The site i used in finding my government job was www.usajobs.opm.gov
Administravive Patent Judge: The person will serve as a member of the USPTO's Board of Patent Appeals and Interferences. The salary ranges between 148,990 - 154,600 a year. To apply for this job you need to send your resume to the address given at the website. The qualifications for this job are you must be a graduate from law school and passed the American Bar Association and be a member in good standing of the state, and a high degree of demostrated competence and knowledge of interference practice and litigation- related proceedings.
Monday, October 29, 2007
Searching News
Google News and WN networks are very similar. they both offer news from around the world and gives all the current events. they both have images to go with the stories they wrote about. Some differences are the layouts between the two. google is plain and white and WN networks is colorful and more interesting to look at. google allows the site to be translated into any language. Both sites have different categories on the left side to use to search the sites and they both have search boxes to search the sites also. Google gives more links to go to and collect more information so i feel that google would be most useful but they both are great sites and give good information.
Searching for People
1. A) yes, i looked up my great grandma Irene Thies
B) switchboard.com
C) switchboard.com is the one i found to be the most current and the some of the other ones would list her previous addresses.
2. I think it is fine having her information on the internet i think i is a great way for people that she has lost contact with to have a way to reconnect with her if they choose. i dont think its harmful.
3.A)The list of resources offered at the SuperPage site are Restaurants, Hotels, Florists, Physicians, Surgeons, Car Dealers, information on other cities and for searching people or businesses.
B) I think SuperPages is easier to get around and the information pops right up and they dont give you extra information just the basics.
C) When I typed in the number in the reverse look up finder i was able to find my boyfriends mother Connie Hofer.
4. This site provides people tons of information: phone number, e-mail, address, and maps for directions.
B) switchboard.com
C) switchboard.com is the one i found to be the most current and the some of the other ones would list her previous addresses.
2. I think it is fine having her information on the internet i think i is a great way for people that she has lost contact with to have a way to reconnect with her if they choose. i dont think its harmful.
3.A)The list of resources offered at the SuperPage site are Restaurants, Hotels, Florists, Physicians, Surgeons, Car Dealers, information on other cities and for searching people or businesses.
B) I think SuperPages is easier to get around and the information pops right up and they dont give you extra information just the basics.
C) When I typed in the number in the reverse look up finder i was able to find my boyfriends mother Connie Hofer.
4. This site provides people tons of information: phone number, e-mail, address, and maps for directions.
Tuesday, October 16, 2007
Narrative Evaluation
www.martinlutherking.org
The website is a good source of information. I couldnt find the author because the information is collected from numerous sources. The information is current and correct. The website gives other websites to collect more information on the topic. The sources are reliable. There are a variety of other viewpoints shared throuhgout the website. I dont feel the information and the website is biased.
The information is clearly written and audience-level appropriate. There are videos, music, books and many more avaliable on the site.
The design of the website is interesting. There are quotes, many related links and live videos. The page doesnt change frequently and the text is legible. The visual of the site enhances it.
The server is avaliable and the images, backgrounds, textures, and length doesnt impact the amount of time it takes to display the site.
Overall, the website seems credible and has plenty of valid information. The site has various links with similar information so if you cant find what your looking for on this website than it will lead you to one that will.
The website is a good source of information. I couldnt find the author because the information is collected from numerous sources. The information is current and correct. The website gives other websites to collect more information on the topic. The sources are reliable. There are a variety of other viewpoints shared throuhgout the website. I dont feel the information and the website is biased.
The information is clearly written and audience-level appropriate. There are videos, music, books and many more avaliable on the site.
The design of the website is interesting. There are quotes, many related links and live videos. The page doesnt change frequently and the text is legible. The visual of the site enhances it.
The server is avaliable and the images, backgrounds, textures, and length doesnt impact the amount of time it takes to display the site.
Overall, the website seems credible and has plenty of valid information. The site has various links with similar information so if you cant find what your looking for on this website than it will lead you to one that will.
