A. Web designer
1. The Art institute of New York City.
2. West Wood College
3.Devry University
I will proceed this career by training and continuing on my own web designing.
B. Piloting
1. Aviation School
To proceed this career I will train for piloting
Wednesday, January 19, 2011
Thursday, January 13, 2011
Vocabulary words 1-40
1) Indexes-is a data structure that improves the speed of data retrieval operations on a database table at the cost of slower writes and increased

2) Keywords- are the words that are used to reveal the internal structure

3) Libel-
4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field

5) Math Symbols- symbols relating to math

6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed

7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers

8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given

9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language

10) Podcatcher-is a computer program used to download various media via an RSS or XML feed

11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community

12) Related Search-can provide suggestions for more than 90% of search

13) Search Engine-is designed to search for information on the World Wide Web and FTP servers

14) Shared bookmark-
15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify

16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language

17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible

18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler

19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products

20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding

21) Critical Thinking- is the intellectually disciplined process of actively and skillfully

22) Digital Cash-Electronic money

23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems

24) Keyless Entry System- remote for cars

25) Online Learning-comprises all forms of electronically supported learning and teaching

26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.

27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page

28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker

29) Hacking-refers to the re-configuring or re-programming of a system to function in ways not facilitated

30) Hardware Firewall-object that protects your computer

31) Keylogger-software logs and monitors all activities on the computer where it is installed.

32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret

33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key

34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much

35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications

36) Sniffer-computer software or hardware that can intercept and log traffic

37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge

38) Strong Password-Automatically and safely generate strong, secure passwords

39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security

40) IC3 Certification Exam- to aid professional development
2) Keywords- are the words that are used to reveal the internal structure
3) Libel-
4) Link List- is a data structure that consists of a sequence of data records such that in each record there is a field
5) Math Symbols- symbols relating to math
6) News Feed-is a data format used for providing users with frequently updated content. Content distributors syndicate a web feed
7) Peer-to- Peer (P2P)- computing or networking is a distributed application architecture that partitions tasks or work loads between peers
8) Phrase Searching-is used to search for words as phrases. That is, the words must be side by side and in the order given
9) Plagiarism-is defined in dictionaries as "the wrongful appropriation, close imitation, or purloining and publication, of another author's language
10) Podcatcher-is a computer program used to download various media via an RSS or XML feed
11) Public Domain-nonprofit organization committed to exploring the intersection of art, theory, technology and community
12) Related Search-can provide suggestions for more than 90% of search
13) Search Engine-is designed to search for information on the World Wide Web and FTP servers
14) Shared bookmark-
15) Trademark-is a distinctive sign or indicator used by an individual, business organization, or other legal entity to identify
16) Wiki-is a website that allows the creation and editing of any number of interlinked web pages via a web browser using a simplified markup language
17) Wildcard Character-is a character that may be substituted for any of a defined subset of all possible
18) Business-to-Business (B2B)-describes commerce transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler
19) Business-to-Consumer (B2C)-describes activities of businesses serving end consumers with products
20) Business-to-Goverment (B2G)-is an independent training organization formed to help private and public businesses across America master the government contract bidding
21) Critical Thinking- is the intellectually disciplined process of actively and skillfully
22) Digital Cash-Electronic money
23) Electronic Commerce (e-comerce)-consists of the buying and selling of products or services over electronic systems
24) Keyless Entry System- remote for cars
25) Online Learning-comprises all forms of electronically supported learning and teaching
26) Telecommuting-is a work arrangement in which employees enjoy flexibility in working location and hours.
27) Browser hijacking-is a form of malware or spyware that replaces the existing internet browser home page, error page, or search page
28) Brute Force Attacks-exhaustive key search is a strategy that can in theory be used against any encrypted data by an attacker
29) Hacking-refers to the re-
30) Hardware Firewall-object that protects your computer
31) Keylogger-software logs and monitors all activities on the computer where it is installed.
32) Private Key-is an encryption/decryption key known only to the one or both parties that exchange secret
33) Public Key-cryptography is a cryptographic approach which involves the use of asymmetric key algorithms instead of or in addition to symmetric key
34) Repetitive strain Injury (RSI)-a strain in the wrist from typing to much
35) Secure Sockets Layer (SSL)-protocol to create a uniquely encrypted channel for private communications
36) Sniffer-computer software or hardware that can intercept and log traffic
37) Spyware-is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
38) Strong Password-Automatically and safely generate strong, secure passwords
39) Transport Layer Security (TLS)-are cryptographic protocols that provide communications security
40) IC3 Certification Exam- to aid professional development
Subscribe to:
Posts (Atom)