Tuesday, 6 May 2014

1. a- A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
   b- Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
   c- Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.
   d-  Rogue security software is a form of Internet fraud using computer malware that deceives or misleads users into paying money for fake or simulated removal of malware.
2. E-Mail Attachments: Email attachments are the most common way that ill intentioned people transmit viruses in order to infect computer users.
   Internet Downloads: Any material downloaded from the Internet, whether they are programs, documents, music files, video files and compressed files etc. could potentially contain a virus.
3. A common symptom of a virus is much slower than normal computer performance. Some viruses can cause damage to Windows or some of your programs. The results of this damage might include messages appearing unexpectedly, programs starting or closing automatically, or Windows shutting down suddenly.
4. Install an antivirus software. Don't open email attachments unless your expecting them. Keep your computer updated.
5. An e-mail virus is a harmful computer code which is usually sent as an e-mail note attachment. It becomes harmful if it is activated and may lead to the loss of information or data stored in the computer hard disk.
6.  Some people that create computer viruses do it out of meanness to get even, others create in order to make and sell antivirus software while others create them just as a challenge.
7. Clam win. AVG Free. Antivipersonal9.

Monday, 5 May 2014

Here is a collage that I made with Picasa. First I chose these photos and uploaded them to picasa. Then I selected a background and set all the other pictures how I wanted them, by zooming them and twisting them. And finally I saved my picture and uploaded it to blogger!


This is a photo that I edited using ribbet. First I cropped the original photo to make it smaller. Next I put a frame around the outside of the picture to make it look a lot more awesome. After adding a frame to the picture I dimmed the border. And finally I shined up the color on the photo using Boost!

Tuesday, 18 March 2014


  • Cc: stands for "carbon copy." Anyone listed in the Cc: field of a message receives a copy of that message when you send it. All other recipients of that message can see that the person you designated as a Cc: recipient has received a copy of the message.

    Bcc: stands for "blind carbon copy." This is similar to the Cc: feature, except that Bcc: recipients are invisible to all the other recipients of the message (including other Bcc: recipients). For example, if you send a message To: johndoe@yahoo.com and Bcc: janedoe@yahoo.com, then johndoe sees himself as the message's only recipient. Janedoe, on the other hand, is "in the know"—she can see that you sent the message To: johndoe, and that you blind-copied her. To add an entry in the Bcc: field, click the "Show BCC" link to the right of the "To:" field.

    Note: To send a message, you must always specify at least one recipient in the "To:" field. If you don't, an error message appears when you attempt to send the message.
  • http://answers.yahoo.com/question/index?qid=20080324164129AAnN9ZC

Tuesday, 4 March 2014

To take a screenshot, press the print/sinc key just above the backspace key. Your screenshot is automatically saved. Open the paint folder on your computer and go to the clipboard. once at the clipboard, and looking at your screenshot, go to save as, and click the save as JPG bar. Your screenshot is now saved in your documents.

Tuesday, 25 February 2014

Internet safety, or online safety, is the knowledge of maximizing the user's personal safety and security risks on private information and property associated with using the internet, and the self-protection from computer crime in general. As the number of internet users continues to grow worldwide, internet safety is a growing concern for both children and adults. Common concerns regarding safety on the internet include: malicious users (SpamPhishingCyberbullyingCyberstalking etc.), websites and software (Malware,Computer Virus, etc.) and various types of obscene or offensive content. Several crimes can be committed on the Internet such as stalking, identity theft and more. Most social networking and chat sites have a page about safety. Numerous groups, governments and organizations have expressed concerns about the safety of children using the Internet. Safer Internet Day is celebrated worldwide in February to raise awareness about internet safety. In the UK the Get Safe Online campaign has received sponsorship from government agency Serious Organized Crime Agency (SOCA) and major Internet companies such as Microsoft and eBay.

Tuesday, 11 February 2014

A blog is a type of website that is updated regularly with new content. Most blogs contain short, informal articles called blog posts. These posts usually contain some combination of text, photos, videos, and other media. At its core, a blog is just a space on the web that you can create to record and express your opinions, experiences, and interests. The people who write blogs are called bloggers. From what you hear on the news, you might think that bloggers are all a certain type of people— all very young, politically-inclined, and tech-savvy. Or maybe you've heard about bloggers who've written about amazing experiences or ambitious projects, then turned their blogs into best-selling books. While some bloggers do fit these descriptions, the majority of bloggers don't. In fact, there's no "average" blogger— blogs are written by people of all ages and backgrounds, from all walks of life.
Another reason why some people blog is to earn money. People earn money from their blogs by hosting advertisements, selling products, or publishing their blog posts in the form of a book or printed articles.
The media often reports on bloggers who have done this successfully, turning their blogs into a career, or even a book deal or movie. While it's fine to try to earn money from blogging, you should be aware that these success stories are very rare.
You may see advertisements for services that promise to help you make your blog profitable with little effort. However, making money this way is not as easy as it may seem. Many bloggers write for years without ever earning a cent from their blog. Keep this in mind as you begin blogging.

Tuesday, 4 February 2014

The greatest challenge that I will face in learning Microsoft word is that I will have to learn how to type really fast. I am not very good at typing and I don’t even want to learn how to. This project requires a hundred and fifty words and it is going to take me so long to get all of them written down here. Another challenge that I will face is learning how to send messages and stuff cause that is going to take a lot of effort and learning and it is going to take me to long to do all of that stuff so im just  going to keep writing all this nonsense until I have a hundred and fifty words. This assignment is so boring and I want to go home really bad, that is why it doesn’t make any sense at all, I only need four more words.

Tuesday, 28 January 2014

1. What do you use computers for?
I use computers mostly during school for purposes such as typing, listening to songs on you tube, and for checking my email.
2. How would you rate your knowledge of coomputers; beginner, intermediate, or advanced, expand.
I would rate my knowledge of computers at intermediate, I cant type very well and just don't know very much about computers at all.