1. Topic: Print your own holiday gift wrap.
2. Article Title: Free Printable Gift Wrap Designs
3. Article Source: Lifehacker
4. Summary: This article describes a new type of printable gift wrap. This invention is perfect for holidays, especially Christmas. When you print your own gift wrap, you can personalize it, rather than having to settle with generic wrapping paper.
5. Reaction: This invention is one the the coolest things that I have ever researched. I applaud the inventors, and I hope that this invention appeals to many customers. This item is interesting because it allows you to customize wrapping paper, thus making the present look more extraordinary. This event affects me because I will probably want to use printable gift wrap to wrap presents this Christmas. Printable gift wrap is fun, free, and so much better than ordinary, boring wrapping paper.
6. World Impact: This event affects the world by providing people with better gift wrap. Because America as a whole is facing economic troubles, having free gift wrap will ease the financial burden on many families. This invention can also provide millions of people with fun, whimsical present wrap. For example, if you wanted to wrap someone's present in paper that portrayed a wolf eating spaghetti while playing tennis, you probably wouldn't find that kind of wrapping paper design in stores. With printable gift wrap, finding that kind of design would be made possible.
Life as Abbi.
Monday, December 17, 2012
Tuesday, November 20, 2012
Weekly Current Event, 11/19/12
1. Topic: A 'cyberwar' is taking place in Israel.
2. Article Title:
3. Article Source: CNN
4. Summary: An anonymous user has declared a 'cyberwar' on Israel. The unnamed user has hacked Israel's governmental computers and has posted confidential passwords, email addresses, and they have even deleted databases and ruined websites. The user posted these things on a Twitter feed. Although this attack may seem very detrimental, very little harm was done to the government's computers.
5. Reaction: I think it is wrong and distasteful that an anonymous user has hacked Israel's computers. I wish 'cyberwars' never existed. Hacking computers is a federal offense, and whoever committed the heinous needs to be punished. This event affects me because if someone hacked Israel's databases, then they could potentially attack America's digital world. If America's databases are attacked, then my access to the Internet could potentially be threatened.
6. World Impact: This affects the world because other countries could notice how easily Israel's computers were harmed, and could learn from Israel's unfortunate event. Other countries could realize that they need to protect their own databases from malicious hackers. This affects Israel because this attack puts them in a vulnerable position for future digital downfalls. This attack doesn't necessarily affect only Israel. This event affects many stakeholders and neighboring countries.
2. Article Title:
Anonymous declares 'cyberwar' on Israel
3. Article Source: CNN
4. Summary: An anonymous user has declared a 'cyberwar' on Israel. The unnamed user has hacked Israel's governmental computers and has posted confidential passwords, email addresses, and they have even deleted databases and ruined websites. The user posted these things on a Twitter feed. Although this attack may seem very detrimental, very little harm was done to the government's computers.
5. Reaction: I think it is wrong and distasteful that an anonymous user has hacked Israel's computers. I wish 'cyberwars' never existed. Hacking computers is a federal offense, and whoever committed the heinous needs to be punished. This event affects me because if someone hacked Israel's databases, then they could potentially attack America's digital world. If America's databases are attacked, then my access to the Internet could potentially be threatened.
6. World Impact: This affects the world because other countries could notice how easily Israel's computers were harmed, and could learn from Israel's unfortunate event. Other countries could realize that they need to protect their own databases from malicious hackers. This affects Israel because this attack puts them in a vulnerable position for future digital downfalls. This attack doesn't necessarily affect only Israel. This event affects many stakeholders and neighboring countries.
Friday, November 16, 2012
Weekly Review Blog (Scams and schemes)
With week thirteen drawing to an end, I am still proud to be a Spartan. We talked about many important things this week, and the lessons that we learned were awesome.
This week in my Introductions to Publications class, we talked about company scamming and scheming. We learned that companies will scam you out of your money, especially over the Internet.
Our teacher also gave us key words and definitions to accompany our lesson for this week.
![]() |
Stop stealing, April 3, 2007 |
Scam: An attempt to trick someone, usually with the intention of stealing money or private information.
Identity Theft: A type of crime in which your private information is stolen and used for criminal activity.
Vulnerable: In a position that makes it easier for you to be harmed or attacked.
Phishing: When people send you phony emails, pop-up messages social media messages, texts, calls, or links to fake websites in order to hook you into giving out your personal and financial information.
One way that companies will try to get your money is buy sending you
spam emails. Spam emails are emails that companies, or hackers, will
send you that can potentially get your money or infect your computer
with a virus.
Here are some ways that you can protect yourself from online scamming:
![]() |
Mailbox, March 29, 2010 |
- Avoid opening the message or email.
- Don't click on any
links and don't download attachments (they could be filled with viruses).
- Don't reply.
- Mark as "junk mail" or "spam" for your email provider, or
report it to your social networking site.
- If you are concerned about an account you have with a
company, contact it's customer service department by phone. Make sure you
verify the company's contact information elsewhere online first.
Another thing we discussed is identity theft. Identity thieves might want your social security number, bank information, full name, birthday, current and previous addresses and phone numbers, driver's license, and passport numbers.
If your identity is stolen, the theft can open bank accounts in your name, steal you money, and they could basically do anything they wanted to while posing as you.
If your identity is stolen, you could potentially develop bad credit, go to jail, lose money, be in debt, and, if needed, you would have to file for bankruptcy.
Overall, this week has been great, and I hope that next week will be just as awesome. Until next week, happy blogging!
Subscribe to:
Posts (Atom)