Thursday, September 27, 2007
Privacy Policies
1. Barnes & Noble
a. You can create a password-protected Barnes & Noble.com account to complete an order or to save items in your Wish List. To create an account, we require that you provide us with the following Personal Customer Information: your email address (which may not be associated with another active Barnes & Noble.com account), and your first and last names. You will also have to create a password, select a security question and input a security answer.
b. They collect this information because it helps them set up your account so you can buy things online.
c. Yes, they send it to their subcontractors, service providers, membership programs, credit card companies, law enforcement agencies and other trustworthy third parties.
d. It will always be in their system
e. no
f. no
g. yes, to enhance the browsing and shopping experience.
2. Wal-Mart
a. You have to set up an account and they need your first and last name, e-mail address, and password.
b. To buy items online
c. No
d. until you cancel your membership
e. no
f.no
g. yes, used to identify you when you visit the site and to enhance and customize your online shopping experience.
3. Dell, Inc.
a&b. They collect the information you give us in order to provide you products and services, inform you about our products and fulfill your orders and service requests.
c. yes, with other corporate affiliates.
d. it will always be in the system
e. no
f. yes, Global Privacy Policy
g. yes, to let the company know when you visit their site.
a. You can create a password-protected Barnes & Noble.com account to complete an order or to save items in your Wish List. To create an account, we require that you provide us with the following Personal Customer Information: your email address (which may not be associated with another active Barnes & Noble.com account), and your first and last names. You will also have to create a password, select a security question and input a security answer.
b. They collect this information because it helps them set up your account so you can buy things online.
c. Yes, they send it to their subcontractors, service providers, membership programs, credit card companies, law enforcement agencies and other trustworthy third parties.
d. It will always be in their system
e. no
f. no
g. yes, to enhance the browsing and shopping experience.
2. Wal-Mart
a. You have to set up an account and they need your first and last name, e-mail address, and password.
b. To buy items online
c. No
d. until you cancel your membership
e. no
f.no
g. yes, used to identify you when you visit the site and to enhance and customize your online shopping experience.
3. Dell, Inc.
a&b. They collect the information you give us in order to provide you products and services, inform you about our products and fulfill your orders and service requests.
c. yes, with other corporate affiliates.
d. it will always be in the system
e. no
f. yes, Global Privacy Policy
g. yes, to let the company know when you visit their site.
Ebay and Paypal
Ebay
1. Highest priced car: $119,000, 5,517 miles, BMW:Z8 2003
2. Lowest priced car: $5,500, 134,000 miles, BMW: 3-series 1987
3. How can I register to buy items on eBay?
You find an item, learn about the item, review the sellers feedback, bid or buy the item now, and then pay for it,
4. How can I register to sell items on eBay?
You must be a registered member and then you add your item through the selling link.
5. How can I trade safely at the eBay site?
Sign a contract with the seller or buyer and pay with a credit card not with a money order.
Paypal
There are 3 types of Paypal accounts: personal, premier, and business. Each account contains a unique e-mail address and financial information. Personal is the below average account,premier is the most common offering the basics, and business is the delux package.
1. Highest priced car: $119,000, 5,517 miles, BMW:Z8 2003
2. Lowest priced car: $5,500, 134,000 miles, BMW: 3-series 1987
3. How can I register to buy items on eBay?
You find an item, learn about the item, review the sellers feedback, bid or buy the item now, and then pay for it,
4. How can I register to sell items on eBay?
You must be a registered member and then you add your item through the selling link.
5. How can I trade safely at the eBay site?
Sign a contract with the seller or buyer and pay with a credit card not with a money order.
Paypal
There are 3 types of Paypal accounts: personal, premier, and business. Each account contains a unique e-mail address and financial information. Personal is the below average account,premier is the most common offering the basics, and business is the delux package.
Better Business Bureau and Amazon
1. How can I tell if a transaction is secure?
Your browser displays the icon of a locked padlocked on the bottom of the screen and if you have Secure Sockets Layer it protects your credit card information that you send over the internet.
