Huwebes, Setyembre 22, 2011

A Piece Of Something..


While I was walking, I stopped for a while and thought of the things I don’t have. Then I realize that the happiest moment of all the people don’t necessarily have the best of everything: they just make the most of everything that comes along the way. It’s true that we don’t know what we’ve got until we lost it but it’s also true that we don’t know what we’ve been missing until it arrives. In the gateway of my heart I put a sign that says, “No trespassing” but love came laughing and said, “I enter everywhere” Love knows no reasons, love knows no lies, love defies all reasons, love has no eyes. But love is not blind love sees but it doesn’t mind. Love is when you take away feeling. The passion the romance and you find that you still care for the person. Love is supposed to be the most wonderful feeling. It should inspire you and give you joy and strength. But sometimes, the things that give you joy and strength can also hurt you in the end. It starts with a smile, develops with a kiss and ends with a tear. When you love you must not expect anything in return. If you accept happiness, you’re not loving but using. Don’t go for looks, it can deceive. Don’t go for wealth even that fades away. Go for someone who makes you smile because only a smile make a day seem bright. The beginning of love is to let those we love be perfectly on them and not to twist them to fit our own image otherwise we love only the reflection of ourselves we find in them. Never try to impress someone to make him/her fall in love with you because when you do you’ll have to keep those standards for the rest of your life. A sad thing about life is that when we meet someone who means a lot to you only to find out that in the end that it was never bound to be and you just have to let him/her go. Maybe God wants us to meet a few wrong people before meeting the right one so that when we finally meet the right person we should know to be grateful for the gift. We can’t often see the reason why we don’t always get what we want but in the end of it all we realize that what we wanted was not meant for us at all everything happens for a reason. When you feel down because you didn’t get what you wanted just sit right and be happy because God’s thinking for something better for you. It hurts to love someone and not be loved in return but what is the most painful is to love someone and never have the courage to let the person how you feel. It’s always better to have found the courage to love even if you lose in the end rather than never finding love because you were too afraid to face its challenge. The greatest regrets in our lives are the risks we did not take. If you think something will make you happy, go for it. Love no matter how hard you find it. You won’t see it. No matter how hard you try, you won’t get it. But when you’re about to give up, it comes. Sometimes the love that we are looking for this right in front of us is too close for our eyes to see. So close your eyes to let your heart see itself. There are things you love to hear but you can’t hear it from the person who says it with his heart just because someone doesn’t love you the way you want. There are many stars in the sky, only some are radiant to be noticed. God never closes the door without opening the window. He always gives us something better when He takes something away. In relationships thank God when you’re hurting or crying, there you are given the chance to measure the importance of the relationship of the person and of yourself. When you grow you don’t become a better person because you experience suffering. We have no right to ask when sorrow comes. “Why does this happen to me?” unless we ask the same question or every moment of happiness that comes our way. When God puts a tear in your eye it’s because He wants to put a rainbow in your heart. There are some things that we never want to let go of people we never want to leave behind but keep n mind that letting go isn’t the end of the world. It’s the beginning of the new life. The brightest future will always be based on a forgotten past. You can’t go on well in life when you can’t let go you’re past failures and heartaches. To let go is not to deny but to accept. To let go is not regret the past but to grow and to live for the future. To let go is to fear less and to love more. Don’t be afraid to break someone’s heart or leave your heart broken because that’s how relationships are when you’re young they are stepping-stones for the main one. Follow your heart. It might not right but despite the pain you will have memories that will make you smile every once and rare while. It’s better to lose the person you love now and have him later than have him now and lose him forever. Love has its time, seasons and own reasons. You can’t ask it to stay. You can only embrace it comes and be glad that a moment of your life it was yours. Each of us is what we will. But we can never go back a day. Don’t let each moment pass you by for within the twin ding eye that moment shall go and that feeling shall die. It might be too late when you open your eyes. Don’t be so busy the life you’re going to have that you fall to appreciate that you’ve already given. Dream what you want to dream, go where you want to go, be what you want to be cause you only have one life and one chance to do all the things that you want in life. We are never given dreams without the power to make it come true. A heart in love never loses hope but always believes in the promises of love. No matter how long the time and how far the distance never say goodbye when you still want to try, never give up when you still can take it, never say you don’t love that person anymore when you can’t let go. True love doesn’t have a happy ending. That’s because love doesn’t have an ending…

