itglenvar.blogspot.com
Information Technology Fundamentals: Alice
http://itglenvar.blogspot.com/2009/12/alice.html
Monday, December 14, 2009. INSERT IMAGE OF ALICE! DO NOT KEEP MY QUESTIONS IN YOUR POST. YOUR POST SHOULD BE COMPLETE SENTENCES! If someone wanted to download Alice, where would they go? You will have to do some reasearch of your own here). What objects doe Alice have to offer? This should be a long list of various objects or themes Alice offers). What could Alice be used for? What are the pros of Alice? What are the cons of Alice? What world did you make with Alice? Did you enjoy Alice? If yes, for what?
itglenvar.blogspot.com
Information Technology Fundamentals: May 2009
http://itglenvar.blogspot.com/2009_05_01_archive.html
Sunday, May 24, 2009. Http:/ www.columbia.k12.mo.us/depts/images/kids.jpg. Part II of our selected readings was to choose a chapter from the book and complete reflection questions. The sections included in the music, math, science, foreign language, english, health, physical education classrooms. I guess since I teach Business and Marketing and those are Technology based courses there wasn't a chapter for me! Early Production= Addt'l 6 months to get 1,000 receptive and active words. That is a lot of time!
itglenvar.blogspot.com
Information Technology Fundamentals: December 2009
http://itglenvar.blogspot.com/2009_12_01_archive.html
Monday, December 14, 2009. INSERT IMAGE OF ALICE! DO NOT KEEP MY QUESTIONS IN YOUR POST. YOUR POST SHOULD BE COMPLETE SENTENCES! If someone wanted to download Alice, where would they go? You will have to do some reasearch of your own here). What objects doe Alice have to offer? This should be a long list of various objects or themes Alice offers). What could Alice be used for? What are the pros of Alice? What are the cons of Alice? What world did you make with Alice? Did you enjoy Alice? If yes, for what?
itglenvar.blogspot.com
Information Technology Fundamentals: Google Images
http://itglenvar.blogspot.com/2010/02/google-images.html
Friday, February 19, 2010. Find an image of a LEGO Robot. What can it do? What can you make it do? Find an image of a cool Logo that you really like. What is it for? Do the colors mean anything specifically? Why do you like it so much? If you created a logo for yourself, describe it here. Why would you choose the things that you choose? Do a very rough sketch in paint and paste your picture here. If you could create any static cling for your car window or bedroom window, what would it look like and why?
gipbip.blogspot.com
andrew fridley: October 2009
http://gipbip.blogspot.com/2009_10_01_archive.html
Wednesday, October 21, 2009. Pull cable out of box and cut to desired length. Strip cable about 3/4 inch, make sure blue cable is in the jack. Spread out all wires. Place wires in this order from left to right- light orange. Clip part facing down stick in wires, each wire in its own slot. Wires have to meet the metal on the rj45 jack. Use pliers to clap rj45 onto the wire (HARD). One purpose of an ethernet cable is. when connection two ethernet computers without a hub. Monday, October 19, 2009. According...
gipbip.blogspot.com
andrew fridley: February 2010
http://gipbip.blogspot.com/2010_02_01_archive.html
Friday, February 26, 2010. DOS is microsoft disc operating system. Booting is starting up your computer. DOS is text based.To communicate with DOS, the screen has a prompt where you enter a command.Case insensitive means that capital letters doesnt matter. An example would be Ms-DoS. 4 useful things to learn about DOS. SET PATH=searches in one direct path. In a file name means unknown letter. In a file name means wild card. In a directory path stands for current directory. 7 very useful DOS commands.
whatkindsidesyouwant.blogspot.com
Ya Boy Yung Gibby: Cyber Bullying
http://whatkindsidesyouwant.blogspot.com/2009/11/cyber-bullying.html
Friday, November 20, 2009. Http:/ www.isafe.org/imgs/pdf/education/CyberBullying.pdf. The Effects of Cyber Bullying: Teen Takes His Own Life. Awhile ago 13 year old son Ryan took his own life. Ryan was an outwardly happy -go-lucky kid with two loving and supportive parents. Ryan did not leave a note and his peers at school did not give the counselors and police any logical reason for his actions. Ryan had been Imed by another boy who had been sexual harassing him in harsh ways. November 23, 2009 at 6:03 ...
tylercadd.blogspot.com
Tyler Cadd: Post #2
http://tylercadd.blogspot.com/2009/10/post-2.html
Tuesday, October 13, 2009. INTERNATIONAL HACKER PLEADS GUILTY FOR MASSIVE HACKS. OF US RETAIL NETWORKS. In this article a man named Albert Gonzalez pleaded guilty to hacking into some major. Credit and debit card numbers used at retail stores. Albert hacked into many credit and debit card numbers 40 million credit and debit credit numbers were stolen by Albert. Albert. Also pleaded guilty to one count of conspiracy to commit wire fraud relating to. Watches, and his 2006 BMW. All of Albert's.
tylercadd.blogspot.com
Tyler Cadd
http://tylercadd.blogspot.com/2009/10/ethernet-cable-is-used-to-connect.html
Wednesday, October 21, 2009. An ethernet cable is used to connect a computer to a network. Materials needed 1 networking cable with your desired lenght, 2 RJ-45 jacks, cable cutting pliers. Step 1: Pull the cable out of the box to the desired lenght. Step2: Strip the cable at both ends no longer than 3/4 on an inch. Step 3: spread each seperate wire out. Step 4: Place the wires in order from left to right light orange, dark orange, light green, dark blue, light blue, dark green, light brown, dark brown.