2. What is the safest way to pay for an online purchase?
Using a credit card because if you have an unauthorized charge, your only reliable paying up to $50.
3.To whom can I complain if I am not satisfied with an online purchase?
Either Better Business Bureau, The Federal Trade Commissions Consumer Complaint Form, or the National Association of Attorneys General
4. What is the BBBOnline Privacy Seal Program?
It incorporates privacy notice requirements with other general good business practices to show site visitors that you have met BBB standards for the web.
5. What requirements must companies meet to earn the BBBOnline privacy seal?
6. What is the BBBOnline Reliability Seal Program?
It gives confidence in the Better Business Bureau name, inclusion in the BBBOnline safe shopping site, and it gives protection to your company and customers.
7. What requirements must companies meet to earn the BBBOnline reliability seal?
Become a member of the Better Business Bureau where company is headquartered;
Provide the BBB with information regarding company ownership and management and the street address and telephone number at which they do business, which may be verified by the BBB in a visit to the company's physical premises; Be in business a minimum of one year (an exception can be made if a new business is a spinoff or a division of an existing business, which is known to and has a positive track record with the BBB); Have a satisfactory complaint handling record with the BBB; and Respond promptly to all consumer complaints.
8. How soon should you return an item for the price to be fully refundable?
Within 30 days
9. Who pays the shipping costs if an item was shipped in error?
The company that sent the item.
10. Can you return a CD, DVD, or VHS tape that has been open?
Yes, but you only get a partial refund (if returned within 30 days)
Your browser displays the icon of a locked padlocked on the bottom of the screen and if you have Secure Sockets Layer it protects your credit card information that you send over the internet.
2. What is the safest way to pay for an online purchase?
Using a credit card because if you have an unauthorized charge, your only reliable paying up to $50.
3.To whom can I complain if I am not satisfied with an online purchase?
Either Better Business Bureau, The Federal Trade Commissions Consumer Complaint Form, or the National Association of Attorneys General
4. What is the BBBOnline Privacy Seal Program?
It incorporates privacy notice requirements with other general good business practices to show site visitors that you have met BBB standards for the web.
5. What requirements must companies meet to earn the BBBOnline privacy seal?
6. What is the BBBOnline Reliability Seal Program?
It gives confidence in the Better Business Bureau name, inclusion in the BBBOnline safe shopping site, and it gives protection to your company and customers.
7. What requirements must companies meet to earn the BBBOnline reliability seal?
Become a member of the Better Business Bureau where company is headquartered;
Provide the BBB with information regarding company ownership and management and the street address and telephone number at which they do business, which may be verified by the BBB in a visit to the company's physical premises; Be in business a minimum of one year (an exception can be made if a new business is a spinoff or a division of an existing business, which is known to and has a positive track record with the BBB); Have a satisfactory complaint handling record with the BBB; and Respond promptly to all consumer complaints.
8. How soon should you return an item for the price to be fully refundable?
Within 30 days
9. Who pays the shipping costs if an item was shipped in error?
The company that sent the item.
10. Can you return a CD, DVD, or VHS tape that has been open?
Yes, but you only get a partial refund (if returned within 30 days)
10 Tips to Protect Personal Information
1. Use anti-virus, anti-spyware and firewall software—and make sure it’s up-to-date.
2. Read privacy policies.
3. Configure your browser or operating system to manage pop-ups, cookies or block specific Web sites
4. Use more than one email address so that one is reserved solely for your personal communication.
5. Look for third-party seals or certification—and make sure the seals are valid.
6. Back up important files
7. Provide email addresses and information that do not identify you personally.
8. Change passwords on a regular basis
9. Use email encryption
10. Log-in anonymously or use anonymizing or free ID Web sites to generate your ID.
1. Basically everytime your computer tells you that you need updates dont postpone them and do them. It will keep your computer updated and help protect it against hackers. If your computer is not up to date then it will be easier for hackers to get your information.
