End of the week at last - and I feel somewhat shattered.
We have had to get use to the new times and places. On Wednesday we went to a room our timetable told us to go to, only to find that the class was in another room! So when we meet our lecturer later, we showed proof that we in the room as told by our timetable.
This semester we seem to be doing PC Passport all over again, covering databases (Access) and spreadsheets (Excel). We have had a rough plan for the next eighteen weeks of the semester (and the course) left of how we are going to do the class. Sounds simple, I think that the instructions maybe out-of-date though. Thankfully, Suzanne has whipped something up for us to have a look at.
I hope that next week will be bit easier for us all.
Wish us all luck.
Thursday, 28 January 2016
Monday, 25 January 2016
Week 21 - Learning Adobe Flash Professional CC
For David's classes, we are asked to learn about animations using the software Adobe Flash Professional CC.
Learning the software is goes by the old saying "easier said than done". We have been asked to do a sunset animation, and I 'm struggling to understand how do the layers and the movement of the sun (I can more or less do the change of the sun's colour as it sets). I could do with more information. Hopefully, I'll find more information about the software and its animation and get it all figured out. I'm going to need all the luck I can get on that subject.
Wish us all luck.
Learning the software is goes by the old saying "easier said than done". We have been asked to do a sunset animation, and I 'm struggling to understand how do the layers and the movement of the sun (I can more or less do the change of the sun's colour as it sets). I could do with more information. Hopefully, I'll find more information about the software and its animation and get it all figured out. I'm going to need all the luck I can get on that subject.
Wish us all luck.
Week 21 - Start of Semester 2
Semester 2 has started!
We have 18 weeks of this semester before the course ends. I thought that the new semester started next week. The new timetable's new times is roughly 50-50 the same and new. Monday is the same time-wise as is Wednesday. Tuesday is a later finish. Thursday is a later start, but a later finish.
For David, we are asked to do a similar job as last year, only a little bigger. We may learn animation. We may not have Gordon as our lecturer, but may have someone else.
It has been stressed which of the classes this semester is needed to progress from this level of the course to the next. I hope that we do well.
Wish us all luck.
We have 18 weeks of this semester before the course ends. I thought that the new semester started next week. The new timetable's new times is roughly 50-50 the same and new. Monday is the same time-wise as is Wednesday. Tuesday is a later finish. Thursday is a later start, but a later finish.
For David, we are asked to do a similar job as last year, only a little bigger. We may learn animation. We may not have Gordon as our lecturer, but may have someone else.
It has been stressed which of the classes this semester is needed to progress from this level of the course to the next. I hope that we do well.
Wish us all luck.
Monday, 18 January 2016
Week 20 - Final two weeks of Semester 1
Just this week and next week of Semester 1. Hard to believe!
For David's class, we have been finishing up on our webpages class. We've have had two webpage projects: one on the restaurants of the college, and the other one a personal one. I'm done mine on my favourite books. For the webpages, we've to do images, videos and forms for the webpages. I must admit, it has been hard work because we have to do the coding of the webpages and can be confusing, even more if the page, or part of the page, doesn't work. In our class, a classmate called Ryan helped us test our webpages for our reviews.
I think that I have some resits for Gordon's hardware classes and Suzanne's classes are all but over, but I will come in to make sure that they are, and if they are, I use the tie to double any other work for the other classes.
For my last blog about "On-line Security", I'm happy that it has received a good number of readers. and I hope that it readers will take notice of its contents and will be safer.
A link to the blog: http://chriscollegeblog2014.blogspot.co.uk/2016/01/more-on-on-line-security.html
Just this week and next week before we enter our second Semester of the course.
Wish us all luck.
For David's class, we have been finishing up on our webpages class. We've have had two webpage projects: one on the restaurants of the college, and the other one a personal one. I'm done mine on my favourite books. For the webpages, we've to do images, videos and forms for the webpages. I must admit, it has been hard work because we have to do the coding of the webpages and can be confusing, even more if the page, or part of the page, doesn't work. In our class, a classmate called Ryan helped us test our webpages for our reviews.
I think that I have some resits for Gordon's hardware classes and Suzanne's classes are all but over, but I will come in to make sure that they are, and if they are, I use the tie to double any other work for the other classes.
For my last blog about "On-line Security", I'm happy that it has received a good number of readers. and I hope that it readers will take notice of its contents and will be safer.
A link to the blog: http://chriscollegeblog2014.blogspot.co.uk/2016/01/more-on-on-line-security.html
Just this week and next week before we enter our second Semester of the course.