Mountain Story



"A son and his father were walking on the mountains.
Suddenly, his son falls, hurts himself and screams: "AAAhhhhhhhhhhh!!!"
To his surprise, he hears the voice repeating, somewhere in the mountain: "AAAhhhhhhhhhhh!!!"
Curious, he yells: "Who are you?"
He receives the answer: "Who are you?"
And then he screams to the mountain: "I admire you!"
The voice answers: "I admire you!"
Angered at the response, he screams: "Coward!"
He receives the answer: "Coward!"
He looks to his father and asks: "What's going on?"
The father smiles and says: "My son, pay attention."
Again the man screams: "You are a champion!"
The voice answers: "You are a champion!"
The boy is surprised, but does not understand.
Then the father explains: "People call this ECHO, but really this is LIFE.
It gives you back everything you say or do.
Our life is simply a reflection of our actions.
If you want more love in the world, create more love in your heart.
If you want more competence in your team, improve your competence.
This relationship applies to everything, in all aspects of life;
Life will give you back everything you have given to it."

YOUR LIFE IS NOT A COINCIDENCE. IT'S A REFLECTION OF YOU!"

Miyerkules, Setyembre 21, 2011

Two frogs



A group of frogs were traveling through the woods, and two of them fell into a deep pit. When the other frogs saw how deep the pit was, they told the two frogs that they were as good as dead. The two frogs ignored the comments and tried to jump up out of the pit with all their might. The other frogs kept telling them to stop, that they were as good as dead. Finally, one of the frogs took heed to what the other frogs were saying and gave up. He fell down and died.

The other frog continued to jump as hard as he could. Once again, the crowd of frogs yelled at him to stop the pain and just die. He jumped even harder and finally made it out. When he got out, the other frogs said, "Did you not hear us?" The frog explained to them that he was deaf. He thought they were encouraging him the entire time.

Be careful of what you say. Speak life to those who cross your path. The power of words... it is sometimes hard to understand that an encouraging word can go such a long way. Anyone can speak words that tend to rob another of the spirit to continue in difficult times. Special is the individual who will take the time to encourage anothe

Love and Time



Once upon a time, there was an island where all the feelings lived: Happiness, Sadness, Knowledge, and all of the others, including Love. One day it was announced to the feelings that the island would sink, so all constructed boats and left. Except for Love.

Love was the only one who stayed. Love wanted to hold out until the last possible moment.

When the island had almost sunk, Love decided to ask for help.

Richness was passing by Love in a grand boat. Love said,
"Richness, can you take me with you?"
Richness answered, "No, I can't. There is a lot of gold and silver in my boat. There is no place here for you."

Love decided to ask Vanity who was also passing by in a beautiful vessel. "Vanity, please help me!"
"I can't help you, Love. You are all wet and might damage my boat," Vanity answered.

Sadness was close by so Love asked, "Sadness, let me go with you."
"Oh . . . Love, I am so sad that I need to be by myself!"

Happiness passed by Love, too, but she was so happy that she did not even hear when Love called her.

Suddenly, there was a voice, "Come, Love, I will take you." It was an elder. So blessed and overjoyed, Love even forgot to ask the elder where they were going. When they arrived at dry land, the elder went her own way. Realizing how much was owed the elder,

Love asked Knowledge, another elder, "Who Helped me?"
"It was Time," Knowledge answered.
"Time?" asked Love. "But why did Time help me?"
Knowledge smiled with deep wisdom and answered, "Because only Time is capable of understanding how valuable Love is."

Miyerkules, Agosto 10, 2011

Quiz 9 - Computer Security and Safety, Ethics, and Privacy

1. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy,
unethical employee, cyberextortionist, and cyberterrorist.

Answer: 
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability. Cybercrime is an online or Internet-based illegal act like :
    a.) Hacker is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge.
    b.)  Cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.
    c.) Script kiddies is a derogatory term used to describe those who use script or programs developed by others to attack computer systems and networks and deface websites and have their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.Such programs have included remote denial-of-service and vulnerability scanner/injector and often software intended for legitimate security auditing.
    d.) Corporate spies
    e.) Unethical employee
    f.) Cyberextorionist
    g.) Cyberterrorists

2. Describe various types of Internet and network attacks (computer viruses,
worms, Trojan horses, rootkits, botnets, denial of service attacks, back
doors, and spoofing), and identify ways to safeguard against these attacks,
including firewalls, intrusion detection software, and honeypots.

