Thursday, June 3, 2010
Blog for IS101
I have to decide what college I want to attend. Phoenix U or Western Governors U. Both are great. Phoenix is costly (about $30 thousand total) and FAST! WGU is not so fast and it costs about 3 thousand every 6 months. You take as many classes as you can in that 6 months. So I can finish my BS in about 2 years (same for PXU) but much less than PXU.
This weekend will be spent getting ahead with this class, which should be pretty easy as I have no life other than work and school.
My husband works every Sunday, so there is no reason I can’t get ahead!! I hope to learn more than just book learning with this class. There are so many nice people here that have posted wonderful questions. I hope to get to know all of you better everyday!!
Saturday, May 1, 2010
Blog 10
Median Salary by Job in the Linux field
When looking at great jobs for Linux, I found the following pay scales and percent of women to men.
Sr. Software Engineer/Developer/Programmer make an average of $79,791 - $112,357. There are only 10% women and 90% men in this field.
Sr. Unix System Administrator pays an average of $79,027 - $106,751. There are only 6% of women and 94% of men.
Systems Engineer pays an average of $49,779 - $78,548 and employs 8% of women and 92% of men
Information Technology Manager pays an average of $57,365 - $101,44 and employs 11% of women and 89% of men.
Software Engineer/Developer/Programmer pays an average of $52,622 - $79,799 and employs 12% of women and 88% men.
UNIX System Administrator pays an average of $51,601 - $79,884 and employs 10% of women and 90% of men.
Systems Administrator pays and average of $42,815 - $64,622 and employs 11% women and 89% of men.
In this day and age, I don't understand my so few women. I'm thinking that schooling takes so long that most women go for raising families or go to school for "nurturing" fields. I honestly feel this would be a great field to enter, but the schooling would stop me too. As a non-traditional student, its hard enough to work full time and get a minimal AA degree. Although for all the schooling and degrees I have collected, I could have finished a BS. That is if I'd have know about Linux in the past.
Info taken from http://www.payscale.com/research/US/Skill=Linux/Salary
Sunday, April 18, 2010
Blog 12
The year is 2002. There once was this little penguin who lived in the Antarctic. His Mother left to find food and Dad was to take care of him. Well, the little penguin was very naughty and decided to run away from the pack. The little penguin walked and walked until he came to a little village of Eskimos. The little penguin decided that he did not like the cold, so he found his way into a little igloo. It was very warm and toasty in the igloo. Soon, he heard people coming. So he slithered into a backpack on the floor. As it was, a young boy was going off to college in Portland OR. The little boy left his igloo with his backpack and books. The little boy landed in Portland and decided that he needed a drink as the big city was over whelming. So as the little boy got drunk, the little penguin escaped from the backpack. The little penguin walked out of the airport to a nearby park. He was liking the weather so far and decided to take a little nap on a park bench. A man, by the name of Linus Torvalds, was walking by and saw the little penguin. Linus asked if the little penguin needed a place to stay since he was not married and was super rich and could give the little penguin everything he needed. The little penguin waddled to Linus's house and there was a beautiful house and as it happened to be, a wonderful penguin pool. As they were sitting there, the little penguin, had to poop, so he walked over to the Tuxedo that Linus just bought and pooped right on it. Linus decided to call him Tux... The end!!
Here is the real boring story taken from Wiki: "The concept of the Linux mascot being a penguin came from Linus Torvalds, the creator of Linux. Tux was created by Larry Ewing in 1996 after an initial suggestion made by Alan Cox [2] and further refined by Linus Torvalds on the Linux kernel mailing list.[3] Linus took his inspiration from a photograph[4] he found on an FTP site,[5] showing a penguin figurine looking strangely like the Creature Comforts characters made by Nick Park. The first person to call the penguin "Tux" was James Hughes, who said that it stood for "(T)orvalds (U)ni(X)".[6] However, many people observe that Tux is also an abbreviation of tuxedo, the outfit which springs to mind when they see a penguin.
