divendres, 1 d’abril del 2016

Vocabulary: Email

Headers
Footers
Message
Recipient
Broadcast
@
.
Domain
User Name
Reply
Forward
Adress Book
Inbox
Spam
Sent
Trash
Attach
Attachament

dilluns, 7 de març del 2016

Data Storing concepts

ROM- Real Only Memory
RAM- Randon Acces Memory
GUI- Graphical User Interface
Backing Store Compress
Spin- girar
RPM- Revolutions per minuts
Sealed- segellat
Floppy disk
Zip disk
Backup- copia de seguridad
Memory stick
Multi- session
Overwrite- sobreescribir
Magnetic tape
Robust Portable
Serial Acces
File wire
Renovable
Durable
Card Reader
Memory Card

Wipe out

dilluns, 8 de febrer del 2016

Internet: Vocabulary

Network
ISP (Internet Service Provider) ex movistar
WWW (World Wide Web)
Browser
Server
Host- allotjar
Websites
URL-Uniform Resource domain Locator (.uk)
Data
Encrypted
Link
Account
Hypertex
Moden
Router
History Folder
Back button
Forward button
Stop button
Favorites
BookMarks
Digita
Analogue
Speed
Download
Broadband
Bandwith
Fibre optic
Cable
Click
Connection
Stream
Social Networking
Share
Blog
Search engine
Search terms

dilluns, 11 de gener del 2016

Vocabulary Computer Software

                                                      Vocabulary Computer Software

Programmer (Programador) person who writes or modifies computer programs or applications
Execute (executar) start a program on a computer
Features (caracteristiques) something a computer program is "supposed" to do; these are often reasons to use a particular
Bugs (errors) error in a computer program, An average developer will create one bug for every 10 lines of code written.
Crash (espallat) computer failure due to faulty hardware or a serious software bug
Terminate (terminar) To cause a process or task to stop executing
End Users (els usuaris finals)  person who uses a product or service on a computer
Error (error) incorrect action attributable to poor judgment, ignorance, or inattention
Abort (avortar) end a program or a process before its completion
Compatible (compatible) of being used without modification
Closed source (proprietary) software (de codi tancat) in which the license stipulates that the user cannot see, edit, or manipulate the source code of a software program
Open source software (de codi obert) program in which the code is distributed allowing programmers to alter and change the original software as much as they like

After the film

After the film

Write a new post in your blog. Post title: FILM: Hackers (1995)
Post content:
1) Answer these questions:
a-Why do you think hackers do what they do?
To get money
b-Are you worried someone could hack into your computer?
If I am concerned , and I could get mine pesonal info.
c-Have you heard of any big hacking cases?
If and heard, the creator of the website wikileaks information stolen US military with video attacking Syria.
d-What punishment should a hacker receive?
It depends on the degree of fault committed , since it is illegal to steal information .
2) Your opinion about the film
It's a bit exaggerated, but in the end seems old get away with it and gets the girl .