Sunday, July 25, 2010

ethics

-- Ethics as a concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study. --

An example:

If you're in an internet cafe and the last person who used the computer that you are now using didn't logged out his/her facebook. If you will read his/her private messages, chats, profile and personal projects, that is already unethical. But if you controlled your temptation of reading those stuffs and you will log his facebook out carefully, then its already an ethical decision.

Even if you are already free to surf, read and make fun of it, you are still respecting the privacy of the person and you're controlling your temptation. And that is an ethical action..

Sunday, July 4, 2010

foundation day!

the 12th foundation day was held in PSHS-CMC campus. It was a 2-day activity. There was no motorcade at all. But, it's still okay because the SCS prepared some activities to be replaced. Nung sa first part ng program, the teachers were being introduced by kuya val bonite.. the teachers were dancing in front and we had fun.. all batch gave their presentations.. mao jd ni aqng maingon.. THE JUNIORS PRESENTATION WAS FREAKIN' AWESOME! bitin lng ky isa ra ang song.. after lunch came the sorting! all of us were excited.. wondering knsa ang mbutang sa each league.. after, games followed and it was played by league.. luckily, our league - yellow league won! we can all see the cooperation and sacrifice of each other for us to win..

2nd day came.. selected scholars joined the outreach program.. while many of us just styaed in the venue and waited for the activities.. we had our tree planting.. 1 tree per pair.. 3tree for us with 5 members.. after tree planting, games games games! after that was lunch.. wow free lunch! nice! after sa lunch,, the winners were already announced then the end! tapos na ang foundation day!


happy birthday pisay!

Saturday, June 26, 2010

10 commandments of computer ethics

1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

internet hoax

A hoax is a deliberate attempt to deceive or trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.

It is possible to perpetrate a hoax by making only true statements using unfamiliar wording or context, such as in the Dihydrogen monoxide hoax. Many hoaxes are motivated by a desire to satirize or educate by exposing the credulity of the public and the media or the absurdity of the target. The word hoax is said to have come from the common magic incantation hocus pocus. "Hocus pocus", in turn, is believed to be a distortion of "Hoc est corpus meum" ("This is my body") from the Latin mass.

assignment in CS3

SPAM

Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Spam costs the sender very little to send -- most of the costs are paid for by the recipient or the carriers rather than by the sender.

There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups. (Through long experience, Usenet users have found that any message posted to so many newsgroups is often not relevant to most or all of them.) Usenet spam is aimed at "lurkers", people who read newsgroups but rarely or never post and give their address away. Usenet spam robs users of the utility of the newsgroups by overwhelming them with a barrage of advertising or other irrelevant posts. Furthermore, Usenet spam subverts the ability of system administrators and owners to manage the topics they accept on their systems.

VIRUS

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disks, CD,DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

TROJAN

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

In computers, a Trojan horse is a program in which malicious or harmful code is contained inside apparently harmless programming or data in such a way that it can get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk.

SPYWARE

Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

While the term spyware suggests that software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of internet or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

ADDWARE

functions:

Adware delivers ads to an infected computer in a variety of manners depending on the type of adware it is. Most adware functions only to create revenue and serve ads to unsuspecting computer users.

types:

Adware delivered ads can be delivered as pop-up windows, forced links within browser windows, browser redirects or toolbars that take up space in a browser.

effects:

Adware can slow a computer and affect the way certain programs work. The most likely to be affected are Internet browsers. Some adware may collect browsing information to deliver more effective ads to the infected computer.

significance:

Adware increases with increased Internet use and can often damage a computer user's experience with his machine. The ads delivered could be adult in nature, which could offend some or shock children.

prevention:

Adware usually installs onto a computer through the use of another program or through the click of a link. Carefully inspect options on downloaded software and be sure to run scans with programs such as Lavasoft Ad-Aware.









foundation day

haLa! i didn't notice na july is already approaching. what's in july that makes us excited? it's all about FOUNDATION DAY! not just about foundation day... honestly, wla mn gud class ana! haha.. the sorting of newbies is one of the events.. i wonder knsa ang mbutang sa amung beloved YELLOW LEAGUE! hmmmm.. what would be the thing na mreceive sa freshmen for them to identify their league?

foundation day is now nearer and nearer! pisay cmc was getting old yet getting stronger.. pisay rocks! :D