Tuesday, March 17, 2015

Excel

1. =
2. formula
3.function
4. x=mx+b
5.=sum(b6-b36)


The budget assignment was very beneficial to me. It showed me that i really really need to budget. I was in the negatives for the differences and i couold actualy beleieve it because i spend alot of money now. i do so because i dont have many bills right now but i do need to prepare for the future. I did this budget by myself at the library and it was very time consuming. It did show me that i will definitely be broke in the near future. I need help budgeting !!!!


Tuesday, February 10, 2015

Chapter 5

1. digital secutiry risk
2. an illegal act involving the use of computer or related devices is referred to as a  (computer cime)
3. a      an online or internet base illegal act  (cyber crimer)
4.      is short for malice software (malware)
5. a     group of computers connected to a network (botnet)
6. a     disrupt computer access to internet srvices (DOS attack) denial of sevice
7. a     set of intrusctions in a program to by pass security control (backdoor)
8.      a technique used to make their internet legal (spoofing)
9. a      is hardware and or software that protect  internet resources from (firewall) (intrusion)     
10.       is the use of the computer without permission  (unauthorized access)
11.    use of computer for unapproved activity (unauthorized use )
12.     tells a person identity (biometric device)
13.    discovery collection analysis of evidence found on computers and netwrok (digital forensics)
14.       occurs illegally copies a program  (software theft)
15.      steals confidential information (information theft)
16.     the process of converting data encoded characters (encryption)
17.       is encrypted code that a person or oganization or website attaches to a msg to verify the sender (digital signiture)
18. a notice nthat guarantees that a user or website is legal (digital certificate)
19.a website that uses       technique to secure its known as a secure site ( encryption)
20.         act of stealing digital equipment (hardware theft)
21.         act of destroying digital equipment (hardware vandalism)
22.        backup
23.    govern the use of computers ( computer ethics)
24.       the right to whcih creators entitled to their work ( intellectual property)
25.     reading guidelines helps determine specification allowed or not allowed   ( code of conduct)
26.     plan to design help prevent illegal distribution digital content (digital right management)
27.   copyright
28. program that secretly collects information abouyt the user ( spyware)
program that displays
29. adware
30. gaining unauthorized access and taking advantage of a victim social engeneering
31.  green computing -reduce of use of computers.
32. companies  to deny strict collection information about them (information privacy)
33. cookies
34.  employee monortoring

Monday, January 26, 2015

and by the way welcome to my blog you guys :) ... its Chelsea's World !
Hey, I'm blogging and just chilling the library :)