Jeremy

=SCRIPT=

Bob is playing games on the computer then gets an email BOB: Huh? What’s this? //Bob opens email. Bob reads email. Bob gets a threatening message from a stranger.// BOB: Who would want to bash me? I don’t think I’ll tell anyone. // Bob gets a call at 2 in the morning. // BOB: I wonder who would call me at this time? Hello? PERSON ON THE PHONE: If you come to school tomorrow, you’ll get bashed. BOB: Whatever. // Bob hangs up and goes back to sleep. // // When he wakes up in the morning, he gets a bunch of nasty text messages. // BOB: Uh, mum. I don’t feel too well. Can I stay home? BOB’S MUM: Sure. // Some days and many nasty messages later, Jack, Bob’s friend, walks up to Bob’s computer and sees an abusive email. // JACK: What is that? BOB: Uhhhhhhh…… nothing. //Bob quickly closes the email.// JACK: You know, if you’re being bullied, you should tell someone. BOB: Oh. Well the guy said he would bash me if I told anyone. JACK: Then we should tell the principal. That’s not nice. //Bob and Jack rush to the office and tell the principal about everything that happened. The principal calls the police and the police trace the emails and find the person who was bullying him. It turns out that it was his old friend who was playing a joke on him. The police fined him and he had to sell his computer to pay off the fine.// BOB: Lets MAKE =**__My Reflections__**=

I think i used my time well today. i managed to finish my kahootz with Edmond and we are recording the sound to put on our video.

=__Excursion to ACMI – 17/3/2010__=

=__Firewalls__= 1. Internet infrastructure is a global connection of networks that connect together to form a global network. The ISP connects you to the Internet and routers send the information from the site you want to see to you. 2. Firewalls work by processing what is in the data packets and allow what you want in and keep out unwanted information. 3. The purpose of a firewall is to keep out unwanted content from entering your computer. 4. 5. A firewall can be set to allow certain materials in and not others. An IP address is a number assigned to computers on a network. A Domain name is identification of authority. A Protocol is a set of rules about how computers communicate. A Port is an interface between computers. 6. Most countries have some kind of censorship on websites. China, Iran, Pakistan and Haiti are among the most heavily censored countries in the world. 7. The government simply blocks the websites they don't want people to see. They use IP address and keywords to see if they should block a website and they have 30,000 "cybercops" patrolling the internet and how people use it. 8. The advantages of having a firewall include blocking spam, bugs, viruses and e-mail bombs. The disadvantages of having firewalls are not being able to use macros and sometimes the firewall does not always work. 9. A proxy server is designed to act as a middleman between you and the internet. It helps a network behave efficiently by speeding up access to sites, block unwanted sites and scanning content before being sent out. =__Bibliography__= [] [] [|http://en.wikipedia.org/wiki/Port_(disambiguation)] [] [] [|http://en.wikipedia.org/wiki/Protocol_(computing)] [] = [] [] The Sydney Morning Herald, //The Great Firewall of China,//

=__My day at ACMI__= ACMI was a fun way to learn about films and Web 2.0 tools. We learnt how films started, what they were like and how film and TV has progressed since. After our tour, we were allowed to explore and we all explored the games that were on offer.