Tuesday, 28 July 2009
My life is brilliant.
My love is pure.
I saw an angel.
Of that I'm sure.
She smiled at me on the subway.
She was with another man.
But I won't lose no sleep on that,
'Cause I've got a plan.
You're beautiful. You're beautiful.
You're beautiful, it's true.
I saw your face in a crowded place,
And I don't know what to do,
'Cause I'll never be with you.
Yeah, she caught my eye,
As we walked on by.
She could see from my face that I was,
Fucking high,(Real version)
Flying high,(clean version)
And I don't think that I'll see her again,
But we shared a moment that will last till the end.
You're beautiful. You're beautiful.
You're beautiful, it's true.
I saw your face in a crowded place,
And I don't know what to do,
'Cause I'll never be with you.
You're beautiful. You're beautiful.
You're beautiful, it's true.
There must be an angel with a smile on her face,
When she thought up that I should be with you.
But it's time to face the truth,
I will never be with you.
Wednesday, 13 May 2009
Intellectual property- (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.
Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept.
Sunday, 26 April 2009
Assigment 02
2.perpetrator - The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.
3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Sunday, 19 April 2009
Assigment
Wednesday, 15 April 2009
■■■10 Commandments of Computer Ethics■■■■
- Thou shall not use a computer to harm other people.
- Thou shall not interfere with other peoples computer work.
- Thou shall not snoop around in others peoples computer files.
- Thou shall not use computer to steal.
- Thou shall not use computer to steal bear false witness.
- Thou shall not copy or use software for which you have not paid.
- Thou shall not use other computer resources with out authorization.
- Thou shall not appropriate other people intellectual output.
- Thou shall not think about the social consequence of the program you are writing on the system you are designing.
- Thou shall always use a computer in way that ensure consideration and respect for you fellow human.