Jan. 9th:                                             

Work on your projects for the first 30 minutes

Summary and paper is due today

Quiz Wednesday (true or false)

STUDY OF SEARCH ENGINE

1) Is it possible to view the source code of every website by clicking the right side of the mouse? True

We went to the Shandong University to look for Dr. Nie in the university website which we found this picture from. In the process we discovered a problem in which there were no links to the table contents for example pictures and other options.

Most web pages have some problems for example a Link, Content, and also consistency. For example not having the seven Cs

Is a spam virus? NO, Spam is something that is not wanted by a receiver

If you would like to learn more about the origin of the word spam click here

To learn more about the an electronic spam click here

Advance fee fraud, often also known as the Nigerian money transfer fraud, Nigerian scam or 419 scam after the relevant section of the Nigerian Criminal Code that it violates[1], is a fraudulent scheme to extract money from victims after making them believe they will get an immense fortune. Victims are requested to pay an upfront fee before their purported fortune is released. This type of scam, originally known as the "Spanish Prisoner Letter" [2], has been carried out since at least the sixteenth century via ordinary postal mail. These scams have come to be associated in the public mind with Nigeria due to the massive proliferation of such confidence tricks from that country since the mid-eighties, although they are often also carried out in other African nations, and increasingly from European cities with large Nigerian populations, notably London, Amsterdam and Madrid and lately also Dubai (United Arab Emirates). Originally, the schemers contacted mainly heads of companies and church officials, however, the use of e-mail spam and instant messaging for the initial contacts has led to many private citizens also being targeted, as the cost to the scammers to make initial contact is much lower. The United States Federal Trade Commission has issued a consumer alert about the Nigerian scam. It says: "If you receive an offer via email from someone claiming to need your help getting money out of Nigeria ¡ª or any other country, for that matter ¡ª forward it to the FTC at spam@uce.gov. "The United States Department Of The Treasury advises "You may also email the 419er documents, especially any banking data they may have given you, marked as described above, to Task Force Main in DC 419.fcd@usss.treas.gov; that is also acceptable."

For spammer to be successful the spammer has to know your URL

Question of the day:-What is a virus, how does it created, how does it work, and what is the difference between virus and worm? What is worm?

For example there is a virus called Trojan horse. What is a Trojan horse? Trojan horse appears as a useful file or software and attacks your system. People create a viruses by making a file. The virus creator know how to create the file and manipulate it. To understand more about virus and file please refer to Chapter 9 of the text.

To combat or create a  virus you need to know:-

1- Knowledge of file and manipulation (access, create, delete, modify)

2-knowledge of programming or knowledge of operating system

3-Knowledge of computer address (pointer)

What would be the result of a virus?

1- It is disturbing (doesn't delete anything) or appears as unwanted entity

2-It delete your files in the system gradually.

3-It spreads and destroy your system.

For more information check out the following article

Spyware is a broad category of malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. While the term taken literally suggests software that surreptitiously monitors the user, it has come to refer more broadly to software that subverts the computer's operation for the benefit of a third party. Spyware differs from viruses and worms in that it does not usually self-replicate. Like many recent viruses, however, spyware - by design - exploits infected computers for commercial gain. Typical tactics furthering this goal include delivery of unsolicited pop-up advertisements; theft of personal information (including financial information such as credit card numbers); monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites. As of 2005, pundits have often characterized spyware as the pre-eminent security threat for computers running Microsoft Windows operating systems. Some software on the Linux and Mac OS X platforms has behavior similar to Windows spyware, but to date has not become anywhere near as widespread.


How do you write a summary of a report in web technology? To learn more about summary please click here

How to Write a Summary

What is a summary? It is a fairly brief restatement--IN YOUR OWN WORDS--of the contents of a passage.

Strictly speaking, you simply report back what the other writer has said. It is not your job to make value judgments about the "rightness" or "wrongness" of what (s)he says. That would be a different kind of paper--a summary-response, a critique, or a position paper.

While it is hard to give concrete guidelines for length, many good summaries are about 1/4 to 1/3 the length of the original.

What are the steps in writing a summary?

I.  Read through the whole piece--carefully. Annotate (underline, highlight, asterisk, star, flag things; comment in the margins) as you read.

II. When you finish, look back for the 1-2 sentences that state the author's main point. Write it/them down or place some special annotation in the margin of your book.  This is the article's thesis statement. While it may appear early in the essay--the first paragraph or two (as you are taught to locate yours), it may not, in fact, be stated until the end of the piece (almost as if it were a conclusion).

III. Reread the selection, dividing it into sections of thought. Each section may be one paragraph, but, more likely, each section will incorporate several paragraphs.

IV. Write a sentence or two summarizing each section of thought.  If you have trouble doing this, you might try writing a summary sentence for each paragraph and then revising where you see yourself repeating ideas.

V.  Write a first draft of your summary, including the following items:

A.  In the first sentence or two--

1.  the author's name.
2.  the article's or chapter's name (perhaps even the magazine's or book's name in which the article or chapter appeared).
3.  the author's thesis statement.

***Here's an example: "In our excerpt from The Idea of a University, John Henry Newman argues that the real purpose of a university education is to help students become wise, enable each one to understand as much as possible of the world in which (s)he lives and to see clearly how each piece of knowledge relates to each other piece of knowledge."

B.  Next, your summary sentences for each paragraph or section. Put them in the same order that the author presents the essay, because you are, after all, simply reporting back what (s)he says.

C.  You should make every effort to put the author's ideas into your own words--to avoid plagiarism. However, you may occasionally want to quote a point directly from the author. That's okay; just be sure to place quotation marks around what you have borrowed and cite your page number.

D.  Occasional supporting details, if and only if they are the most significant ones.
¡¡

VI.  Check your draft against the original piece for accuracy.

VII.  Revise the summary to "smooth out" its choppiness. In other words, link your section summary sentences together with good transitional words or phrases (like in addition, moreover, on the other hand, however, finally).

VIII.  Proofread and spellcheck.


 

 

 

summary is your own word 

the length is the 1/4 of the original.

 you must read the entire paper and mark the important concept.

pick the main idea and elaborate the summary.

 create three subdirectories to contain all of your assignment so far.

1. article summary and research on web technology literacy

2. html and ten commandment from exercises in the  book.

3. what is network management? look at the quizzes to answer the related quistion?