Thursday, August 31, 2006

Spam, Security and Pop-Ups, Oh My!

People can access your computer and use your identity to make illegal transactions.
Many steps can be taken to keep this from happening.
NEVER click the “X” on a popup!
Instead, right click the menu bar and click “Close”
To create a secure internet environment, go to “Tools – Internet Options – Security.
Here, you can create security settings to one’s liking.
When buying online, always be sure that the URL contains “https” – this will almost always signify a secure internet connection.
Otherwise, a packet sniffer, a program used to find things such as a credit card number, will find and use your number.
Never publish specific information about yourself on the internet
Be careful when dealing with spam.
Some emails might look official yet they might have viruses encoded on them.
Still, spam can be used to be a harmless annoying object.
Always use spam blockers. - this is a very good way to identify spam - this site lists all rights you have for privacy over the internet - this is a site most widely used by people trying to find information about other people

Wednesday, August 30, 2006


How to use Logitech webcams

You open the Logitech software. Then click the QuickCapture button. A window will pop up. You should see yourself through the webcam. If you don’t, make sure your lens is open. From here you can record a video, take a picture, or even add effects. To record, simply press the Record a Video button. To take a picture, press Take a Picture. To add effects, click the arrow by the settings camera. It’s at the bottom-right hand of the picture. Click Quick Assistant. This will bring up a small window. From here you can add all kinds of effects. Click the shadow-looking button with the question mark. From here you can become a wrestler, an alien, or even a robot. Fiddle around with the different controls to get used to them.

Monday, August 28, 2006

Chapter 1 Test review

Orientation Chapter

Questions from Quickcheck A in orientation chapter. (pg.11)

Orientation pg. O-17

O-18 test over things posted on the wiki.

Quickcheck O-25

Computer program
Central processing unit
Stored program

Computer Categories



Suggestion of categories that are not included in the book

Chapter 1

ID items on pg. 10

Peripheral devices help the functionality of the computer

Data is what computers use 1’s and 0’s, digital format

Information is used by humans,

Data and executable files

Data used by computer

Executable file + program

File names and file extension, .exe

Types of files hand out.

Application Software- set of computer programs that help people

System software – helps the computer carry out task

Operating system – Mac OS, Microsoft windows

PC = Windows operating system

Mac = apple version of personal

Monday, August 21, 2006

Chapter 1

What is a computer?

  • Device that accepts input, processes data, stores data, and produces output
  • Input devices: keyboard, mouse, scanner, digital camera
  • Output devices: screens and printers
  • A computer uses disks, CDs, and DVDs to store data
  • A stored promgram means that a seires of instructions for a computing task can be loaded into a computer's memory
  • Computers are categorized based on criteria such as usage, cost, size, and capability

  • Roomba/Scooba-a robotic vaccumer cleaner

  • RFID=Radio Frequency Identifier
  • RFID tags can be attatched to any object to identify it using radio waves
  • Two kinds of RFID: Active and Passive

Friday, August 18, 2006

August 18, 2006

Today in computer science....
We worked on the first chapter of our wikibook. Chapter one is Computer and Privacy, it tells several problems and solutions to being safe on the web. To check out the wikibook go to Turn in your origianl book CD and burn your own. Make sure you did everything from yesterday...Quick check A and B. Be sure you send the checks to mrs. vicki. Make a wiki and try to get into the wiki hall of fame.

Thursday, August 17, 2006

August 16, 2006

Prevent your laptop/computer from being stolen:

  • Lojack- for laptops, little piece of software that runs in the back of the web browser, scenario- some one steals the computer…lojack gets the IP #/address from the computer and sends it to the internet company
  • Tag your name on your laptop (ie. On the battery- sauder your name or write it with a sharpie)
  • Change your password
  • 2 accounts on your computer your account or guest account

Avoiding Viruses:

  • Malware/viruses- steals data or destroys files, can create traffic jams on your computer, you may not know it is there
  • Install virus fighting software, make sure it runs at all times when the computer runs, check it every week to make sure it runs good
  • Anti-virus software should scan files, emails, etc.
  • Auto protect- runs in the back of the screen
  • Viruses slow computer down, spam can also hurt you
  • Today most viruses come in e-mails or websites
  • Senders have found ways to use others’ email addresses to get the malware onto your computer
  • Pirated videos have started to get viruses, so when you download the video you will get viruses on your computer

Prevent INtrusions:

  • Whackers- wireless hackers
  • Firewall software-software designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts
    Hackers can get information from your computer if you stay on the internet for a long period of time
  • To block hackers you should have an active firewall
  • How to check your firewall: click the Start buttonà then click control panelà click network connectionsà click the connection you use for internet accessà under network tasks, click change settings for this connectionà click the advanced tab and look for a check mark in front of the box labeled protect my computer and network
  • Ping of death- virus that gave computers’ viruses, it pings Microsoft continuously, when someone pings Microsoft more than about 50 times, Microsoft will shut down their computer
  • “In computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.” (wikipedia)

Wednesday, August 16, 2006

Day 1: August 15

Using the Orientation Chapter we did the following:

  • Review on the CD: how to navigate through pages
Insert the CD. The book on CD will pop up. Remember to create a tracking location if it is your first time. For your tracking device you should save to the memory key. Some things are on the website and others are on the CD depending on the icon to the left of the word in the book.

  • Tracking device: save to memory key

  • We took the pre-assessment test to see what we know in this chapter. The study guide was printed out for us to use for the test.

  • We are teaching sections on 8/16: avoiding viruses, preventing intrusions, blocking spyware and pop-up ads, protecting e-commerce or transactions, avoiding e-mail scams, and protecting your privacy tomorrow.

Monday, August 14, 2006

Welcome to Computer Science

Welcome to Computer Science for teenagers. This is where Mrs. Vicki's tenth grade Introduction to Computer Science Class at Westwood Schools
makes their home. Each day a different scribe will post the class notes so that the class can participate in the discussions. Welcome!