Friday, October 19, 2007

Analogy

. MAVIS/LEARN2TYPE-10 MINUTES(What is an analogy?)
ADVANCE : RECEDE :: stiff : _____
2. flexible
Journalize
1.clean
2.no
3.use hand sanatizer
4.i think it is very scary

Tuesday, October 16, 2007

What is an analogy?)
LEMON : YELLOW :: sweatpants : _____
1. exercise


WORD QUIZaugurAn ancient Roman might have gone to an augur to1. have his portrait painted.2. learn what his future held.3. buy and sell goods.

Monday, October 15, 2007

Analogy

ANALOGIES/WORDQUIZ/WPM..
MINK : SOFT :: mold : _____

2. shape

WORD QUIZraconteurMy Aunt Vesta is a great raconteur—1. no one can beat her at tennis.2. I could listen to her stories for hours.3. she plays tricks on anyone and everyone

Friday, October 12, 2007

Anology

STITCHING : QUILT :: beak : songbird_____
1. bill
2. mouth
3. songbird
What does it mean?
meritocracyWord QuizMy swim camp uses a system of meritocracy to decide who will be lifeguard
.1. The oldest person is lifeguard.
2. The strongest swimmer is lifeguard
.3. We draw straws to select the lifeguard.

Thursday, October 11, 2007

WARM UPWhat word completes the analogy?
IMAGINATIVE : CREATIVE :: stair : step_____
1. feet
2. hallway
3. step
WORD QUIZgossamer
Which looks most li

1.Why is it important to correctly use the correct Reply, Reply All, CC, BCC, and Forwarding options?
so e-mail is not sent to the wrong person.


2. Why is it a bad idea to use capital letters to emphasize a point in an e-mail?
Avoid emoticons, jokes, and capital letters. One common mistake is to use all capital letters to emphasize a point, but this can look like SHOUTING


3. What are three types of electronic communication that contribute to inbox overflow?
jokes, junk mail (spam), hoaxes, and chain letters


4. If you spread information around in an e-mail that harms a person or an organization, but it is true, it is gossip. If you spread information that harms a person or an organization and it is false, it is ____.
libel,ke gossamer?1. a spider's web2. a turtle's shell3. a fish's scales

Wednesday, October 10, 2007

3.2

______ are viruses that copy themselves until filling up a computer's storage space.
Your Answer: WORMS
2
Not Graded
What are two types of “sneaky viruses” that are not designed to harm your computer but can still cause serious problems?
Your Answer: Spyware and adware
3
Unanswered
What are two ways a virus can infect your computer?
4
Not Graded
What type of software is available to help prevent viruses and WORMS?
Your Answer: MacAfee

3.1

1Name two types of telephone networks.
Your Answer: Standard uses physical connections (wires, cables or fiber optics). Cellular uses air waves (analog or digital).

2Why are telephone and Internet networks able to function across countries?
Your Answer: The information then travels over an Internet backbone until it reaches the desired destination. Internet backbones are made of fiber optic lines which provide very fast transmission of data.

3Not Graded
Name four different types of Internet connections.
Your Answer: Dial-up, modem, Satellite, Wireless

4Not Graded
What are the three types of information transmitted on the telephone network?
Your Answer: Sound (voice) Images (fax documents) Data (modem)