Monday, October 31, 2011
Wednesday, October 26, 2011
Words in notes:
Creative Commons
intellectual property
copyright
Public Domain
Derivatives
Share-alike
Phishing
Identity theft
Virus
Firewall
cloud
Words I do not have in my notes:
Freeware: free software, but it is copyrighted so others cannot market it.
Shareware: a demo of a software that is free
Open Source: a program source code is free to the public and can be modified and distributed by anyone.
Commercial Use: advertisement
Hacking: accessing another person’s computer without permission.
Piracy: installing and using commercial software without paying for the program.
Malware: Short for Malicious software. Malware refers to software programs designed to damage or other unwanted actions on a computer system.
Data Back-ups: making copies of data to store in case something happens to the original
Cookie: a small one amount of data generated by a website and saved by your web browser.
Filesharing: distributing or providing access to digitally stored info.
The Duties of the FTC are to keep charge of keeping American business competition free and fair. CC and copyright fall into the same category because they help one’s business idea’s and product from being stolen.
Creative Commons
intellectual property
copyright
Public Domain
Derivatives
Share-alike
Phishing
Identity theft
Virus
Firewall
cloud
Words I do not have in my notes:
Freeware: free software, but it is copyrighted so others cannot market it.
Shareware: a demo of a software that is free
Open Source: a program source code is free to the public and can be modified and distributed by anyone.
Commercial Use: advertisement
Hacking: accessing another person’s computer without permission.
Piracy: installing and using commercial software without paying for the program.
Malware: Short for Malicious software. Malware refers to software programs designed to damage or other unwanted actions on a computer system.
Data Back-ups: making copies of data to store in case something happens to the original
Cookie: a small one amount of data generated by a website and saved by your web browser.
Filesharing: distributing or providing access to digitally stored info.
The Duties of the FTC are to keep charge of keeping American business competition free and fair. CC and copyright fall into the same category because they help one’s business idea’s and product from being stolen.
Wednesday, October 19, 2011
Copyright for Music and lyrics
A composer or artist has copyright to their work upon completion to their work. The Author has copyright protection for their work up to 95 years and 50 to 70 years after death. The current year for public domain in the US is 1922. Having copyright to music means you have the rights to print, copy, publish, and sell your work. The difference between Public Domain and Proof of public domain is you can’t copy music, publish, or rearrange in a Public Domain without proof in that it is in a public Domain. Proof of public Domain means you have proof that the music is in a public domain. Rules for copyright for music and lyrics are if you do not have copyright to music you cannot copy, publish, perform, or copy the music without permission from the author. A case of copyright infringement is the case of Michel Bolton vs. Isley Brothers. The Isley Brothers sued Michel Bolton lifting parts from their original song of the same name.
http://www.mpa.org/copyright_resource_center/copying#copyright
http://www.pdinfo.com/copyrt.php
Friday, October 14, 2011
Wednesday, October 12, 2011
Tuesday, October 11, 2011
Podcast
A podcast is a series of vido or audio on a specific topic. The podcast are relased as episodes and are used thourgh downloading them on a electronic device. You can locate podcasts through out the internet.
Friday, October 7, 2011
Wednesday, October 5, 2011
id theft
The lady get’s her identity stolen because she used her debt card at the wrong place at the wrong time. Identity theft is such a common problem because personal information is easily abstained and it is hard to track who ever the thief is. Types of document someone would need to steal your identity are credit card numbers or pin. To protect yourself from identity theft you should be careful to whom you give your information to. The blame could be either sometimes it’s the thief and the victim has no control over it. Also sometimes the victim is not careful and their identity is stolen.
Tuesday, October 4, 2011
new technology
The DARPA’s Alphadog is a mechanical dog that is able to carry 400 pounds. The Alphadog is also able to last 24-hours and has enough fuel to travel 20 miles. If the mechanical hound falls on its side it is able to get up and right it’s.
Subscribe to:
Comments (Atom)