2. ALWAYS read the privacy policy to see how your personal information will be protected and if others will be able to access it. If the site doesn't protect your information well then you should think twice about putting your information on that site.
3. To protect yourself from pop-ups you can use anti-spyware software. To protect you from cookies you need to check the private policies and download advance cookie management tools. To block specific websites you can add the anti-phishing tool.
4. Keep the inbox you use to talk to your friends and family make sure it is free of spam by using seperate e-mails.
5. Investigate 3rd parties and make sure the seal is valid. Don't just give information to any site.
6. Copy important files to a floppy disk or something you can remove from the computer.
7. If you are asked personal information make sure you know why you are giving that information and where it will go.
8. Change your passwords at least every 90 days
9. This will prevent your information that you send across the internet from being intercepted or tampered with.
10. This allows you to reduce the amount of personal information accessible to others online.
2. Read privacy policies.
3. Configure your browser or operating system to manage pop-ups, cookies or block specific Web sites
4. Use more than one email address so that one is reserved solely for your personal communication.
5. Look for third-party seals or certification—and make sure the seals are valid.
6. Back up important files
7. Provide email addresses and information that do not identify you personally.
8. Change passwords on a regular basis
9. Use email encryption
10. Log-in anonymously or use anonymizing or free ID Web sites to generate your ID.
1. Basically everytime your computer tells you that you need updates dont postpone them and do them. It will keep your computer updated and help protect it against hackers. If your computer is not up to date then it will be easier for hackers to get your information.
2. ALWAYS read the privacy policy to see how your personal information will be protected and if others will be able to access it. If the site doesn't protect your information well then you should think twice about putting your information on that site.
3. To protect yourself from pop-ups you can use anti-spyware software. To protect you from cookies you need to check the private policies and download advance cookie management tools. To block specific websites you can add the anti-phishing tool.
4. Keep the inbox you use to talk to your friends and family make sure it is free of spam by using seperate e-mails.
5. Investigate 3rd parties and make sure the seal is valid. Don't just give information to any site.
6. Copy important files to a floppy disk or something you can remove from the computer.
7. If you are asked personal information make sure you know why you are giving that information and where it will go.
8. Change your passwords at least every 90 days
9. This will prevent your information that you send across the internet from being intercepted or tampered with.
10. This allows you to reduce the amount of personal information accessible to others online.
Monday, September 24, 2007
HACKERS- Who and Why?
Hackers are people who can get into anyones computer and look at anything they want to. They invade peoples privacy and can steal anything they feel like from your computer.
The hackers from the video said they hacked because they could. They would do it when they were bored. Also, because they feel like they're helping peope realize that people are able to hack and to keep updating their computer with the best security devices.
I feel that hackers in a way are helping and hurting the community depending on who and why they hack. If they hack into the government to steal information or to steal an identity then they are hurting the community but if they are just warning people to download more security and not stealing any information and looking at their private files than in a way they are helping.
If you have been hacked then you would report the crime to either: FBI Local Office, U.S. Secret Service, or Internet Crime Complaint Center. The FBI Local Office number is (217) 522-9675.
The Internet Crime Complaint Center is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center.
Hacked by a Corporation?
A "cookie" allows websites and ad agencies to be able see your online activity. Your profile information can be sold or bought by corporations to get details about your personal life.
A web bug is invisible and its a hidden tracking device. Web bugs are not only used in web pages, but in email and other documents. Trackers embed web bugs in email in order to know exactly when you have read your mail.
A script such as JavaScript and Microsoft's JScript and VBScript make it very easy to steal even more information about you.These simple scripts can steal your address book, your business and financial documents and other sensitive and private information--virtually any file on your system. Further, the scripts can write files to your hard drive including viruses.
To help protect you from these devices can be difficult. For "cookies" you can set to your computer "Ask for each cookie" and you can be aware of them. Web bugs are nearly impossible to manage. But you can add image filtering tools to help keep your browser from receiving them. To protect from scripts turn OFF your scripting in your web and e-mail browsers.