Tux was originally designed as a submission for a Linux logo contest. Three such competitions took place; Tux won none of them. This is why Tux is formally known as the Linux mascot and not the logo.[7] Tux was created[8] by Larry Ewing using the first publicly released[9] version (0.54) of GIMP, a free software graphics package. It was released by him under the following condition:
Permission to use and/or modify this image is granted provided you acknowledge me lewing@isc.tamu.edu and The GIMP if someone asks.[10]"(I WANT THIS AS MY TATOO!!!)
Monday, April 12, 2010
Blog 11
Net Neutrality is where the internet is the same for everyone no matter the size of the issue. It would mean that I, as a fictitious, would have the same internet access as a huge company. My little company would be in the search engine, right up there with Amazon. The ISPs cannot squeeze me out because Amazon might pay the ISP to do so. I'm not saying Amazon wants this, quite the contrary, Amazon supports the net Neutrality".
The FCC, in 2005, had put down four principals to promote and preserve the public internet. The four are "1) access the lawful Internet content of their choice. 2) Run applications and use services of their choice, subject to the needs of law enforcement. 3)
Connect their choice of legal devices that do not harm the network. 4) Competition among network providers, application and service providers, and content providers." (this portion was copied from Wiki)
In 2008, the FCC auctioned off the 700MHz block of wireless spectrum, Google said they would fork over $4.6M if the FCC required that this spectrum would have 4 more conditions. 1) There would be open applications that any consumer can get. 2) There would be open devices that you can pick what ever network you want. 3) ISPs can interconnect with 700MHz license wireless network and 4) (I copied this work for word from Wiki as I didn't know who to add in my own works) Open services: Third parties (resellers) should be able to acquire wireless services from a 700 MHz licensee on a wholesale basis, based on reasonably nondiscriminatory commercial terms.
Then, 2009, the FCC added two more rules stating the ISPs can't discriminate against content or applications and they have to disclose all their policies to customers.
Comcast, illegally stopped users on high-speed Internet service from using file-sharing software. The FCC stepped in and voted 3-2 to uphold the complaint. Comcast would admit they were wrong, but had a settlement in Dec, 2009.
Although I would love to take a side, I think there should be tiers to a certain extent. I feel that Military, for the safety of the Nation, should have the fastest and take priority. But this does not mean every congress person gets the fastest the the most priority over me. This is only for MAJOR security reasons, like 9-11. I think there should be If Cisco want's to fork over millions of dollars for a higher tier that is way beyond what I would need, then go ahead. It will pay for a better internet for all of us. As long as it does not tell me what I can and can not access, I'm OK with that.
Thursday, April 8, 2010
Blog 10
NOT! Just like the iPhone and iTouch, the first version will be pointless to all in a year or 2. The iPad will be re-vamped and the original iPad will not have the hardware to support anything new. As you can see with the iTouch 1st gen and iPhone, the OS4 is coming this summer (SO EXCITED) and the will not have the hardware to support the good "goings on".
Unlike the iPhone,(due to contracts) you can upgrade the iPad whenever you want. So if you have money to play, OR FRED!!, you can upgrade to a better version anytime you want.
Per Steve Jobs, as of April 8th,(wonderful hour long video on the Apple web site) 450,000 sold already with 1 million apps downloaded in the first 24 hours and also as of the 8th, 3.5 million iPad apps downloaded . Someone is buying them!!!
I think I will wait to get my feet wet with the iPad. I will not be buying the non-apple versions, as I have to say, I'm in love with Apple products. Monday, I want to go buy the Apple TV. I think I really need that now.
So, back to the iPad. I will wait and see what all YOU people suggest in the next Gen gets fixed.
Thursday, April 1, 2010
Blog 6
SCO v. Novell is a lawsuit from SCO Group against Novell.
SCO Group stated that SCO property was in Linux by mistake and want Linux users to pay license fees to SCO.
SCO said in a round about way, that they owned the copyrights to the original “code and derivatives” from AT&T.
Novell said, no, we own Unix. Novell registers the copyrights and SCO sues for slander of title.
Now, Novell states that SCO owes them money for Unix. The courts agreed that SCO was should pay.