Answer:
A computer virus affects the computer negatively by altering the way the computer works, Worm copies itself repeatedly, using up resources and possibly shutting down computer or network. Trojan horse is a malicious program that hides within or looks like a legitimate program and Rootkit is a program that hides in a computer and allows someone from a remote location to take full control. A denial service attack is an assualt which disrupts computer access to an Internet service such as the Web or-email. Back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource while spoofing is a tachnique intruders use to make their networks or Internet transmission appear legitimate to a victim computer or network. There are ways to prevent the different kinds of virus in computers like firewall it is a security system consisting of hardware and or software that prevents unathorized intrusion, monitors transmissions to and from computer and informs you to attempted intrusion. intrusion detection software analyzes network traffic, assesses system vulnerabilities and identifies intrusions and suspicious behavior.

3. Discuss techniques to prevent unauthorized computer access and use

Answer:
Some ways to prevent anuathorized computer access and use by disabling the file, folder and printer sharing on internet connection. use a user name with unique combination of characters that identifies user and make a password this is a private combination of characters associated with the user name that allows access to computer resources. aside from that ypou can also use a biometric device this is to authenticates person's identity using personal characteristics like fingerprints, hand geometry, voice, signature and iris.

4. Identify safeguards against hardware theft and vandalism
Answer:

Hardware theft  is act of stealing computer equipment and hardware vandalism is an act of defacing or destroying computer equipment to safeguard computer from hardware theft and vandalism must used cables to lock equipment, for notebooks computers use passwords, possessed objects and biometrics as security methods and also password can protect mobile devices.
5. Explain the ways software manufacturers protect against software piracy. 


5. Explain the ways software manufacturers protect against software piracy.

Answer:
Software theft is an act of stealing or illegally stealing software, copying software or intentionally erasing programs, software piracy is illegal duplication of copyrighted software and to protect the
manufacturer's software against piracy they should have a license agreement this is an agreement in which users have the right to use the software legally and single-user liscense agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer. Another way is the product activation which allows user to input product identification number online by telephone and receive unique installation identification number.

6. Discuss how encryption works, and explain why it is necessary

Answer:
Encryption is to safeguard against information theft, process of converting plaintext (readable data) into ciphertext (unreadable characters) it is necessary because it often uses more than one method the Encryption key (formula), to read the data, the recipient must decrypt, or decipher the data.

7. Discuss the types of devices available that protect computers from
system failure

Answer:
System failure is a prolonged malfunction of computer cause by aging hardware, natural disasters, or electrical power disturbances to protect the system from the said failure devices are available to protect the computer like surge protector it protects computer and equipment from electrical power disturbances and also uninterruptible power supply (UPS) is urge protector that provides power during power loss.

8. Explain the options available for backing up computer resources.

Answer:
Backup is a duplicate of file, program or disk, there are three options available for backing up computer the full back up of all files in computer, selective back up select which files to back up and three generation back up it preseves three copies of important files. ,in case of system failure or corrupted files restore files by copying to original location.

9. Identify risks and safeguards associated with wireless communications.

Answer:
ISDN and DSL modems - Communications devices that send and
receive digital ISDN and DSL signal.

             Cable modems - Sends and receives data over cable television network much faster than dial-up modem or ISDN sometimes called a broadband modem
             Wireless modems - Allows access to the Web wirelessly from a notebook computer, a PDA, a smart phone, or other mobile device Typically use the same waves used by cellular telephones
            Router - device that connects computers and transmits data to correct destination on network and internet using fastest available path some have a built-in hardware firewall.
           Hub or Switch - device that provides central point for cables in network

10. Discuss ways to prevent health-related disorders and injuries due to
computer use.

Answer:
directly affects our vision and other parts and also our social life some of these are coputer vision syndrom (CVS) this is the eye and vision problems, the
repetitive strain injury (RSI) or the carpal tunnel syndrom (CTS) the inflammation of nerve that connects forearm to palm and tendonitis the inflammation of tendon due to repeated motion and the third one is Computer addiction it is when computer consumes entire social life. but there are some ways to prevent this health-related disorders such as spreading fingers apart for several seconds while keeping wrists straight, gently push back fingers and then thumb, dangle arms loosely at side and then shake arms and hands. To ease eyestrain while working at the computer, you must have take an eyebreak every 10-15 minutes look into the distance and focus on an object for 20-30 seconds, roll your eyes in complete circle, close your eyes and rest them at least for one minute, blink your eyes every five seconds, place your display device about an arm's lenght away from your eyes with the top of the screen at eye level or below, use large fonts, if you wear glasses, ask your doctor about computer glasses and adjust the lighting.

11. Recognize issues related to information accuracy, intellectual property
rights, codes of conduct, and green computing.