The hackers from the video said they hacked because they could. They would do it when they were bored. Also, because they feel like they're helping peope realize that people are able to hack and to keep updating their computer with the best security devices.
I feel that hackers in a way are helping and hurting the community depending on who and why they hack. If they hack into the government to steal information or to steal an identity then they are hurting the community but if they are just warning people to download more security and not stealing any information and looking at their private files than in a way they are helping.
If you have been hacked then you would report the crime to either: FBI Local Office, U.S. Secret Service, or Internet Crime Complaint Center. The FBI Local Office number is (217) 522-9675.
The Internet Crime Complaint Center is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center.
Hacked by a Corporation?
A "cookie" allows websites and ad agencies to be able see your online activity. Your profile information can be sold or bought by corporations to get details about your personal life.
A web bug is invisible and its a hidden tracking device. Web bugs are not only used in web pages, but in email and other documents. Trackers embed web bugs in email in order to know exactly when you have read your mail.
A script such as JavaScript and Microsoft's JScript and VBScript make it very easy to steal even more information about you.These simple scripts can steal your address book, your business and financial documents and other sensitive and private information--virtually any file on your system. Further, the scripts can write files to your hard drive including viruses.
To help protect you from these devices can be difficult. For "cookies" you can set to your computer "Ask for each cookie" and you can be aware of them. Web bugs are nearly impossible to manage. But you can add image filtering tools to help keep your browser from receiving them. To protect from scripts turn OFF your scripting in your web and e-mail browsers.
Wednesday, September 19, 2007
ICANN
What is ICANN?
The Internet Corporation for Assigned Names and Numbers (ICANN) is an internationally organized, non-profit corporation that has responsibility for Internet Protocol (IP) address space allocation, protocol identifier assignment, generic (gTLD) and country code (ccTLD) Top-Level Domain name system management, and root server system management functions. They are a public partnership that is helping stabilize the internet.
What is the Domain Name System?
The Domain Name System (DNS) helps users find their way around the Internet. Every computer on the internet has their own IP address.
What is ICANN's Role?
ICANN is responsible for coordinating the management of the technical elements of the DNS to ensure resolvability so that all users of the Internet can find all valid addresses.It does this by overseeing the distribution of unique technology throughout the internet.
IP Addresses
IP Addresses for my Favorite Domain Names:
Domain Name IP
1. myspace.com 216.178.38.219
2. Facebook.com 69.63.176.10
3. Yahoo.com 66.94.234.13
4. Hotmail.com 72.51.27.57
5. Macys.com 63.73.131.68
Domain Name IP
1. myspace.com 216.178.38.219
2. Facebook.com 69.63.176.10
3. Yahoo.com 66.94.234.13
4. Hotmail.com 72.51.27.57
5. Macys.com 63.73.131.68
Tuesday, September 11, 2007
Exam Questions
- Dial-Up: When using this method of internet you will need a modem, telephone line and a computer. This method is the cheapest form of internet but it's also the slowest. Another disadvantage is you can't use the telephone while you are on the internet. Dial-up is probably best for older people who don't download and are on it mainly for leisure.
- Cable: When using this method of internet you will need a cable modem, a line splitter, computer and cable. This method is a dedicated connection (which means it's always connected to the internet) and it's high-speed. Some disadvantages are it will slow down if too many neighbors are on the internet and it's only offered where cable is offered. Cable is best for teeneagers or early 20's because this form of internet would be good for downloading music, movies, and etc.
Wednesday, September 5, 2007
"Free" Internet Service Offers- are they really free?
The Federal Trade Commission (TFC) wants everyone to know that some "free" offers for the internet may really costs you a lot of money in the long run because of the restrictions and conditions on those offers may not be written clearly. Also, most of the "free" offers only last a month then after that you automatically get signed up and charged for the months after the "free" one.
The FTC wants the people to know what questions to ask before you sign up for these "free" offers that way you don't lose money in the long run.