The court gave Novell 2.5M and SCO can't get involved with Sun. This went to appeals, but the appeals court agreed with the the lower court and Novell got what they wanted, including the 2.5M.
Sunday, March 14, 2010
Blog 5
a.) You think the project is a good idea
b) You think it is a bad idea
I think this is a bad idea. There are so many more important areas to focus on that will be immediate. I want more focus on how we can get children to be more involved in community activities. $20 million to promote "green" environment for the earth. Sending something to space to see what happens is pointless. You spend all this money just to have something go wrong and then entire mission is scrapped. $20 million can provide thousands of laptops, school books, community programs. As this man said, there are only 2 kids interested in this plan. I bet we could get way more kids interested in how to save rain forests, help other students get healthy. The government run space program is a dud. Why throw more money into this!! I really think Google should invest $20 million into our children and not empty space. Earth is in serious need of help. We need to start fixing, not just put on a big ass band-aide!!!
Or they can give me some and I will start a sanctuary for little breed abused dogs!!
Saturday, March 6, 2010
Blog 4
Linux kernels are numbered as such:
Linux kernels have several releases and revisions. This is because it’s an open source, meaning free to read and study.
Back in 1991, Tovalds, started the numbering system with 0.01, 0.02 ect to represent month to month.
Starting in 1994, 1.0 started. Then in 1996, 2.0 started and stayed. Now the numbering system is in 4 sets of numbers.
The 1st set is the 2.0. The 2nd set is used for major revision. If the number is even, the software is stable and good to go. Odd numbers were not stable, meaning people need to look at the code and make fixes.
The 3rd set is used for minor revisions. Just little issues, new features and drivers.
The 4th set is for bugs and patches. There can be letters (rc) on the end of the set of numbers and they represent release candidate, which means it’s not official yet. Other letters can be the peoples initials that did the changes.
The most current stable version, as of 3/6/10, when I wrote this is 2.6.33. (http://www.kernel.org/) I don't know why there is not a 4th set of numbers. I’m thinking it’s because the last stable 4th set is 9, and that did not change.
Saturday, February 13, 2010
Blog 3
Cathedral vs the Bazaar started as an essay and is now a book by Eric S. Raymond.
Cathedral is a an open code, but is for a limited number of people to play with and fix.
Bazaar is an open code, but anyone can play and fix.
They are both important as fixes can be done relatively quickly and people that really know what they are doing can develop programs quickly.
My question is what about the bad people. They can get in and screw everything up??
Sunday, February 7, 2010
Blog 2
Its a desktop tool that works as a file mgr, browser and you can use for remote access.
List 4 things that you an do with Konqueror
Look at text files, browse the web, remote access to another computer, manage directories.
How do you use Konqueror to search for a file?
Search > in the toolbar
What is a terminal emulator?
Opens a command line.
What does it allow you to do from a GUI that would not be able to do without one?
You can use this while still in a GUI
What is klipper?
klipper is like an MS clipboard. Its saves what you copy.
How do you use it to cut and paste text?
Highlight the text and click the klipper icon. To paste, middle click.
What is Nautilus?
This is a file mgr.
List 2 ways that you can open a file using Nautilus?
Double click or right click to that you want.
How does Nautilus "know" which program to use to open different types of files.
It looks at the MIME type.
What are the 3 commonly used Nautilus control bars?
Menu, location and tool bar.
What kinds of tools do you find on each.
Menu - File, edit, view.
Location - shows file paths.
Toolbar - back, forward, refresh
Discuss the use of the Nautilus location bar.
This shows the path name and you can enter the path name in.
Thursday, January 28, 2010
7 things you don't need to know about me
2. I have Digital OCD
3. I eat chicken noodle soup out of a can
4. I am a FaceBook freak!
5. I can't cook
6. I love "The Golden Girls" reruns
7. I want to be a horse trainer
Friday, November 6, 2009
Blog 14
Troj/Invo-Zip - This is a Trojan virus. A Trojan virus allows a hacker remote access to your computer system This is also Malware. Malware gets in and damages the computer without the computer owners approval or knowledge. This virus is sent in a spam email that claims to be an invoice. It comes as a zip file.
