Wednesday, November 30, 2011
Tuesday, November 22, 2011
Monday, November 21, 2011
Wednesday, October 26, 2011
notes thingy
Cookies, cookies are small text files used by websites for the purpose of personalization
firewall, blocks out others
virus, a part of program designed to penetrate your computer system and change the way it works.
Hacking gaining access to something you shouldn’t.
, piracy, self explanatory
malware, malicious software
freeware, Computer software distributed without charge
shareware, free of charge but ask for a donation for repeated use.
Creative Commons,
Intellectual property,
copyright,
public domain,
open source,
attribution,
commercial use,
derivative,
share-alike
, firewall, blocks out others
phishing,
identity theft,
data back-ups,
cloud,
firewall, blocks out others
virus, a part of program designed to penetrate your computer system and change the way it works.
Hacking gaining access to something you shouldn’t.
, piracy, self explanatory
malware, malicious software
freeware, Computer software distributed without charge
shareware, free of charge but ask for a donation for repeated use.
Creative Commons,
Intellectual property,
copyright,
public domain,
open source,
attribution,
commercial use,
derivative,
share-alike
, firewall, blocks out others
phishing,
identity theft,
data back-ups,
cloud,
Wednesday, October 19, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
podcast info question answers
1. a podcast is audio content on a website that can be transferred onto an adio player.
2. somone posts a podcast to a site and others download. they can be used for advertising and communication.
3 . you can locate podcasts all over the internet.
2. somone posts a podcast to a site and others download. they can be used for advertising and communication.
3 . you can locate podcasts all over the internet.
Wednesday, October 5, 2011
lang blog response. id theft garbage
1. She used her debit card too much.
2. Because its easy to do and one of the most beneficial to the attacker.
3. Bank statements or credit cards.
4. Shred any evidence of that stuff before throwing out.
5. The thief. Yes it is stupid not to protect yourself but stealing is wrong under any circumstances.
Tuesday, October 4, 2011
fusion report
Cold fusion/ regular nuclear fusion.
inertial fusion ignition
this is a new way of trying to achieve nuclear fusion. what theey do is put a very expensive "fuel pellet" inside a block of solid gold, then they fire insanely powerful lasers at it and the gold converts some of that energy into a very specific kind of x ray that heats the pellet to over 60 million degrees. this causes to like charged atoms ( the nucleus's specifically) to fuse together and overcome the repulsion giving of tremendouse amounts of energy. well almost they are very close to that.
"These lasers are pulsed, and for a very short amount of time"—one ten-billionth of a second—"the power they produce is more than all the power generated by the entire electrical grid of the United States" at any given moment,
Also, the fused atoms can nullify harmful radioactivity.
"the implosion will be like squeezing a soccer ball to the size of a pinhead,"
http://news.nationalgeographic.com/news/2010/01/100128-nuclear-fusion-power-lasers-science/
Thursday, September 29, 2011
Thursday, January 20, 2011
Thursday, January 13, 2011
snow day
my snowday was nice. It was very refreshing to have a day off. i caught up on work and r&r. hope for another soon.
Subscribe to:
Posts (Atom)