Wish us all luck.
Wednesday, 13 January 2016
More on On-line Security
In this blog, I'm going to give some details on being secure while on-line.
Browser Setting
A browser is a device that connects a computer to the world wide web.
Password Strength
When people on-line, they use a key called password. Say that your user profile on computer is like your house on your home street, a password would then become your house's front door key. A hacker attempting to hacker into your computer's user profile is like a thief attempting to picklock your home's lock.
Make sure that your password is known only to you and easy to remember, but make it difficult for hackers to get. The longer and more random the password, the more protected your computer and user profile will. Some password can use different letters for key letters in the password, like the "@" can stand in for the letter "a". Some of the smaller keys can be replaced with capital letters, so for example, the word "tree" could be used like "tRee", this makes it harder for a hacker to solve.
Encryption Email
The first question to ask is, what is an email? An email is like mail, only it's on the computer and internet. While mail, like a letter or parcel, can take a couple of days to be delivered, email can be delivered in seconds.
An encrypted email is the same email, only it's encrypted (a bit like a coded message) and that makes it hard to read for the people the encrypted email is for. Only the person at the receiving end of the encrypted email will be able to read the email. Emails accounts like Hushmail is a good example for encryption email accounts.
DDOS
Distributed Denial-of-service attack (DDOS) is when a hacker uses a number of computers and servers to hack into your server and computer (it can range from a couple of computers to thousands). It can make finding the hacker more difficult for the people who wishes to find the hacker.
Computer Viruses
Trojan
A Trojan virus takes it name from the infamous Greek Trojan Horse, in which the Greek army hide a wooden horse in order so that the Trojan army would take the wooden horse inside their city, thinking it was a gift, only be surprised by the Greek army. In much the same way, a hacker can send an email from a Trojan device that can allow the hacker to access the computer with the computer's user being aware until it's too late.
A way of protecting your computer from a Trojan virus is double-check where the email containing it comes, see if it's from someone you can trust.
Malware
A malware virus is more or less like a cold people can get. The malware virus gets into a computer, either through a download or by email, and once it's inside the computer, the virus can cause both harm and damage to the computer. The virus can delete files from the computer and make the computer do the opposite the user wishes to do.
To prevent malware from getting into your computer is do a regular anti-virus check on your computer.
Phishing
Phishing takes its name from the word "fishing". This virus gets into the computer and starts searching anything that the hacker might like, like passwords to personal internet shopping sites and account numbers for bank accounts. The hacker could steal private photos from the computer and then release them to the world for all to see and it can cause huge embarrassment and serious harm to the user of the computer.
Spyware
A spyware virus does what its name suggests, the virus gets into the computer and spies about for the hacker who created and sent the virus. Working much like the phishing virus, the spyware virus can cause harm and embarrassment to the computer's user.
A way of preventing phishing and spyware from getting into your computer is double-check your computer's anti-virus firewall regularly and do a anti-virus run of your computer.
Link to my previous blog for security sites worth visiting: http://chriscollegeblog2014.blogspot.co.uk/2016/01/security-sites-worth-visiting.html
I hope that this blog was very interesting in helping you protect your computers.
Browser Setting
A browser is a device that connects a computer to the world wide web.
Password Strength
When people on-line, they use a key called password. Say that your user profile on computer is like your house on your home street, a password would then become your house's front door key. A hacker attempting to hacker into your computer's user profile is like a thief attempting to picklock your home's lock.
Make sure that your password is known only to you and easy to remember, but make it difficult for hackers to get. The longer and more random the password, the more protected your computer and user profile will. Some password can use different letters for key letters in the password, like the "@" can stand in for the letter "a". Some of the smaller keys can be replaced with capital letters, so for example, the word "tree" could be used like "tRee", this makes it harder for a hacker to solve.
Encryption Email
The first question to ask is, what is an email? An email is like mail, only it's on the computer and internet. While mail, like a letter or parcel, can take a couple of days to be delivered, email can be delivered in seconds.
An encrypted email is the same email, only it's encrypted (a bit like a coded message) and that makes it hard to read for the people the encrypted email is for. Only the person at the receiving end of the encrypted email will be able to read the email. Emails accounts like Hushmail is a good example for encryption email accounts.
DDOS
Distributed Denial-of-service attack (DDOS) is when a hacker uses a number of computers and servers to hack into your server and computer (it can range from a couple of computers to thousands). It can make finding the hacker more difficult for the people who wishes to find the hacker.
