Einstein Headline Animator

Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Wednesday, September 23, 2009

Thanks to Laptop




Proud to have nice lap top because I can compute my grades, statistics problem and other encoding easily. This also helps me in all of my research papers. With this I dont need to visit the national library to see thesis and dissertation.
This also lessen are stuff because we dont need manila paper or cartolina or visual aids.



Imagine with out computer.

My first day as a teacher was reminds me an old style teacher. I know that its an old style because yo have to prepared visual aids. But now no need you just need the access on the net and whalla you have your powerpoint presentations.

Now that I have my TOSHIBA I can explore and do all my work easily.

Thursday, August 13, 2009

Don't delete the Cokies!!!

For your computer guidance. Don't delete cookies. Cookies are important to your computer. Your computer is just like a Cookie jar in which you can store your cookies.

On the other hand cookies in the cyberspace are very different because it is something to do with your username, date you last visited the website and other information that the website want to put into the file. When you visited the website the text filename stored in your computer. This will lead the browser to tailor the information at the website to your preferences.
Reblog this post [with Zemanta]

Sunday, June 28, 2009

Cyber Crime (Blogger VS Blogger)



Cyber Crimes are the activities in which computers or networks are tools, targets, and places of criminal activities. This is also known as computer crimes. It is a lawbreaking violation of section 1030 of the United States of American Legal Code. It refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category.


Furthermore, Cyber Crime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used to facilitate the illicit activity.


Cyber crime is also a criminal activity involving an information technology infrastructure including: illegal access or unauthorized access, illegal interception by technical means of non-public transmissions of computer data to, from or within a computer system, data interference by unauthorized damaging, deletion, deterioration, alteration or suppression of computer data, systems interference by interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data, misuse of devices, forgery of ID and theft, and electronic fraud.



Looking back, in the beginning of civilization, human race was eager in discovering new things for their survival. The development of civilization came to be more amazing until the modern civilization. Modern civilization saw continued transformation in the areas of technology and infrastructure. One of the common Technologies that continuously grow is this computer. Computer evolved to become one of the basic necessities of every professional individual.


There is a body of information that has to be considered before one can effectively and efficiently use computer as a machine for communication. For example, as the information age progresses, new forms of criminal behavior appeared. Crime of the future quickly became the present. The constancy of crime trends achieved by the shoe-horning of crime facts into legal groups is blinding.


White-collar crime like cyber crime lack real data by criminal statistics. Routine activity theory suggests that crime may occur while a motivated offender and suitable victim meet in the absence of a competent guardian (Jones & Newburn, 1998). In “meat space”, the number of such coincidences is limited by the speed at which people can pass through their spatial environment. In cyberspace, this is not the case. Very large numbers of people can be defrauded at once. These possibilities for fraud are almost unlimited, since the e-identities are multitude behind which an offender can hide, besides the complications of the network as venue.


Bidvertise Sponsor

Blog Advertising - Advertise on blogs with SponsoredReviews.com
SEO ss_blog_claim=76ee0d03e1b915adca3caa2ed8142e7c