet-based technologies. See Web-based training and Internet-based training.

Keyless Entry System

Remote keyless system is a system designed to remotely permit or deny access to premises or automobiles This system was invented by mechanical engineer A.B. Makkar.

Electronic Commerce (e-commerce)

Consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks.

Digital Cash

Refers to money or scrip which is exchanged only electronically.

Critical Thinking

Critical thinking involves determining the meaning and significance of what is observed or expressed.

Business-to-Government (B2G)

Is a derivative of B2B marketing and often referred to as a market definition of "public sector marketing" which encompasses marketing products and services to various government levels.

Business-to-Consumer (B2C)

Describes activities of businesses serving end consumers with products and/or services.

Business-to-Business (B2B)

Describes commerce transactions between businesses, such as between a manufacturer and a wholesaler.

Wildcard Character

The term wildcard character has the following meanings: In telecommunications, a wildcard character is a character that may be substituted for any of a defined subset of all possible characters.


Is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser.


A trademark or trade mark is a distinctive sign or indicator used by an individual, business organization.

Shared bookmark

These bookmarks are usually public, and can be saved privately.

Search Engine

A computer program that retrieves documents or files or data from a database or from a computer network.

Related Search

Related topics from your search.

Public Domain

Property rights that are held by the public at large.


A podcatcher, or podcast client is a computer program used to download various media via an rss or xml feed.


A piece of writing that has been copied from someone else and is presented as being your own work.

Phrase Searching

A search engine may provide an option to search a set of words as a phrase.

Peer-to- Peer (P2P)

Is any distributed network architecture composed of participants that make a portion of their resources.

News Feed

Is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed.

Math Symbols

This is a listing of common symbols found within all branches of mathematics.

Link List

A link exchange is a confederation of websites that operates similarly to a web ring. Webmasters register their web sites with a central organization, that runs the exchange, and in turn receive from the exchange HTML code which they insert into their web pages.


Written and published or broadcast statemen.


A keyword is a word or identifier that has a particular meaning to the programming language.


A database index is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased storage space.

Wireless LAN (WLAN)

Usually provides a connection through an access point to the wider internet.

Wireless Internet Service Provider(WISP)

Are Internet service providers with networks built around wireless networking.


Meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes.

Wide area Network (WAN)

A computer network that spans a wider area than does a local area network.

T-1 Line

A character encoding used in computer programming and telecommunications.

Server Operating System

An operating system that is designed for network use.


A computer that provides client stations with access to files and printers as shared resources to a computer network.


Is an electronic device that is used to forward data between computer networks.