To remove:
1. Using Enterprise Console
You can remove Trojans over a network using Enterprise Console.
2. Sophos Anti-Virus for Windows, version 7
To remove a Trojan:
* Close down all programs.
* Go to Start|Programs|Sophos|Sophos Anti-Virus and run the 'Sophos Anti-Virus' program.
* In the 'Available scans' list, select the scan for which you want to enable removal, or use 'Setup a new scan' to scan your local disks. (Do not select a scheduled scan, as you will not be able to run this manually.)
* Click Edit|Configure this Scan.
* Select the Cleanup tab and select 'Automatically clean up items that contain virus/spyware'. Click Apply|OK.
* Click 'Save and Start' to save the scan, and run it immediately.
* At the end of the scan, click the link in 'Items passed to Quarantine' to open Quarantine manager.
* Select any items needing removal.
* From the 'Perform action' dropdown, select 'Delete'.
* Select 'Yes' or 'Yes to all' to delete files.
* Run another scan to ensure that the file has been removed.
* Click Edit|Configure this Scan.
* Select the Cleanup tab and deselect 'Automatically clean up items that contain virus/spyware'. Click Apply|OK.
If Sophos Anti-Virus cannot delete files because they are held open by the operating system, make a note of the names of the files, then do as follows.
1. Download an emergency copy of SAV32CLI. On an uninfected Windows computer, run this file to extract the contents into a SAV32CLI folder on a medium that can be write-protected. Copy the SAV32CLI folder produced onto a medium that can be write-protected. Add any relevant IDEs to this folder and write-protect the disk (on a CD/R or CD/RW close the session).
2. Restart the computer in Safe Mode. Go to Start|Shut Down. Select 'Restart' from the dropdown list and click 'OK'. Windows will restart. Press F8 when you see the following text at the bottom of the screen "For troubleshooting and advanced startup options for Windows 2000, press F8". In the Windows 2000 Advanced Options Menu, select the third option 'Safe Mode with Command Prompt'.
3. At the affected computer, place the CD in the CD drive (D: in this example). At the command prompt type
D:
to access the CD drive. Type:
CD SAV32CLI
Then type:
SAV32CLI -REMOVE -P=C:\LOGFILE.TXT
to remove the file.
4. Before leaving Safe Mode, edit any registry entries mentioned in the analysis recovery instructions. If problems persist, contact support.
3. Windows 95/98
To remove a Trojan:
* Check the threat analysis for details on the Trojan and its removal.
* Go to Start|Programs|Sophos Anti-Virus and run the Sophos Anti-Virus program.
* Select the Immediate tab.
* Go to Options|Configuration. Select the 'Disinfection' or the 'Action' tab, (according to what is displayed in your window) select 'Infected files', select 'Delete' then click 'OK'.
* Click the green 'scan' arrow, or the 'GO' button (as appropriate) to run the scan.
* Delete the files. Run another scan to check it has gone.
* Go back to Options|Configuration. Select the 'Disinfection' or the 'Action' tab, then deselect 'Infected files' and 'Delete'. Click 'OK'.
* Reboot and run a final scan to be certain it has gone.
If the Trojan cannot be removed because the files are held open by the operating system:
* Reboot the computer from a clean startup or system disk.
* Delete the file manually, or using the following DOS instructions:
You will need SWEEP for DOS on floppy disk. To do this, make a set of Emergency SAV disks.
* Check the threat analysis for details on the Trojan and its removal.
* Reboot your PC from a clean system disk, put the SWEEP for DOS disk in the floppy drive and at the A: prompt type:
SWEEP *: -REMOVEF
[TOP]
4. Mac OS X computers
To remove a Trojan:
* Check the threat analysis for details on the Trojan and its removal.
* Close down all programs.
* Run the Sophos Anti-Virus program.
* Go to 'Sophos Anti-Virus|Preferences'.
* Choose 'Disinfection' from the 'Immediate Mode' menu.
* Select 'Action on Infected Files' and 'Delete'.
