Friday, December 12, 2014

How teens can use spreadsheet in thier lives

Teenagers can use spreadsheet in their lives for many things. Keeping track of things is a good example. They can keep track of things like the cards they're collecting for example. They can also use spreadsheet to keep track of other things like schoolwork or their BSA troop. An example of this is keeping track of the popcorn you sold/delivered for a fundraiser.

Monday, November 17, 2014

Tips for Cyberbullying

1. Do not reply to the cyberbully, you might make things worse than they are.


2. Have proof that you are being cyberbullied (e.g., screenshots),  and don't delete any messages sent by the bully.


3. Tell an adult, like one of you parents/guardians, teachers, or any adult that can help.


4. Don't panic, just breathe in and out several time to calm down.


5. Block the bully.

Thursday, November 6, 2014

Season 2 Review






seriously, why am I his only subscriber?!?

Computer time

I disagree that we are relying to much on technology. We still do the same things we always did, and in my opinion, technology is helping us. nowadays, instead of sending letters, and can just give a quick phone call to anyone. Instead of looking through a dictionary, we can look up the definition on Google. It's useful to use technology, but with a balance between doing that and spending time away from it can make our lives much better.

Wednesday, November 5, 2014

Sunday, October 19, 2014

Password Hacking

   In 2013, a Russian crime has the largest known collection of stolen Internet credentials.  The records, discovered by Hold Security, include confidential material gathered from 420,000 websites, including household names, and small Internet sites. Another computer crime expert who had reviewed the data said some big companies were aware that their records were among the stolen information. In October, federal prosecutors said an identity theft service in Vietnam managed to obtain as many as 200 million personal records, including Social Security numbers, credit card data and bank account information from Court Ventures, a company now owned by the data brokerage firm Experian.Like other computer security consulting firms, Hold Security has contacts in the criminal hacking community and has been monitoring and even communicating with this particular group for some time.


Link:
http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html?_r=0

Friday, September 19, 2014

Rules for the web

 In my opinion, I had no idea that there are currently no real laws or rules that govern the Internet, until my Teacher Told Me. To Be Honest, I think that needs to change. I think so because There are a lot of Cyber bullies out their that need rules to follow. Copyright related rules are also needed so that people can use recourses, with the Authors Permission without having to pay fines or go to jail. Another Reason for copyright rules is so that when People do online reviews, so the original owners understand the people reviewing the content while using their content are not doing anything Illegal.

Tuesday, September 2, 2014

Introdution

Hi! I now have a blogger and I thought I'd introduce myself. My Name is Andrew, and I'm posting this blog for a school project :^) I don't know a lot about computers, but I do use them quit often, and I want to learn how they actually function.

Introdution

Hi! I now have a blogger and I thought I'd introduce myself. My Name is Andrew, and I'm posting this blog for a school project :^)