itglenvar.blogspot.com
Information Technology Fundamentals: Alice
http://itglenvar.blogspot.com/2009/12/alice.html
Monday, December 14, 2009. INSERT IMAGE OF ALICE! DO NOT KEEP MY QUESTIONS IN YOUR POST. YOUR POST SHOULD BE COMPLETE SENTENCES! If someone wanted to download Alice, where would they go? You will have to do some reasearch of your own here). What objects doe Alice have to offer? This should be a long list of various objects or themes Alice offers). What could Alice be used for? What are the pros of Alice? What are the cons of Alice? What world did you make with Alice? Did you enjoy Alice? If yes, for what?
tylercadd.blogspot.com
Tyler Cadd
http://tylercadd.blogspot.com/2009/10/ethernet-cable-is-used-to-connect.html
Wednesday, October 21, 2009. An ethernet cable is used to connect a computer to a network. Materials needed 1 networking cable with your desired lenght, 2 RJ-45 jacks, cable cutting pliers. Step 1: Pull the cable out of the box to the desired lenght. Step2: Strip the cable at both ends no longer than 3/4 on an inch. Step 3: spread each seperate wire out. Step 4: Place the wires in order from left to right light orange, dark orange, light green, dark blue, light blue, dark green, light brown, dark brown.
itglenvar.blogspot.com
Information Technology Fundamentals: May 2009
http://itglenvar.blogspot.com/2009_05_01_archive.html
Sunday, May 24, 2009. Http:/ www.columbia.k12.mo.us/depts/images/kids.jpg. Part II of our selected readings was to choose a chapter from the book and complete reflection questions. The sections included in the music, math, science, foreign language, english, health, physical education classrooms. I guess since I teach Business and Marketing and those are Technology based courses there wasn't a chapter for me! Early Production= Addt'l 6 months to get 1,000 receptive and active words. That is a lot of time!
itglenvar.blogspot.com
Information Technology Fundamentals: December 2009
http://itglenvar.blogspot.com/2009_12_01_archive.html
Monday, December 14, 2009. INSERT IMAGE OF ALICE! DO NOT KEEP MY QUESTIONS IN YOUR POST. YOUR POST SHOULD BE COMPLETE SENTENCES! If someone wanted to download Alice, where would they go? You will have to do some reasearch of your own here). What objects doe Alice have to offer? This should be a long list of various objects or themes Alice offers). What could Alice be used for? What are the pros of Alice? What are the cons of Alice? What world did you make with Alice? Did you enjoy Alice? If yes, for what?
itglenvar.blogspot.com
Information Technology Fundamentals: Google Images
http://itglenvar.blogspot.com/2010/02/google-images.html
Friday, February 19, 2010. Find an image of a LEGO Robot. What can it do? What can you make it do? Find an image of a cool Logo that you really like. What is it for? Do the colors mean anything specifically? Why do you like it so much? If you created a logo for yourself, describe it here. Why would you choose the things that you choose? Do a very rough sketch in paint and paste your picture here. If you could create any static cling for your car window or bedroom window, what would it look like and why?
itglenvar.blogspot.com
Information Technology Fundamentals: Post #2
http://itglenvar.blogspot.com/2009/10/post-2.html
Tuesday, October 13, 2009. Go to http:/ www.cybercrime.gov/. Scroll to the bottom of the page. Select one link at the bottom of the page and let your instructor know what one you pick. Take 15 minutes to read the article and make a note of the 8 most important facts that the class should know. Type your 8 facts as Post #2 your blog and prepare to share them with the class vocally. You will have approximately 3 – 5 minutes to speak. 50 pts) Facts were important. 25 pts) Presentation was organized.
sonsofdixie.blogspot.com
csa: How to build an ethernet cord
http://sonsofdixie.blogspot.com/2009/10/how-to-build-ethernet-cord.html
Wednesday, October 21, 2009. How to build an ethernet cord. C Cable cutting pliers. Step 1. Cut the cord to desired length. Step 2. Strip some of rubber on the end of the wire- make the colors reach the end of the RJ-45jack without exposing them. Step 3. Untwist and spread out wires. Step 4. Place wires in correct order-left to right. Step 5. Face clip part down. Step 6. With clip part facing down, stick in the wires-each wire has its own slot. Step 9. Repeat steps for the other side.
tylercadd.blogspot.com
Tyler Cadd: Post #2
http://tylercadd.blogspot.com/2009/10/post-2.html
Tuesday, October 13, 2009. INTERNATIONAL HACKER PLEADS GUILTY FOR MASSIVE HACKS. OF US RETAIL NETWORKS. In this article a man named Albert Gonzalez pleaded guilty to hacking into some major. Credit and debit card numbers used at retail stores. Albert hacked into many credit and debit card numbers 40 million credit and debit credit numbers were stolen by Albert. Albert. Also pleaded guilty to one count of conspiracy to commit wire fraud relating to. Watches, and his 2006 BMW. All of Albert's.
sonsofdixie.blogspot.com
csa: November 2009
http://sonsofdixie.blogspot.com/2009_11_01_archive.html
Thursday, November 19, 2009. A AUP is a policy for network use. Every year students have to sign one. Explain what an AUP is.How is an AUP used at Glenvar? Give 5 rules and why they would be important.How could an AUP policy be put in place at a job? Why are AUP's necessary? If you were the boss of a large company where each employee had their own computer and access to internet, what rules and regulations would you have? A AUP could be added at a workplace so employees wont goof off. 5 do not send spam.