A. Web designer
1. The Art institute of New York City.
2. West Wood College
3.Devry University
I will proceed this career by training and continuing on my own web designing.
B. Piloting
1. Aviation School
To proceed this career I will train for piloting
ithsfundamentalcomputers
Wednesday, January 19, 2011
Thursday, January 13, 2011
Vocabulary words 1-40
1) Indexes-is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased
2) Keywords- are the words that are used to reveal the internal structure
3) Libel-
4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field
5) Math Symbols- symbols relating to math
6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed
7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers
8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given
9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
12) Related Search-can provide suggestions for more than 90% of search
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
14) Shared bookmark-
15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
22) Digital Cash-Electronic money
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
24) Keyless Entry System- remote for cars
25) Online Learning-comprises all forms of electronically supported learning and teaching
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
29) Hacking-refers to the re-configuring or re-programming of a system to function in ways not facilitated
30) Hardware Firewall-object that protects your computer
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
36) Sniffer-computer software or hardware that can intercept and log traffic
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
38) Strong Password-Automatically and safely generate strong, secure passwords
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
40) IC3 Certification Exam- to aid professional development
2) Keywords- are the words that are used to reveal the internal structure
3) Libel-
4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field
5) Math Symbols- symbols relating to math
6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed
7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers
8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given
9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
12) Related Search-can provide suggestions for more than 90% of search
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
14) Shared bookmark-
15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
22) Digital Cash-Electronic money
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
24) Keyless Entry System- remote for cars
25) Online Learning-comprises all forms of electronically supported learning and teaching
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
29) Hacking-refers to the re-
30) Hardware Firewall-object that protects your computer
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
36) Sniffer-computer software or hardware that can intercept and log traffic
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
38) Strong Password-Automatically and safely generate strong, secure passwords
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
40) IC3 Certification Exam- to aid professional development
Thursday, December 23, 2010
Vocabulary words 1-30
1) ActiveX-a framework for defining reusable software components in a programing languuage independent way
2) Client-an application or system that accesses a remote service on another computer system, known as a server, by way of a network
3) Cookie-also known as a web cookie, browser cookie, and HTTP cookie, is a piece of text stored by a user's web browser
5) Domain-an identification label that defines a realm of administrative autonomy, authority, or control in the internet
6) File Transfer Protocol (FTP)-is a standard network protocol used to copy a file from one host to another over a TCP-based network, such as the internet
8) Hit-The result(s) of a search of a computer system
11) Hypertext Transfer Protocol (HTTP)-is a networking protocol for distributed, collaborative, hypermedia information systems
13) Internet Service Provider (ISP)-also sometimes referred to as an Internet access provider (IAP), is a company that offers its customers access to the internet
16) Portal-A portal is a Web site with a rich navigation structure of both internal and external links.
17) Really Simple Syndication(RSS)-is a family of web feed formats used to publish frequently updated works
19) Uniform Resource Locator (URL)-is a uniform resource identifier (URI) that specifies where an identified resource is available and the mechanism for retrieving it.
20) Web 2.0-is commonly associated with web applications that facilitate interactive systemic biases,and developing the world wide web
21) Web Cache-is the catching of web documetns to reduce bandwidth usage, server load, and perceived lag
24) Wiki-is a website that allows the easy creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
Subscribe to:
Posts (Atom)