Computer Viruses
Trojan
A Trojan virus takes it name from the infamous Greek Trojan Horse, in which the Greek army hide a wooden horse in order so that the Trojan army would take the wooden horse inside their city, thinking it was a gift, only be surprised by the Greek army. In much the same way, a hacker can send an email from a Trojan device that can allow the hacker to access the computer with the computer's user being aware until it's too late.
A way of protecting your computer from a Trojan virus is double-check where the email containing it comes, see if it's from someone you can trust.
Malware
A malware virus is more or less like a cold people can get. The malware virus gets into a computer, either through a download or by email, and once it's inside the computer, the virus can cause both harm and damage to the computer. The virus can delete files from the computer and make the computer do the opposite the user wishes to do.
To prevent malware from getting into your computer is do a regular anti-virus check on your computer.
Phishing
Phishing takes its name from the word "fishing". This virus gets into the computer and starts searching anything that the hacker might like, like passwords to personal internet shopping sites and account numbers for bank accounts. The hacker could steal private photos from the computer and then release them to the world for all to see and it can cause huge embarrassment and serious harm to the user of the computer.
Spyware
A spyware virus does what its name suggests, the virus gets into the computer and spies about for the hacker who created and sent the virus. Working much like the phishing virus, the spyware virus can cause harm and embarrassment to the computer's user.
A way of preventing phishing and spyware from getting into your computer is double-check your computer's anti-virus firewall regularly and do a anti-virus run of your computer.
Link to my previous blog for security sites worth visiting: http://chriscollegeblog2014.blogspot.co.uk/2016/01/security-sites-worth-visiting.html
I hope that this blog was very interesting in helping you protect your computers.
70th Blog - Week 19 - Last Weeks of Semester 1
Hard to believe that Semester 1 is nearly over. Just a couple of weeks left.
This week seems to be filled with assessments, re-assessments and double-checking our work for our lecturers. I hope that this week goes well for all of us and that we will complete any unfinished work in time for the end of the semester and that we will be ready for the next semester.
Semester 2 sounds like it's going to be much busier than the first.
Wish us all luck.
This week seems to be filled with assessments, re-assessments and double-checking our work for our lecturers. I hope that this week goes well for all of us and that we will complete any unfinished work in time for the end of the semester and that we will be ready for the next semester.
Semester 2 sounds like it's going to be much busier than the first.
Wish us all luck.
Wednesday, 6 January 2016
Security Sites worth visiting!
One of our classes in this course is called PC Passport, or Internet and On-Line Comms.
For the class, we were asked to look up five websites connected to on-line security
Here they are, and I hope that you will find them interesting and that you will use the information on these websites to keep your computers secure.
http://www.itsecurity.com/
http://www.symantec.com/en/uk/ssl-sem-page/?
http://secunia.com/
http://www.securemac.com/
https://technet.microsoft.com/en-us/security/default.aspx
As I said above, I hope that you will find these sites interesting in keeping your computers secure.
For more information, you can visit this website: http://www.networkworld.com/article/2870593/lan-wan/20-useful-it-security-web-sites.html#slide1
It has 20 IT Security Websites for you if you wish for more websites on IT Security.
Wish us all luck
For the class, we were asked to look up five websites connected to on-line security
Here they are, and I hope that you will find them interesting and that you will use the information on these websites to keep your computers secure.
http://www.itsecurity.com/
http://www.symantec.com/en/uk/ssl-sem-page/?
http://secunia.com/
http://www.securemac.com/
https://technet.microsoft.com/en-us/security/default.aspx
As I said above, I hope that you will find these sites interesting in keeping your computers secure.
For more information, you can visit this website: http://www.networkworld.com/article/2870593/lan-wan/20-useful-it-security-web-sites.html#slide1
It has 20 IT Security Websites for you if you wish for more websites on IT Security.
Wish us all luck
I'm back again
It's good to be back after so long from blogging and I hope to keep it up as best as possible as the course goes on.
After a very restful Christmas and New Year, I hope to finish this semester with all of my tasks done (all that is needed is to make sure that the work is all handed in to our lecturers). Then the rest of us on the course will see what's in store for us all in the next semester that starts at the end of the month.
Wish us all luck.
After a very restful Christmas and New Year, I hope to finish this semester with all of my tasks done (all that is needed is to make sure that the work is all handed in to our lecturers). Then the rest of us on the course will see what's in store for us all in the next semester that starts at the end of the month.
Wish us all luck.
Subscribe to:
Comments (Atom)