Sunday, April 12, 2015

What IN THE WORRRLD!!!!

I truly messed myself over by waiting until the last minute to this assignment.


When it is two days due and my ignorant self know I would be struggle trying to pull my ideas together, but somehow working under the pressure provides such a stable environment for a young man like myself. 


Seriously, Professor A-G put the mind to the ultimate test with things like an E-portfolio at the peak of spring.


LOL Well I guess we know who will be awake all night! HaHaHa Lord take the wheel....




No more complaining and more typing.... sheesh wish I could pay someone to do this right now :0

Tuesday, March 17, 2015

Excel

03/17/2015



1.) equal symbol (=)

2.) Formula

3.) Function

4.) =(b43:g43)

5.) (=) or (:) or (-)




My experience with the budget was okay. I learned that my budget tools i'm currently using is some what effective in managing my future benefits. Having investing into myself now ie retirement and ROTH,I know the value it will grow and multiply by the years to come. Learning the basic functions of equating total income and percieved income is valuable to those that are looking to be debt free and obtain concious credit. Depending on your yearly income is not enough to budget.Biweekly expenses are tragic to middle class workers, that remain in entry level positions. You must plan ahead to stay ahead. The knowledge obtained will enhance my growth throughout lifes indeavors when looking to buy a home, manage landscape, and control my own networth. Balance is budget, which is designed to incorporate formulas and functions into everyday living habits.

Tuesday, February 10, 2015

Chapter 5 Quiz 002/10/2015

1.) Digital Security Risk -

2.) Computer crime-

3.) A cyber crime  is a online or internet based illegal act
      
4.)  Malware - malice software

5.)  BOTNET -

6.) DOS Attack - Denial if service act

7.) Back door- help navigate past security

8.)  Spoofing - basic intruder

9.)  firewall, form intrusions- protect against, from invasion

10.) Unauthorized access-

11.) Unauthorized Use-

12.) Biometric Device-

13.) Digital Forensics-

14.) Software theft- illegal theft of computer programs

15.) information theft - use of personal informaion without permission

16.)  Encryption-

17.) Digital signature -

18.) Digital Certificate-

19.) Encryption sequence

20.) Hardware theft

21.) Hardware Vandalism

22.) Back-up

23.) CPU Ethics

24.) Intellectual Rights/Properties

25.) Code of conduct - dig. rights that governs the CPU

26.) DRM - Digital rights management

27.) Copywrite -  *OWNER*

28.) Spyware -

29.) Adware - *commercial banners and such*

30.) Social Engineering -

31.) Green Computing is to save energy and dispose of CPU remains properly to decrease environmental hazards.

32.) Information privacy act -

33.) Cookie -

34.) Employee Monitoring -