Skip to main content

Home/ IB ITGS/ Group items tagged Portfolio 1

Rss Feed Group items tagged

anonymous

HowStuffWorks "How Credit Cards Work" - 1 views

  •  
    Credit card history, how it has come along since 1999. This is from How Stuff Works, and talks about the size of the credit card: "A credit card is a thin plastic card, usually 3-1/8 inches by 2-1/8 inches in size, that contains identification information such as a signature or picture, and authorizes the person named on it to charge purchases or services to his account -- charges for which he will be billed periodically." he first universal credit card -- one that could be used at a variety of stores and businesses -- was introduced by Diners Club, Inc.
Eunice Vincent

Phishing Solution - Anti-Phishing - 0 views

  •  
    Phishing Solution. Real-time content inspection prevents crimeware.Comply w/ SOX, HIPAA, (COBIT) DS5, PCI DSS 1.1, GLB Act & FISMA.
Elvira Russ

Training programs for use of assistive technology - 0 views

  •  
    This article discusses a great solution to make assistive technology become more effective and not just a waste of money. Training programs.
Elvira Russ

Easy Explanation of Assistive technology and possibilities - 0 views

  •  
    This article is written for people using easy vocabulary and showing how not just big things like huge machines etc are assistive technology devices that will help people, but small small things as well, that people might not think are significant, but that help disabled people a lot with their everyday life.
Eunice Vincent

Cellular Telephone Use and Cancer Risk - National Cancer Institute - 2 views

  • Cellular telephones emit radiofrequency (RF) energy (radio waves), which is a form of radiation that is under investigation for its effects on the human body (1).
  • RF energy is a form of electromagnetic radiation.
  • Electromagnetic radiation can be divided into two types: Ionizing (high-frequency) and non-ionizing (low-frequency) (2). RF energy is a form of non-ionizing electromagnetic radiation. Ionizing radiation, such as that produced by x-ray machines, can pose a cancer risk at high levels of exposure. However, it is not known whether the non-ionizing radiation emitted by cellular telephones is associated with cancer risk (2).
  • ...2 more annotations...
  • A cellular telephone's main source of RF energy is produced through its antenna. The antenna of a hand-held cellular telephone is in the handset, which is typically held against the side of the head when the telephone is in use. The closer the antenna is to the head, the greater a person's expected exposure to RF energy. The amount of RF energy absorbed by a person decreases significantly with increasing distance between the antenna and the user. The intensity of RF energy emitted by a cellular telephone depends on the level of the signal sent to or from the nearest base station (1).
  • When a call is placed from a cellular telephone, a signal is sent from the antenna of the phone to the nearest base station antenna. The base station routes the call through a switching center, where the call can be transferred to another cellular telephone, another base station, or the local land-line telephone system. The farther a cellular telephone is from the base station antenna, the higher the power level needed to maintain the connection. This distance determines, in part, the amount of RF energy exposure to the user.
  •  
    This fact sheet outlines the available evidence regarding use of cellular/mobile telephones and cancer risk. National Cancer Institute Fact Sheet 3.72
anonymous

Facebook Protection Guides (Next Advisor) - 0 views

  •  
    A series of tips that help assist you on identifing doing right from wrong. Being able to identify fake accounts and to report them directley to facebook so further actions can be taken. 6 tips in total, Tip #1: Limit the amount of personal information available on your Facebook profile. Tip #6: Consider an identity theft protection service.
Maliha Rahman

Carlisle mum leads campaign to take on Facebook paedophiles (News & star) - 0 views

  •  
    this website includes an article, followed up with many comments from the larger public, about the facebook 17-year old murder incident. A mother protested against facebook pedophiles and tries to fight her daughters death.  
Chalana Perera

OLPC's Netbook Impact on Laptop PC Industry - OLPC News - 1 views

  • 1. Windows XP would have been discontinued in 2007 or 2008 as was Microsoft's original plan
  • 2. The Windows XP licence for netbooks was lowered to $30 per device
  • 3. Netbooks are selling at a rate of 35 million units per year and represent more than 30% of the notebook market and this share is increasing.
  • ...3 more annotations...
  • 4. Intel's profits shrank 90% between Q4 2007 and Q4 2008
  • OLPC is going to make the PC/Laptop industry realize that there is an alternative to X86 for full sized keyboard/screen computing.
  • prices and market trends obviously do matter for the education aspect of the OLPC project
Maliha Rahman

Teens 'sext' and post personal info (CNET News) Portfolio 1 - 1 views

  •  
    This article is about a survey that was taken to see the teen behavior online plus through cell phones. The whole article basically summarizes how much teens are engaged in activities through communicating systems that can be a huge risk.
Maliha Rahman

Sexting (Articlebase) Portfolio 1 - 1 views

  • 20% of all teens say they have sent nude or semi-nude pictures or videos of themselves.
Maliha Rahman

Sexting Growing Trend Among Teens (Get Legal public) Portfolio 1 - 0 views

  • ''Sexting'' has lawyers grappling for a new definition of what constitutes a predatory sex offender. In general, the law says any nude or semi-nude photo of someone under the age of 18 constitutes child pornography.
  • A 2008 survey by the National Campaign to Prevent Teen and Unwanted Pregnancy found that 39 percent of teens have sent or posted sexually suggestive messages and 48 percent say they have received such messages. Many parents worry the images could find their way onto the Internet, or even worse, into the possession of actual sexual predators.
  • Hannah Montana star Miley Cyrus also experienced the pitfalls of ''sexting'' when someone hacked into her phone and leaked racy images of her—meant only for her boyfriend—online.
Rafae Wathra

Google Zooms In Too Close for Some (New York Times) - 0 views

  •  
    This is about how many users were surprised by the details of google street view (ex. image of cat). They believe this means they have to close blinds. Some license plate numbers were readable and illegal areas were photographed.
anonymous

Facebook Demographics and Statistics Report 2010 (IStrategy Labs) - 0 views

  •  
    Data table showing information of growth of Facebook. Divided into sections such as gender, age, geography, current enrollment, Interests, Users, Percentage usage, and Growth. 
Maliha Rahman

Sexting and Teens (Suite101) Portfolio 1 Criteria D - 1 views

  • Cell phones are now embedded with cameras and have the capability to send pictures to other phones and computers.
  • With sexting, sexually active kids can harass each other simply and quickly.
  • Because they can’t control who these pictures are subsequently sent to, they run the risk that they may wind up in the hands of a sexual predator or someone else who could harm them.
  • ...1 more annotation...
  • How Adults Can Prevent Sexting
  •  
    In this article we see a lot of ways of sexting, their reasoning's plus their consequences. We also see a few suggestions or examples of how to prevent your child from getting into and taking actions like this.
1 - 18 of 18
Showing 20 items per page