Tuesday, February 19, 2013

Design project-day 3

Choose
- We thought are game was for 8-10 year olds so we wanted to make this game challenging for the kids so that they wouldn't get bored. The game had to be fun, fast, challenging, and had to have prices. Yes they do match are game because we used that as a guide. It wasn't stable enough to hold everything up, the layers weren't connected well. By having a more accurate sketch that helps us guide in the building of are game.
Build Plan:
Get materials 
- Get wood (willy) and do the sketch mathias sends on it
- Get springs for base (mathias)
- silicon gun (ana)
- tubes (mathias)
- carb board box (ana)
- Connect and talk about what we will do on the wood a box 
- Start with the base 
- Create the labyrinth 
- Add a way for the marble to go back so the person gets it again if the ball falls 
- Put the springs on add everything on "details"
- Try it and if fails repair

Wednesday, February 13, 2013

Design project-day 2

My drawing-
-weakness: to complicated to make
-strength: it shows the inside and the outside of the labyrinth

Mathias' drawing-
-weakness: shows only one part of the labyrinth
-strength- its easy to make, and is a challenge for the player
Ana Maria's drawing 
-weakness: to difficult to play
-strength- very detailed

What needs to be added
-the outside part how the finish product will look like

Details that  will be added

-barriers

What this game needs to improve is the difficulty or age group and how it works 

Friday, February 1, 2013

Design project day 1

Group:
- Ana Maria Lara
- Mathias Kling

-This game will be made for Middle and Elementary students.
-This games difficulty will be medium
-The game has to be fun, competitive, challenging, creative and able to win cool prices

Three links
http://www.youtube.com/watch?v=sd7x-F5irBY
in this video they have to catch the tickets in the air as the dust buster makes them go flying threw the box.
-http://www.youtube.com/watch?v=nZ-RE0ZJB50
this video shows a pinball machine made out of lego it has all the parts of a normal pinball machine
-http://www.youtube.com/watch?v=6cEWELoxEsY
this is a labyrinth which you use by to axis, you have to put in a marble and guided threw the maze avoiding the falls or pits. You can take the maze out to put in a different difficulty  

We will do a labyrinth which will have two floors with axis handles to move it to avoid the wholes, when getting to the end of the first floor then you go in the whole and it takes the marble to the second floor

We could also do to labyrinths beside each other so that it's a race against some one else.

Tuesday, January 22, 2013

Tour Colombia







find 10 photo of the place
each photo should be explained so people know and see what to do
use a web 2.0 tool to present your perfect vacation
post link on website
Email link to miss shawn sallen@cng.edu


Tuesday, December 4, 2012

Tech tool evaluation

Easybib

Three things I liked about this tool.
- I liked that you could really in a way create an online p bibliography page for your self.
- It's very easy to use you only put the keywords and many sites will appear that you can choose from.
- For the bibliography you can and things from cites, books, newspapers, journals and more.

Three things that I didn't like about his tool.
- Some thing that I didn't like was it was only for adding information from others notes not your own like it would be great to use as a portfolio.
- It could improve by having a facebook login so that you don't have to remember more passwords.
- It could be cool if you could do online collaborating with other students and/or teachers.

I Could use this tool to gather up information for a paper that I have to do. I can have the cites and all bibliographies all ready to help.

Philterlt 

Three things I liked about this tool.
- I Liked that it was easy to download and is a side bar on google chrome and gmail.
- It's very secure because it ask you if it can scan your inbox so that you don't need to put in a password. It helps google know you authorized it.
- It shows the brands it recognizes from your mails and it asks you which ones you want.

Things I didn't like or can make better.
- You can only organize the brands and not the personal mail which aren't from these brands.
- Only works on google chrome; they should let it work in other browsers.
- Only works for gmail; should work on other mail sites such as hotmail.com, yahoo.com and others

I could be able to use this when i'm going to travel and i'm expecting emails from big brands and/or travel agencies.
Can use it when you need jobs and you send all your papers and when you receive a mail you know exactly were it comes from.

Wednesday, November 28, 2012

white hat hackers

I really know a little about white hat hackers:
- It's a term used for a computer hacker or a computer security system.

Questions:
- What do they do?
- Is there other types of hat hackers and what do they have in common or different form white hackers?
- Whats the definition of white hat hackers?

Good links I used:
http://www.secpoint.com/What-is-a-White-Hat.html

Things I learned: 
- White hat hackers definition: A hacker which try security systems to see if there any vulnerability of the system and will tell the page or place this is used (vendor). 
- Theres not only white hat hackers but theres also black hat hackers and grey hat hackers. The black hat hackers are hackers which hack intending a crime. The grey hat hackers are much alike as the white hat hackers but they don't only tell the vendor they also tell crackers.  
- The white hat hackers are said to be ethical hackers which only hack to see if the security system is good enough so that other hackers which are trying to do bad won't be able to hack it.
- These people are employed by the organizations to be the network security professionals. Most come from the CNS 4011 which are teams of hackers there red which act in aggression and the blue team which act in a defensive mode.
- White hat hacking started as a "security evaluating" by the U.S Air Force, they found out it had some vulnerability's. They also found out that the U.S had being doing this.
- The tactic of ethical hacking was made by Dan Farmer and Wietse Venema.

Summary: So what I learned was that there hackers that are used for good. This connects to my life because theres many people which maybe want to make other miserable by hacking there private things and the white hackers would already tell the security system of the vendors; like if I have my bank account and the hack the system to see whats wrong and need to be strengthened.

Questions I still have: How do you ask a white hat hacker to help you see if you security system is good?