Wednesday, January 19, 2011

3Careers

A. Web designer
1. The Art institute of New York City.
2. West Wood College
3.Devry University
I will proceed this career by training and continuing on my own web designing.

B. Piloting
1. Aviation School
To proceed this career I will train for piloting

Thursday, January 13, 2011

Vocabulary words 1-40

1) Indexes-is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased

2) Keywords- are the words that are used to reveal the internal structure

3) Libel-

4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field

5) Math Symbols- symbols relating to math

6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed

7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers

8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given

9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
 
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
 
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
 
12) Related Search-can provide suggestions for more than 90% of search
 
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
 
14) Shared bookmark-

15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
 
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
 
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
 
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
 
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
 
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
 
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
 
22) Digital Cash-Electronic money
 
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
 
24) Keyless Entry System- remote for cars
 
25) Online Learning-comprises all forms of electronically supported learning and teaching
 
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
 
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
 
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
 
29) Hacking-refers to the re-configuring or re-programming of a system to function in ways not facilitated
 
30) Hardware Firewall-object that protects your computer
 
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
 
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
 
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
 
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
 
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
 
36) Sniffer-computer software or hardware that can intercept and log traffic
 
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
 
38) Strong Password-Automatically and safely generate strong, secure passwords
 
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
 
40) IC3 Certification Exam- to aid professional development
 

Thursday, December 23, 2010

Vocabulary words 1-30

1) ActiveX-a framework for defining reusable software components in a programing languuage independent way
2) Client-an application or system that accesses a remote service on another computer system, known as a server, by way of a network
3) Cookie-also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user's web browser
4) Digital Certificate-An attachment to an electronic message used for security purposes
5) Domain-an identification label that defines a realm of administrative autonomy, authority, or control in the internet
6) File Transfer Protocol (FTP)-is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the internet
7) Geographic Imaging-makes images better
8) Hit-The result(s) of a search of a computer system
9) Home Page-homepage of a computer
10) Hypertext Markup Language (MTML)-is the predominant markup language for web pages
11) Hypertext Transfer Protocol (HTTP)-is a networking protocol for distributed, collaborative, hypermedia information systems
12) Internet Protocol (IP) Address-is a numerical label assigned to each device
13) Internet Service Provider (ISP)-also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the internet
14) Mosaic-An application that simplifies accessing documents on the world wide web
15) Podcast-is a series of digital media files that are released episodically and often downloaded
 
16) Portal-A portal is a Web site with a rich navigation structure of both internal and external links.
 
17) Really Simple Syndication(RSS)-is a family of web feed formats used to publish frequently updated works
 
18) Social Networking Site-networks to socialize around the world with others
 
19) Uniform Resource Locator (URL)-is a uniform resource identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
 
20) Web 2.0-is commonly associated with web applications that facilitate interactive systemic biases,and developing the world wide web
 
21) Web Cache-is the catching of web documetns to reduce bandwidth usage, server load, and perceived lag
 
22) Website- is a collection of related web pages, images, videos or other digital assets
 
23) webapp-is an application that is accessed over a network such as the Internet or an intranet.
 
24) Wiki-is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
 
25)Blog- is a type of website or part of a website
 
26) boolean Logic-is a complete system for logical operations, used in many systems
 
27) Copyright-is a set of exclusive rights granted by the law of a jurisdiction to the author or creator of an original work, including the right to copy
 
28) Directories-A web directory or link directory is a directory on the World Wide Web
 
29) Feed-is a data format used for providing users with frequently updated content.
 
30) Secure Sockets Layer-protocol to create a uniquely encrypted channel for private communications