* Close 'Sophos Anti-Virus preferences'.
* Click the green 'Play' arrow button.
* Click 'OK' when asked if files should be deleted.
* Run another scan to ensure that the Trojan has been removed.
* Go back to 'Disinfection settings' and deselect 'Action on Infected Files' and Delete.
* If problems persist, contact support.
5. NetWare
Note: This will delete any documents infected with macro viruses. Deal with them first.
* Check the threat analysis for details on the Trojan horse and its removal.
* Run a scan to locate all Trojan files.
* Select 'Delete' in the Removal mode option of the Immediate Mode menu.
* Delete the Trojan files.
6. Linux
* Check the threat analysis for details on the Trojan and its removal.
* Use savscan with the -remove option
savscan -remove
* Run a scan to check that Trojan infected files were deleted.
7. UNIX
* Check the threat analysis for details on the Trojan and its removal.
* Use SWEEP with the -remove option
sweep -remove
* Run a scan to check that Trojan infected files were deleted.
8. OpenVMS
* Check the threat analysis for details on the Trojan and its removal.
* Delete the Trojan files by running VSWEEP from DCL using the command line qualifier '/REMOVEF'.
* Note: '/REMOVEF' does not prompt for confirmation before deletion and should be used with caution.
Blog 13
I picked San Francisco Mayor Gavin Newsom. Mayor Newsom started “Open Data Policy” on the site Datasf.org. This is open data, participation source on an open website. This site will be an interaction between residents and agencies and will share infor. There is an interactive crime map with San Francisco Crimspotting. This is a link that take you to areas where there is crime and what the crime is.
He also supports EveryBlock. This is a breakdown of what neighborhoods are requesting from their government.
Mayor Newsom issued an “Open Data Executive Directive”. This asks that government be open and put anything that is not confidential on “Datasf.org” for all the public to see.
To me this technology will make sure that there is nothing hidden in the government (but of course, there still will be), but this is a good start. He is trying to bring in public partnering with government.
Blog 12
Windows ME was unstable and unreliable. It would freeze up and crash often. Some found it difficult to install and getting to to run correctly. It did not work well with the hardware and the software on your computer. Malware would reinstall with a system restore. System restore would use incorrect date stamps on the system restore. You could not trust the date stamp after Sept 8, 2001. Microsoft had to issue an update to fix this.
ME did not support MS Fax, QuickView, Active Directory and more because this release was mainly targeted to the home user.
Micrsoft released 3 Beta version during the development. It was released December 31, 2000 and support ended Dec 31 2006.
I remember having this, but at that time, I was just interested in basic computer fun. I remember installing ME and thinking this MUST be better, the packaging and commercials were so cool! And it was "first" upgrade and I thought I was so cool getting the latest and greatest!!!
Saturday, October 31, 2009
Blog 11
Linux is an operating system. It is installed on mobile phones to supercomputers, but basically used in servers. Per Linux.com, Linux does not need anti-virus protection because the user is very rarely logged into the root. The virus would have a hard time modifying the registry. "AVG Free for Linux" is designed for Linux and it's free, so it cant hurt.
Anyone would want to use Linux after you get used to it. Its an operating system that has no virus as of yet and very stable. You can use OpenOffice instead of MicroSoft Office,The Gimp instead of Photoshop, Foxfire instead of Internet Explorer, Thunderbird instead of Microsoft Outlook and MMMS Mplayer instead of Windows Media Player.
Friday, October 30, 2009
Blog 10
I will add that the iPhone basically has this feature already. MS seems to be one step behind!
Sunday, October 18, 2009
Blog 9
"cyberguys.com" (best place ever to shop if you are a computer geek!!)
The multimedia device that I would really find fun and handy for my office as we do not have laptops, we have desktops, would be a "Handwriting Recognition System"
This is a pen and a "reader" that takes what you write, on any type of paper, write all your notes page after page and you can upload to your computer as a text file. This can hold up to 50 pages of info. It uses regular ink so that you save money on special ink and you can use any kind of paper unlike some expensive brands that need a specific "Tablet".
