I truly messed myself over by waiting until the last minute to this assignment.
When it is two days due and my ignorant self know I would be struggle trying to pull my ideas together, but somehow working under the pressure provides such a stable environment for a young man like myself.
Seriously, Professor A-G put the mind to the ultimate test with things like an E-portfolio at the peak of spring.
LOL Well I guess we know who will be awake all night! HaHaHa Lord take the wheel....
No more complaining and more typing.... sheesh wish I could pay someone to do this right now :0
RonWil
Sunday, April 12, 2015
Tuesday, March 17, 2015
Excel
03/17/2015
1.) equal symbol (=)
2.) Formula
3.) Function
4.) =(b43:g43)
5.) (=) or (:) or (-)
My experience with the budget was okay. I learned that my budget tools i'm currently using is some what effective in managing my future benefits. Having investing into myself now ie retirement and ROTH,I know the value it will grow and multiply by the years to come. Learning the basic functions of equating total income and percieved income is valuable to those that are looking to be debt free and obtain concious credit. Depending on your yearly income is not enough to budget.Biweekly expenses are tragic to middle class workers, that remain in entry level positions. You must plan ahead to stay ahead. The knowledge obtained will enhance my growth throughout lifes indeavors when looking to buy a home, manage landscape, and control my own networth. Balance is budget, which is designed to incorporate formulas and functions into everyday living habits.
1.) equal symbol (=)
2.) Formula
3.) Function
4.) =(b43:g43)
5.) (=) or (:) or (-)
My experience with the budget was okay. I learned that my budget tools i'm currently using is some what effective in managing my future benefits. Having investing into myself now ie retirement and ROTH,I know the value it will grow and multiply by the years to come. Learning the basic functions of equating total income and percieved income is valuable to those that are looking to be debt free and obtain concious credit. Depending on your yearly income is not enough to budget.Biweekly expenses are tragic to middle class workers, that remain in entry level positions. You must plan ahead to stay ahead. The knowledge obtained will enhance my growth throughout lifes indeavors when looking to buy a home, manage landscape, and control my own networth. Balance is budget, which is designed to incorporate formulas and functions into everyday living habits.
Tuesday, February 10, 2015
Chapter 5 Quiz 002/10/2015
1.) Digital Security Risk -
2.) Computer crime-
3.) A cyber crime is a online or internet based illegal act
4.) Malware - malice software
5.) BOTNET -
6.) DOS Attack - Denial if service act
7.) Back door- help navigate past security
8.) Spoofing - basic intruder
9.) firewall, form intrusions- protect against, from invasion
10.) Unauthorized access-
11.) Unauthorized Use-
12.) Biometric Device-
13.) Digital Forensics-
14.) Software theft- illegal theft of computer programs
15.) information theft - use of personal informaion without permission
16.) Encryption-
17.) Digital signature -
18.) Digital Certificate-
19.) Encryption sequence
20.) Hardware theft
21.) Hardware Vandalism
22.) Back-up
23.) CPU Ethics
24.) Intellectual Rights/Properties
25.) Code of conduct - dig. rights that governs the CPU
26.) DRM - Digital rights management
27.) Copywrite - *OWNER*
28.) Spyware -
29.) Adware - *commercial banners and such*
30.) Social Engineering -
31.) Green Computing is to save energy and dispose of CPU remains properly to decrease environmental hazards.
32.) Information privacy act -
33.) Cookie -
34.) Employee Monitoring -
2.) Computer crime-
3.) A cyber crime is a online or internet based illegal act
4.) Malware - malice software
5.) BOTNET -
6.) DOS Attack - Denial if service act
7.) Back door- help navigate past security
8.) Spoofing - basic intruder
9.) firewall, form intrusions- protect against, from invasion
10.) Unauthorized access-
11.) Unauthorized Use-
12.) Biometric Device-
13.) Digital Forensics-
14.) Software theft- illegal theft of computer programs
15.) information theft - use of personal informaion without permission
16.) Encryption-
17.) Digital signature -
18.) Digital Certificate-
19.) Encryption sequence
20.) Hardware theft
21.) Hardware Vandalism
22.) Back-up
23.) CPU Ethics
24.) Intellectual Rights/Properties
25.) Code of conduct - dig. rights that governs the CPU
26.) DRM - Digital rights management
27.) Copywrite - *OWNER*
28.) Spyware -
29.) Adware - *commercial banners and such*
30.) Social Engineering -
31.) Green Computing is to save energy and dispose of CPU remains properly to decrease environmental hazards.
32.) Information privacy act -
33.) Cookie -
34.) Employee Monitoring -
Monday, January 26, 2015
Subscribe to:
Posts (Atom)