Monday, December 14, 2009




Alice is a world that you can make, with anything in it. Its about what you want in it finally not what anyone else wants!




If someone wanted to download Alice, they would have to pick out the one you want, and press download to your computer, and wait for it to load.




What objects doe Alice have to offer? Alice has to offer many objects including:


1.fantasy characters


2.objects


3.Different backrounds


4.different places around the world


5.cars, planes, jets, boats.


6.creatures of all sourts


7.flowers, coffins, gates


8.alice has so much to offer.




Alice could be used for, someone who has a creative mind, that wants to try to mix things up a little bit.




The pros about Alice would be, that all the objects come up when you need them, everything works. Also, that theres so many different things to choose from.




The cons about Alice is that, you have to do so much work to make them do the things you wants them to do. Also, that the objects dont really do the things you want them to exactly do.






The world that i made with Alice was a Sppoky grave yard world, full of all different creatures, a church, gates, it was a pretty interesting world.


I would use Alice in the future, for another world of course, or for a project in one of my classes , it just depends.




Friday, November 20, 2009

cyber bulling:)


Name: Amber Ratlif
http://www.cbc.ca/news/background/bullying/cyber_bullying.html
Article link: cbs news

Article Title: cyber bulling

• 1st Paragraph: Summary of article
• 2nd Paragraph: You thoughts/agreements/disagreements with article
• 3rd Paragraph: What happened to the bully and the person being bullied?
• 4th Paragraph: What could have been done to stop this from happening?
• 5th Paragraph: How does this apply to you, your family, school and/or society?
________________________________________
My summary of this article, is that there was this guy named Dave Knight, he was bullied on the internet. There were threats, comments that were not true, but a lot of people were involved. He ended up leaving school, but it didn’t stop.

My thoughts on this article would be, that this boy was targeted for no reason. I guess just because he was smart and couldn’t defend himself. I agree with him getting out of school it was the smartest thing to do.

The person being bullied is fine now, he is trying to follow his dreams and forget about what had happened to him. The person doing the bulling was charged, and feels really bad they didn’t know, they say what it really did to him.

What could have been done is that they should of never put anything on mean about him. They should of minded there own business. He should of stood up to them, not letting them know he was week,.

It applies to everyone because, it can happen to anyone. It mostly happened at school. At home im not sure honestly. But it can happen anywhere any time any place.

Thursday, November 19, 2009

ETHERNET CABLES.

The porpose of an ethernet cable:)is a type of Ethernet cable used to connect computing devices together directly where they would normally be connected via a network switch, hub or router, such as directly connecting two personal computers via their network adapters.
materials needed:
- ISDN (or Ethernet) surface outlet box
- 3x RJ45 Ethernet connectors
- 1x LED (color of your choice)
- 1x +/-680 Ohm resistor
- 1x 9 volts Alkaline powercell (or other battery)
- 1x Powercell connector suited for your battery
- +/-50 cm UTP cable, preferably unshielded

Instructions featureing colors: White/Green 2 Green Transmit
3 White/Orange
4 Blue
5 White/Blue
6 Orange 7 White/Brown 8 Brown
How to test it:)
You put the colors in the right order, then you put them in the test box and it either will turn green or red.

first time I created an ethernet cable - It was hard like trying to get all the colors in the right order and stuff. I messed up about 3 times i believe. I would have watch step by step how to set it up.

Some Words of encouragement to the new ethernet cable builder :) would be to listen to your teacher, watch your colors.


Wednesday, November 18, 2009

Post3:)
A network is? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.



four benefits of using a network? fast, easy, smart, it helps you.


Difference? A LAN (local area network) is a group of computers and network devices connected together, usually within the same building A WAN (wide area network), is not restricted to a geographical location, although it might be confined within the bounds of a state or country.
A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive. The Internet is an example of a worldwide public WAN.

Three most common topologies are star, bus and ring. Ring; Bus:
STAR:





List 3 exampls of network operation system software. 1.Sniffing the Wire
2. Using Serial Ports
3. Trunking for Peace

The difference between client and peer to peer:)
There’s a huge difference between client/server and peer-to-peer networks. For instance, a peer-to-peer network has no central server. Each workstation on the network shares its files equally with the others. There’s no central storage or authentication of users. Conversely, there are separate dedicated servers and clients in a client/server network. Through client workstations, users can access most files, which are generally stored on the server. The server will determine which users can access the files on the network.
e the difference between Client/Server Networks and Peer to Peer Networks.

Saturday, November 7, 2009

post#1


What is the purpose of a blog? What pros and cons do you see about blogs? Are they safe? Why/Why not. Explain how blogs could be used as an educational tool.

The purpose of a blog to me is to show whats going on, and to express your feelings about things around you. or to just get something out.
the pros about blogs would be thats its easy to get on to and type and no one can mess that up.
the cons would be that everyone can read what your saying, nothings hidden.

I think that blogs are safe to a certain extint like there fun to write, but can also get you in a lot of trouble if your not carful.


blogs can be an educational tool because, you can use them for research about schoo, your job anything really
Type your 8 facts as Post #2 your blog and prepare to share them with the class vocally. You will have approximately 3 – 5 minutes to speak

1. At today’s plea hearing, the prosecutor told the Court that had the case proceeded to trial
the Government’s evidence would have proven that while JANOSKO was an inmate at
the Plymouth County Correctional Facility in 2006 and 2007,
2. the correctional facility
provided inmates a computer for legal research with security controls to prohibit Internet
access, e-mail, or using other computers or computer programs.
3. JANOSKO hacked the computer network to send e-mail; provide inmates
access to a report that listed the names, dates of birth, Social Security numbers, home
addresses and telephone numbers, and past employment history of over 1,100 current and
former Plymouth County Correctional Facility personnel and applicants; and access
(without success) an important prison management computer program.
4. Judge O’Toole scheduled sentencing for December 15, 2009
5. both parties will recommend a sentence of incarceration for 18 months, to be
followed by 3 years of supervised release, and restitution to Plymouth County in an
amount to be determined.
6. JANOSKO had been free following his release from the
Plymouth County Correctional Facility, but has been incarcerated since he was rearrested
in November 2008.
7. The case was investigated by the Federal Bureau of Investigation and the Plymouth
County Sheriff’s Department.
8. It is being prosecuted by Assistant U.S. Attorney Scott L.
Garland of Loucks’s Computer Crime Unit.