Wednesday, January 19, 2011

3Careers

A. Web designer
1. The Art institute of New York City.
2. West Wood College
3.Devry University
I will proceed this career by training and continuing on my own web designing.

B. Piloting
1. Aviation School
To proceed this career I will train for piloting

Thursday, January 13, 2011

Vocabulary words 1-40

1) Indexes-is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased

2) Keywords- are the words that are used to reveal the internal structure

3) Libel-

4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field

5) Math Symbols- symbols relating to math

6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed

7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers

8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given

9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
 
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
 
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
 
12) Related Search-can provide suggestions for more than 90% of search
 
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
 
14) Shared bookmark-

15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
 
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
 
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
 
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
 
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
 
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
 
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
 
22) Digital Cash-Electronic money
 
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
 
24) Keyless Entry System- remote for cars
 
25) Online Learning-comprises all forms of electronically supported learning and teaching
 
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
 
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
 
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
 
29) Hacking-refers to the re-configuring or re-programming of a system to function in ways not facilitated
 
30) Hardware Firewall-object that protects your computer
 
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
 
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
 
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
 
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
 
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
 
36) Sniffer-computer software or hardware that can intercept and log traffic
 
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
 
38) Strong Password-Automatically and safely generate strong, secure passwords
 
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
 
40) IC3 Certification Exam- to aid professional development