Saturday, June 26, 2010

Assignment in Computer Science

1. SPYWARE

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

2. ADWARE

Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

3. TROJAN

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

4. COMPUTER VIRUS

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk,CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

5. SPAMMING

Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam.

6. INTERNET HOAX

Hoaxes - A hoax is simply a false warning about some danger that really does not exist. They are spread primarily through "chain" emails but can also spread through web sites, instant messengers, snail mail, or by word of mouth. A hoax is not a virus or any other type of program it is simply false information. Usually these will make their way to you "through the grape vine" someone tells you that someone told them that they were told by so and so that such and such is extremely dangerous and needs to be da da da with.


The 10 Commandments for Computer Ethics

1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

weeeeeeeeeehh! n.n
makasala ang dli mutuman.

Sunday, June 20, 2010

Personal View of the Upcoming Foundation Day of Pshs-Cmc

weeeeeeh! ^_^

Our school's foundation day is fast approaching. We, as a scholar, should participate in this kind of activities. For almost three years studying or staying in PSHS-CMC, I already have an idea or an overview of what the said activity is about. Maybe, there would be a special guest to offer an introductory address, or a teacher to share or reminisce the precious memories they had for the past years they've stayed in Pisay-CMC. Maybe, there's a sorting of freshmen as to what league they belong and if possible, there would be games played by leagues facilitated by the Supreme Council of Scholars
and I'm one of them so I know most of the activities that will happen, but I don't want to spoil it that much :D. Maybe, there's a presentation that'd be presented by each league? or by each batch? It depends.

The "maybe" statements have the 90% possibility to happen. :) I hope that the upcoming Foundation Day would be succesful and everbody's enjoying it! God Bless!

Introduction

Hi. Good day!

I'm Mary Diane Zaragoza Ismael. I'm a junior student of Philippine Science High School- Central Mindanao Campus. Friends, feel free to visit my blog here in blogspot.com. Thank you so much! :*