This comes with handwriting recognition software, extra regular ink, 17 languages, USB cable and 2 batteries.
This does not work with a Mac. This will work for Windows 2000/XP/Vista and works with Office XP/2003/2007. Cyberguys.com sells this for $73.39
This is sold by IOGEAR. There is more specific information on the IOGEAR website at www.iogear.com, but don't buy it there as its $99.95 on that site.
This is just one multimedia toy in this catalog that I love. My other favs are power strip liberators and USB hubs.
Saturday, October 17, 2009
Blog 8
What is the price of the internal floppy drive? You can get an internal for about $25 at Tigerdirect.com.
What kind of connections do the external floppy disk drives uses? the particular one I looked at used a 34 pin floppy connector.
What is the price of an external floppy drive? You can get an external floppy drive for about $20 at TigerDirect.com.
Why do you think external drives cost more than internal drives? Because they need to be self sufficient and they have a case.
What are the advantages of external drives? Handy to carry around.
Internal Drives - Stability as far as cant be dropped, you cant loose them and you can transfer data to other machines carrying a floppy.
In addition, define these terms:
*******I need help with the layman's terms for Low level formatting and IDE...
DMA - sends data from drives to memory with out going through the CPU. DMA has 7 speeds 0-6
low level formatting - I read this and still cant tell you in my own words what this is.
SATA - A serial ATA has a bit following the next. They come in 2 cables, eternal and internal. They are thin so that airflow in the case is not compromised. External SATA are 6 times faster that USB or Firewire. They are more costly than a parallel cable, because they are new. They are expected to be for high-performance large drives. Several drives now use the SATA.
ATA - This is what controls speeds and transfer methods of drives and how they work with computers. There are 2 kinds, serial and parallel.
IDE - Technology used internally by a harddrive. (taken from the book. I still cant figure this is my terms)
Sunday, October 11, 2009
Blog 7
Second Life is an online community.
Businesses could use this for advertisement and free downloads.
Education could use this to post ads for Universities and create possible “classes” that the avatars can attend. They could be free general classes or tutorials or create small paid classes that you would pay through the dollars you can earn on this game.
I signed on and created a person. Not sure I would use this as I’ve been “walking” around for a while now and there is no easy explanation of what I am doing. I'm an instant gratification person and this site is not it. I had a guy walk by and say something in another language to me and they he through up his hands when I didn't answer.
I'm not familiar with this site as of yet. There is so much exploration. I think sites like this are a little un-nerving for me as they are interactive with strangers. I’m going to explore and read up on this site a bit more.
Saturday, October 3, 2009
Blog 6
There are many new innovative tools for people with disabilities. Find two, describe what they are, who they might help, how they work, and if possible, how much do they cost? Please make it more than one or two sentences....it is worth 10 points so I expect a little effort this time.
Mac OS X has a built in screen reading. This is a voice over program that tell you via the speaker what is going on, on your screen. It will tell you windows, menus, and more. This voice over program will let you control your Mac with your keyboard. Mac has braille display or you can use its multi touch trackpad. A Mac runs from $1000 to $3-4000
Another one of my favorites is Dragon Naturally Speaking. It will type as you speak, this helps visual impaired with letters, emails and several other programs on your computer It is very accurate and faster than typing. Dragon ranges from $99 standard to professional at $900.
Then there is my ultimate program. Its called Signtel Interpreter. This is for the deaf, hard of hearing, blind-deaf or visually impaired. This program translates speech and text to sign language. This is a program you load onto your computer. Laptops mostly. This program will run you $4,900.00 (text only) to text and voice for $5,400.00. Laptops can be added for another couple thousand.
Saturday, September 26, 2009
Blog 5
The processor frequency is how fast that internal processor beats per second. It beats more times in one second that a heart in a lifetime!
Word Size
The number of bits that a processor can handle at one time.
Overclocking
Overclocking is were you chance the processor speed to run faster than it was meant to go. It takes more work for the processor but can speed up games and applications. Overclocking can also speed up older processors so you don’t need a new faster one.
Data Path
The number of bits that goes in and out of the processor.