Answer:
Intellectual property is the right to which creators are entitled for their work, Codes od conduct is a written guidelines that helps determine whether computer action is ethical and employers can distribute to their employess in order to them to have a guide.
12. Discuss issues surrounding information privacy, including electronic
profiles, cookies, spyware and adware, spam, phishing, privacy laws, social
engineering, employee monitoring, and content filtering.

Answer:
Information privacy is the right of individuals and companies to deny or restrict collection and use of information about them yet today,  it is difficult because data is stotred online, employee monitoring is using computers to observe employee computer use and it is legal for employers to use monitoring software programs.  Electronic profile is a data collected when you fill out form on Web and there are merchants sell your electronic profile, often times you can specify whether you want personal information distributed. Cookies are small text file on your computer that contains data about you, some Web sites sell or trade information stored in the cookies and set browser to accept cookies promt you to accept cookies, or disable cookies. Spyware is a program placed on computer without user's knowledge while adware is a program that displays online advertisement. Spam is unsolicited e-mail messages sent to many recipients. Phishing is scam in which perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.

Lunes, Agosto 1, 2011

QUIZ 8

Quiz 8 - Database Management

1. Define the term, database, and explain how a database interacts with data
and information.

Answer: A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model relevant aspects of reality (for example, the availability of rooms in hotels), in a way that supports processes requiring this information (for example, finding a hotel with vacancies). 

2. Describe file maintenance techniques (adding records, modifying records,
deleting records) and validation techniques.

3. Discuss the terms character, field, record, and file

Answer:
  • The Character class wraps a value of the primitive type char in an object. An object of type Character contains a single field whose type is char.
  • A Field provides information about, and dynamic access to, a single field of a class or an interface. The reflected field may be a class (static) field or an instance field. ``A Field permits widening conversions to occur during a get or set access operation, but throws an IllegalArgumentException if a narrowing conversion would occur. 

4. Discuss the functions common to most database management systems:
data dictionary, file retrieval and maintenance, data security, and backup
and recovery.

Answer: The Database Library is built on a Data Dictionary, which provides a complete description of record layouts and indexes of the database, for validation and efficient data access.
The file organizer functions allow you to create folders based on information contained inside the file and outside the file system it is stored in, and move / copy the file to these folders.

5. Differentiate between a file processing approach and the database
approach.

Answer: File processing approach - each department or area within an organization has its own set of data files.
Database Approach -Many programs and users share the data in a database. Reduces data redundancy, improves data integrity, shares data, permits easier access, and reduces development time.

6. Describe characteristics of relational, object-oriented, and
multidimensional databases.

Answer: Relational Database - is a database that stores data in tables that consist of rows and columns. Each row has a primary key and each column has a unique name.
Object - oriented database (OODB) - stores data in objects. An object is an item that contains data, as well as the actions that read or process the data.
Multidimensional database - stores data in dimensions and can store more than two dimensions of data.

7. Explain how to access Web databases.

Answer:
You can use Access 2010 and Access Services, a new component of SharePoint, to build web database applications. This helps you:
  • Secure and manage access to your data
  • Share data throughout an organization, or over the Internet
 Note    A user account is required to use a web database. Anonymous access is not supported.
  • Create database applications that don't require Access to use
8. Define the term, computer security risks, and briefly describe the types
of cybercrime perpetrators: hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.

9. Identify database design guidelines and discuss the responsibilities of
database analysts and administrators.

10. Discuss techniques to prevent unauthorized computer access and use

Miyerkules, Hulyo 27, 2011

FOREVER by: MC

Lyrics to Forever :

Hey oh yeah

Those days of love are gone
Our time is through
Still I burn on and on
All of my life
Only for you

From now
Until forever
And ever, my darling
Forever
You will always be the only one
You will always be the only one

As long as I shall live
I'll hold you dear
And I will reminisce
Of our love all through the years

From now
Until forever
And ever, my darling
Forever
You will always be the only one
You will always be the only one

If you should ever need me
Unfailingly, I will return to your arms
And unburden your heart
And if you should remember
That we belong together
Never be ashamed
Call my name
Tell me I'm the one you treasure

Forever
And ever, my darling
Forever
You will always be the only one yes
You will always be the only one oh baby
You will always be the only one

Forever (forever)
You will always be the only one
Forever (forever)
You will always be the only one
Forever (forever)
You will always be the only one
Forever (forever)
You will always be the only one
Forever (forever)
You will always be the only one
Forever (forever)
You will always be the only one