compute99.blogspot.com
Computer Applications II: Digital Piracy
http://compute99.blogspot.com/2008/03/digital-piracy.html
Friday, March 14, 2008. The number of CD's and DVD's being purchased is at an all time low due to the use of the internet to purchase and download media. However; much of the time file sharing is used in which people share music with others on the web and the media is taken without reimbursing its producers. Read the article on the actions of the Swedish government and its crack down on file sharing. Should people be allowed to file share? What would a movie producer or a musician think of file sharing?
compute99.blogspot.com
Computer Applications II: Can a Lawyer be Outsourced?
http://compute99.blogspot.com/2008/04/can-lawyer-be-outsourced.html
Monday, April 7, 2008. Can a Lawyer be Outsourced? As you recall from our novel, ". The World is Flat. Many careers are being outsourced by way of the internet. Read the following article ". Call My Lawyer. In India. And create a dialogue on how they are outsourcing lawyers to India. How is this happening and do you think this will diminish the career as an opportunity for Americans? Call My Lawyer. In India. Lawyers can be outsourced. April 11, 2008 at 8:30 AM. April 18, 2008 at 10:28 AM.
compute99.blogspot.com
Computer Applications II: April 2008
http://compute99.blogspot.com/2008_04_01_archive.html
Monday, April 7, 2008. Can a Lawyer be Outsourced? As you recall from our novel, ". The World is Flat. Many careers are being outsourced by way of the internet. Read the following article ". Call My Lawyer. In India. And create a dialogue on how they are outsourcing lawyers to India. How is this happening and do you think this will diminish the career as an opportunity for Americans? Call My Lawyer. In India. Subscribe to: Posts (Atom). Comp II Theme Blogs. Ramon's School Issues Blog.
compute99.blogspot.com
Computer Applications II: IDENTITY THEFT
http://compute99.blogspot.com/2008/03/identity-theft.html
Sunday, March 23, 2008. Read the following article on Identity Theft (. 1 What happens when someone steals an identity? What do they use it for? Use examples from the article. 2 How does someone steal an identity? What is a phishing scheme. 3 How can you protect yourself from identity theft? Give two examples from the article. Two examples of protecting yourslef from identity theft are:. 1-be aware when you are working with your pers0nal information in public. March 26, 2008 at 10:40 AM. You can protect ...
compute99.blogspot.com
Computer Applications II: February 2008
http://compute99.blogspot.com/2008_02_01_archive.html
Monday, February 11, 2008. Read the following article: " Providing a Safety Net for the Web. Do you believe that the internet should have more government regulations on it? Is there anything that can be done about new issues such as cyber bullying and maintaining peoples privacy on the web? Sunday, February 3, 2008. Welcome to Computer Applications II. Instructor - Jarrod McEntarfer. Initial Question: Computer Literacy. Do you believe that everyone must be computer "literate" today to function in society?
compute99.blogspot.com
Computer Applications II: Cyber Terror?
http://compute99.blogspot.com/2008/03/cyber-terror.html
Monday, March 31, 2008. Cyber-terrism is common place in today's news, but what is it really and what could be the consequences of a cyber-terror attack? After you've defined cyber-terrorism read the article by the BBC that claims it is all hype and myth to sell newspapers. Do you agree? Explain why or why not. Cyber-terrorism a Myth BBC. Subscribe to: Post Comments (Atom). Comp II Theme Blogs. Ramon's School Issues Blog. View my complete profile.
compute99.blogspot.com
Computer Applications II: Regulating the Internet
http://compute99.blogspot.com/2008/02/regulating-internet.html
Monday, February 11, 2008. Read the following article: " Providing a Safety Net for the Web. Do you believe that the internet should have more government regulations on it? Is there anything that can be done about new issues such as cyber bullying and maintaining peoples privacy on the web? I think the government should not put their hads on the internet because they may go into peoples privacy. the internet is a free space to do whatever u want, but anything thats legal though. I beleive the government ...
compute99.blogspot.com
Computer Applications II: Introduction
http://compute99.blogspot.com/2008/02/introduction.html
Sunday, February 3, 2008. Welcome to Computer Applications II. Instructor - Jarrod McEntarfer. Initial Question: Computer Literacy. Do you believe that everyone must be computer "literate" today to function in society? What about future generations? Explain your answer using your own experience and examples from the link above. February 7, 2008 at 10:35 AM. Computer literacy is the knowledge and ability to use computers and technology efficiently. February 7, 2008 at 10:41 AM. February 8, 2008 at 10:36 AM.
compute99.blogspot.com
Computer Applications II: March 2008
http://compute99.blogspot.com/2008_03_01_archive.html
Monday, March 31, 2008. Cyber-terrism is common place in today's news, but what is it really and what could be the consequences of a cyber-terror attack? After you've defined cyber-terrorism read the article by the BBC that claims it is all hype and myth to sell newspapers. Do you agree? Explain why or why not. Cyber-terrorism a Myth BBC. Sunday, March 23, 2008. Read the following article on Identity Theft (. 1 What happens when someone steals an identity? What do they use it for? Friday, March 14, 2008.