SRAM
Stands for static ram. This keeps the information on the computer until it the computer shuts down. This does not need to be refreshed. SRAM is more costly that regular memory.
Primary Cache
Primary Cache is the fastest memory on a PC. It's in the processor and a very small amount, not more than 64kb. The Primary cache runs the same speed as the processor.
External Cache
This is external memory that is not part of the processor, but may be in the processor. External cache is also called Level 2 (L2)
Memory Cache
Memory cache is RAM and keeps all your data in its memory so the computer doesn't have to always go back and look for it. Memory cache is also called Level 1 (L1)
Sunday, September 20, 2009
Power Supply for Mom
Mom, you need to go to newegg.com to buy this cool power supply for Dad.
It costs $39.89.
This has a 530W PSU which is the electrial power. A normal computer is from 200 to 600W. This should be great to run all Dad's stuff.
This delivers 28A on the +3.3V rail and 34A on the +5V rail plus 20A and 17A on the two 12V. This means that Dad's monitor that needs about 2A and his printer, about 2A and his CD drives that need about 1A and all his other drives will not even come close to using the 28 amps that this will provide.
This is an ATX so it will fit in Dad's common form factor machine.
The fan has a "Blue Glowing LED Fan", and I think that means is the fan is glowing, there is a charge in there, so tell him to be careful and not get shocked by the current that may still be in the power supply.
The 100 - 240 V is good, so incase of spikes, it can handle the extra volts.
I dont see an energy star rating, but it it states it delivers up to 80% efficiency. This could even save you $$ on your electric bill.
I hope this helps you! Have a great time in Bora Bora!!! Linda
Wednesday, September 9, 2009
What Does the Research Say About Technology's Impact on Education?
I read all the links on http://www.ncrel.org/sdrs/areas/te0cont.htm.
Research states that the Internet has become a vital part of learning. Students are researching more for their homework. Teachers need to monitor more due to “copying” from the internet.
Research shows that students that write down their homework retain more than copying and pasting from the internet.
There were so many research sites, but I noticed that very few gave actual grade statistics.
Students can get tutorials on line for science classes and it is much more effective than sitting and watching an outdated movie.
I think schools should stop buying books and start buying inexpensive laptops for students. I think the entire educational system should be evaluated as the technology grows. Grade schools are teaching out of date info because they can’t afford new books.
I do worry about children not learning the basics because of technology. Spelling is automatically correct, as is grammar. Math problems are solved in seconds. Students are lacking imagination.
My niece, who is 12, sends me “updates” on Facebook. I can’t understand half the words she is using the other half are spelled incorrectly.
Students may have more access to learning, but they are sadly under socialized.
Tuesday, September 1, 2009
Page 32 "Real Problems, Real Solutions" 1-8
Real Problems page 32-33
Linda Fluekiger
1. What is the system bus called? What 2 systems bus frequencies are offered?
The system bus is called a FSB and it is offered in 2.66G and a 2.93G
2. In the ad, what do you think P4 means?
The term P4 means Pentium 4.
3. What are the 4 choices of frequencies for the processor?
The 4 choices are 2.66, 2.93, 3.0 and 3.2G
4. What is the brand of the processor?
The brand of the processor is a Celeron
5. How much RAM is on the motherboard? What is the cost of doubling that amount of RAM
There are 512 of RAM and to $50 to double.
6. What type of expansion slot is used for the video card?
The expansion slot if a 900 w/16x PCI Express port
7. What terms describe the hard drive in the system?
The terms of the hard drive are 80GB SATA ATA 150
8. List the terms in the ad that you do not understand (many are not covered in this chapter) and save this list. You will need it in future chapters - The terms I don't understand are: ASUS, P5DG1-VM, SATA, ATX MB,
Monday, August 24, 2009
"Seven things you don’t know about me"
2. I bought my own lab manual
3. Back in '96, I took several MCSE classes
4. My 3 dogs are my babies
5. I am not happy with the short lab hours
6. I hate to cook
7. I love the Green Bay Packers!!!!!
8. Just checking!!
