Thursday, July 10, 2014

Would You Connect to an Unsecured Wireless Connection?

I would not connect to a nearby business or neighbor's wireless access in order to use the Internet for free.  This is stealing. Even if my neighbor gave me permission, I would still not do this because it is unethical.  If public places have "hot spots," I think this is alright because it is done publicly but not an isolated neighbor stealing from another.  It would be hard to detect that someone was using your network at home but if caught, people need to be punished.  On the other hand, the neighbor with the network needs to be punished in some way too for not having a secured connection. Not sure how punishment could be carried out, but this will be a continued hot issue for some time to come.

Sunday, June 29, 2014

Response to article "Employers Asking for Facebook Passwords" by Alison Doyle

Wow! Employers are actually asking for passwords for social media networks? I totally
 agree with Doyle in that these employers should not request this kind of personal information.  Employers, if this is a problem, should seek help from their IT dept. in order to block such occurrences.  It is all about integrity.  If employers would not ask for such information and employees would do their job and not get on social networks, then all would be well.  There is a time and place for everything and employers and employees know this!



 
 http://www.google.com/search?q=facebook+at+work+images&nord

Sunday, June 22, 2014

Picture and Comments on PowerPoint Presentations June 23-June 29

PowerPoint presentations are great to use for school and business presentations.  Because of design themes and images that can be inserted, they can make content be more energetic.



http://www.google.com/search?q=images+of+people+doing+powerpoint+presentations&nord=1&rlz=1W1LENN_enUS496&tbm=isch&tbo=u&source=univ&sa=X&ei=ETOnU6iCOYKOyATjhoCoAw&ved=0CDMQ7Ak&biw=1366&bih=617










Sunday, June 15, 2014

Picture of the Week June 15-June 22

 

http://www.google.com/search?q=images+of+funny+computers+and+people&nord=1&rlz=1W1LENN_enUS496&tbm=isch&imgil=wUhuXmzNUeSTPM%253A%253Bhttp%253A%252F%252Ft2.gstatic.com%252Fimages%253Fq%253Dtbn%253AANd9GcTqz_e5SsMd8QimIk_WqO1r7CY5bYPP91PTuWlOcanVLXhyWMxu%253B400%253B351%253BpgHrliBoqBvE5M%253Bhttp%25253A%25252F%25252Fwww.cartoonstock.com%25252Fdirectory%25252Fo%25252Fold_people.asp&source=iu&usg=__rLBq9B2LxW7_FoFhDzl3WiWv6Qc%3D&sa=X&ei=T_mdU-vLJZKeyATcu4K4Dg&ved=0CDMQ9QEwCg&biw=1366&bih=617#facrc=_&imgdii=_&imgrc=tXXDkQCk2Kev5M%253A%3B9rYcPTYaiaBUMM%3Bhttp%253A%252F%252Fwww.cartoonstock.com%252Fnewscartoons%252Fcartoonists%252Ftmc%252Flowres%252Fcomputers-computer_file-data_storage-hard_drives-data_sticks-heavenly-tmcn3114l.jpg%3Bhttp%253A%252F%252Fwww.cartoonstock.com%252Fdirectory%252Fc%252Fcomputer_data.asp%3B400%3B444

Concepts Learned

Technology has so many kinds of users. While I knew about a home user, business user, and mobile user, I learned a new type of user called a power user. This type of user is in the business world completing such tasks as engineering projects, architectural design projects, and graphic projects. I also learned that an enterprise user is basically an employee or customer that uses computers or mobile devices. 

Wikis are something that I also learned about in the assigned readings this week. This is a collaborative website in which a group can create, add, delete or modify content.

Netiquette is a term that I focused on as well.  This is an established code of acceptable behaviors that users should follow.  Using abbreviations and acronyms, long with emoticons can be tricky. Although I knew some, like :) and BTY, I did not know others listed in the text, like FWIW and IMHO.  It is important that your audience understands all terms; otherwise, people will become confused and this can lead to miscommunication.

The tutorials on how to set up a blog and insert a picture has been informative as my blog continues to grow.  I have also learned in other tutorials how to work with folders which is a good organizational tool to have.

Tuesday, June 10, 2014

Picture of the Week Jun 9-15

Google image from Google search engine

http://www.google.com/search?q=smartphone+images+with+apps&nord

Friday, June 6, 2014

Should Apps Be Allowed to Track Your Location?

Apps should be used if, for example, an emergency takes place.  A teenager who runs away can be tracked and brought home to safety.  If a small child gets kidnapped, then an app could be used to track the abductor.  Apps can transmit locations very easily and sometimes this can lead to the disadvantage of tracking. For example, if a person is being stalked or a robbery is in the plans, then obviously the app usage can be dangerous.  It would be nice if everyone could expect the privacy when downloading an app, but there is always a risk.  For official matters, then yes apps should be used, but socially then no.  No way to separate the two.