1. How do you cancel the service? Can you cancel online or by calling the service provider's phone number?
2. If you sign up for service, when are you billed each month?
3. If you sign up for service, are you committing to paying for the service for a year?
If you want to know more information on this topic go to: http://www.ftc.gov/bcp/conline/pubs/alerts/freeispalrt.shtm
The FTC wants the people to know what questions to ask before you sign up for these "free" offers that way you don't lose money in the long run.
1. How do you cancel the service? Can you cancel online or by calling the service provider's phone number?
2. If you sign up for service, when are you billed each month?
3. If you sign up for service, are you committing to paying for the service for a year?
If you want to know more information on this topic go to: http://www.ftc.gov/bcp/conline/pubs/alerts/freeispalrt.shtm
Tuesday, August 28, 2007
Favorite Blogs
1.www.behindthescenestv.net - This blog gives interviews with actors and gets the behind the scenes interviews with the directors of new movies. Also, can search to find information about movies and actors.
2. www.popcrunch.com- This blogs talks about celebrities. It's a gossip blog some information is true and some is false.
3. www.nflguru.com- This blog is about NFL football. You can look up information about your favorite teams or players.
4. www.gilletts.com.au/blog- This blog is on jewelry. It gives information about all types of style of jewelry, where to buy it, and about how much it costs.
5. www.blogs.smarter.com/fashion- This blog is about fashion. It tells you what is in style for this season and the latest fashion designs that are about to come out.
2. www.popcrunch.com- This blogs talks about celebrities. It's a gossip blog some information is true and some is false.
3. www.nflguru.com- This blog is about NFL football. You can look up information about your favorite teams or players.
4. www.gilletts.com.au/blog- This blog is on jewelry. It gives information about all types of style of jewelry, where to buy it, and about how much it costs.
5. www.blogs.smarter.com/fashion- This blog is about fashion. It tells you what is in style for this season and the latest fashion designs that are about to come out.
Thursday, August 23, 2007
Internet Use Survey
For this assignment I had to interview five people and figure out how much they used the internet. Whether its for work, school, leisure, entertainment, and so on.
I interviewed 3 females, ages 41, 62, and 19. I also interviewed 2 males, ages 40 and 57. The 41 year old woman basically just used to internet for work, rarely for leisure. Her internet browser was MSN. The internet does not conlfict with her other activities. The 62 year old woman rarely ever got on the internet except for leisure sometimes. Her internet browser was internet explorer. The internet does not conflict with her other activites either. The 19 year old female used the internet quite often mainly for leisure and communication. Her internet browser was MSN. The internet does conflict with her other activities because she is on facebook or myspace constently. The 40 year old male used the internet often for work and school. His interent browser was firefox. The internet does conflict with his other activities because there is not enough time in a day for everything. The 57 year old male used the internet in his free time for leisure. His internet browser was internet explorer. The internet does not conflict with his other actvities.
After my survey I came to the conclusion that younger people used the internet more often than older people and mainly for leisure and communication. Middle-aged people used it mostly for work and some leisure. The older people rarely used it and when they did it was for work.
I interviewed 3 females, ages 41, 62, and 19. I also interviewed 2 males, ages 40 and 57. The 41 year old woman basically just used to internet for work, rarely for leisure. Her internet browser was MSN. The internet does not conlfict with her other activities. The 62 year old woman rarely ever got on the internet except for leisure sometimes. Her internet browser was internet explorer. The internet does not conflict with her other activites either. The 19 year old female used the internet quite often mainly for leisure and communication. Her internet browser was MSN. The internet does conflict with her other activities because she is on facebook or myspace constently. The 40 year old male used the internet often for work and school. His interent browser was firefox. The internet does conflict with his other activities because there is not enough time in a day for everything. The 57 year old male used the internet in his free time for leisure. His internet browser was internet explorer. The internet does not conflict with his other actvities.
After my survey I came to the conclusion that younger people used the internet more often than older people and mainly for leisure and communication. Middle-aged people used it mostly for work and some leisure. The older people rarely used it and when they did it was for work.
Subscribe to:
Posts (Atom)