Tuesday 28 July 2009

You're Beautiful lyrics

My life is brilliant.
My love is pure.
I saw an angel.
Of that I'm sure.
She smiled at me on the subway.
She was with another man.
But I won't lose no sleep on that,
'Cause I've got a plan.

You're beautiful. You're beautiful.
You're beautiful, it's true.
I saw your face in a crowded place,
And I don't know what to do,
'Cause I'll never be with you.

Yeah, she caught my eye,
As we walked on by.
She could see from my face that I was,
Fucking high,(Real version)
Flying high,(clean version)
And I don't think that I'll see her again,
But we shared a moment that will last till the end.

You're beautiful. You're beautiful.
You're beautiful, it's true.
I saw your face in a crowded place,
And I don't know what to do,
'Cause I'll never be with you.
You're beautiful. You're beautiful.
You're beautiful, it's true.
There must be an angel with a smile on her face,
When she thought up that I should be with you.
But it's time to face the truth,
I will never be with you.

Wednesday 13 May 2009

Intellectual property- (IP) are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept.

Sunday 26 April 2009

Assigment 02

1.cyber terrorist - a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
2.perpetrator - The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.

3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.

Sunday 19 April 2009

Assigment

☻☻Are Information Technology (I.T) workers professional?☻☻

Yes. because information technology are study four years, in every year that they enter many actual training that they encounter like four example programing and other's. I.T is like in other coarse because the other subject of I.T is like in other non vocational coarse. For me they are certified professional because the training that they learned was applied in a actual job. Now a day we can say that our community was in a high tech day tha's why the skills of I.T is very inportant to us. I.T performance, image, exposure model is commonly used to help individuals manage their careers. The same model can also be applied to the IT organization as a whole and can prove quite useful in managing IT's role in the enterprise. Information technology professional and technical staff in the day-to-day operations within an information systems environment. They are expected to exercise progressively developing skills and knowledge in the Information Technology area in which they are assigned, while enhancing with practical experience their academic preparation for working on a full-time or professional basis in Information Technology. Incumbents must be able to transport, lift, move, and install computer hardware and software on a routine basis. They Performs a wide-range of technical support duties including configuration of computers, printers, and installation of equipment and applications software, simple maintenance and repair of computers and printers, and identification and resolution of computer hardware and software problems. I.T Assists in writing computer programs and provides documentation to streamline information processing and program data analysis. Assists IT staff in the development and dissemination of newsletters, graphics, charts, forms, or handouts during training sessions. Assists in ad hoc report development. May create, modify, or maintain simple applications/databases for data, such as training information, budget or departmental data, etc. May provide basic training to department staff on technical topics, software products, and use of utilities. May participate in preparing detailed coding instructions using COBOL or other higher-level computer programming languages.

Wednesday 15 April 2009

■■■10 Commandments of Computer Ethics■■■■

  1. Thou shall not use a computer to harm other people.
  2. Thou shall not interfere with other peoples computer work.
  3. Thou shall not snoop around in others peoples computer files.
  4. Thou shall not use computer to steal.
  5. Thou shall not use computer to steal bear false witness.
  6. Thou shall not copy or use software for which you have not paid.
  7. Thou shall not use other computer resources with out authorization.
  8. Thou shall not appropriate other people intellectual output.
  9. Thou shall not think about the social consequence of the program you are writing on the system you are designing.
  10. Thou shall always use a computer in way that ensure consideration and respect for you fellow human.