Friday, March 26, 2010

A Recent Computer Application (The Kindle)




The "Kindle" is a recent computer applications which wirelessly sends books to your device (The Kindle). It makes books easier to read and all your readings are compacted into one small device. It is 3G wireless coverage in the USA and 100 other countries. The "Kindle" is becoming very popular and the average price for one is about $300, however some are lower in cost and some are higher in cost depending on the memory.


The "Kindle" does not have a glare on the screen. It is just like you are reading from an actual book. The battery can last up to a week depending on the use. There is a built in PDF reader. There are over 450,000 books available to download on the "Kindle". It is the up and coming thing and are very popular with students especially and people who enjoy to read.




Wireless Networking Precautions




Wireless networking precautions are very important to take. If one does not take wireless networking precautions someone that is not very far away can get into your computer and spy on your documents and anything in your computer. Therefore, one must secure their wireless network so this does not happen to them.




To secure a wireless network should be protected with a password. This ensures that not just anyone could tap into your wireless network. Precautions need to be taken in homes, public areas, schools, and companies. However, not everywhere a person goes is going to have a secure network. When one goes to connect to a wireless internet it will say secure or unsecure. It is highly recommended not to use an unsecure network as it can lead to your files being looked or stolen by strangers.


Strong Password (How to create them)




In order for a password to be strong, it must not contain letters. A strong password needs to contain letters, numbers, punctuation, and symbols. It is highly suggested to use at least 14 characters for a password to be a strong password. An example of a strong password would be ?AFi7aT82ey.#sp. That password contains letters, numbers, symbols, punctuation, capital and lower case letters, and it is at least 14 characters long.


To create passwords people may think of something they like to do or something that they love. Then from there they add punctuation to the beginning and end. Also, they need to include numbers, maybe numbers that are meaningful such as they're fathers birthday. They need to use the entire keyboard instead of just using one section of the keyboard for the password to be as strong as possible.

Internet Parental Control Software

Most people with children choose to have Internet parental control software. Parental control software blocks children from visiting bad websites, limits their access on their accounts and websites, and it can even control the amount of time a child is on the internet. The software provides parents to control whatever they would like to with their own specific preferences. Everyone can have different controls on their individual computers.
Also, there are many different softwares to choose from when deciding to get internet parental control software. All software prevents children from danger and will ultimately be of benefit to any parent. A person can customize their preferences as they please. They can even have different controls for each child.


Internet Monitoring, Blocking, and Tracking


Internet monitoring, blocking, and tracking is not only good for children but it is good to use in offices. This enforces people to only do their work instead of visiting websites which are not work related. One example of internet monitoring software is CyBlcok Proxy. This does not only let you keep track of people using the internet but it protects your internet from spyware.
Many companies and households have internet monitoring, blocking, and tracking. It helps them check up on what people are doing on their internet and blocks them from what they should not be going onto in the first place. Many companies use this for their employees. It is very popular. Also, schools and colleges use this on their interet sometimes to only allow specific websites to be viewed on their computers.

Internet Filters


It may seem like it is impossible to not see every unwanted website etc. off of the internet. However, that is what filters are made for. Internet filters create a defense for our computers. Internet filters are especially important for families. If people have children they must get internet filters. They are extremely important and will help keep children safe.
Internet filters let you block and control specific websites. Furthermore, they allow you to create passwords to keep your children from unwanted website visits. A great feature in internet filtering is pop-up blocking. Not only are pop-ups annoying but sometimes they can be very inappropriate. Internet filters help monitor children or anyone in chat rooms, instant messaging, etc.

Internet Parental Guidance






If children are going to be using the internet, there must be parental guidance. Parents should always check up on children when using the internet. Even if a child does not have the intentions of visiting a website which they shouldn't, sometimes adds pop up on the internet and children do not know what to do. Parents should talk to their children about using the internet and teach them about what websites are appropriate and which websites are inappropriate.


In order to help parents, there is parental control software which helps prevent children from viewing what their parents do not want them to see. Parents can completely block websites on their child's account. Parental guidance is very important when using the internet and should be taken very seriously. Parents need to check up on their childrens' internet use and keep their children safe from chatting with strangers and visiting inappropriate websites.

Monday, February 15, 2010

Homework 1




"HTML, which stands for Hyper Text Markup Language, is the predominant markup language for web pages. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists etc as well as for links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms. It is written in the form of HTML elements consisting of "tags" surrounded by angle brackets within the web page content.

It can include or can load scripts in languages such as JavaScript which affect the behavior of HTML processors like Web browsers; and Cascading Style Sheets (CSS) to define the appearance and layout of text and other material. The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over explicit presentational markup".[1]

Monday, February 8, 2010

Testing my course blog-2

test-2, test-2, test-2

Testing my course Blog-1

test-1, test-1, test-1