Project - Secure Email
0 comments Posted by Melinda Cooper at 6:54 AM Labels: Project - Secure Emailhttp://ezinearticles.com/?How-Secure-Email-Increases-Business-Productivity-and-Information-Security&id=2605716
Summary of Article;
The article talks about how electronic mail has dramatically increased productivity for business over the past decade. Its use has enabled companies and individuals to communicate quickly, reliably, easily, and cheaply. However, standard e-mail has typically lacked in the area of security. It is for this reason that companies should seriously consider implementing Secure E-mail strategies. Secure E-mail can benefit businesses by providing them with confidentiality, integrity, etc. The confidentiality of secure e-mail occurs by encrypting the messages that are sent over the Internet. This provides privacy. The use of Digital signatures is also an important feature of secure e-mail. This allows the receiver to verify the message's integrity, authenticity, and no repudiation. Standardized email can significantly increase productivity for your company. In conclusion the article says, its use can enable you to communicate reliably, easily, and affordable. In addition, utilizing secure e-mail can provide you with confidentiality, integrity, authentication, and no repudiation.
Week 14 - Muddy
0 comments Posted by Melinda Cooper at 12:04 PM Labels: Virtual Machine, Week 14 - MuddyA virtual machine is a type of computer application used to create a virtual environment, commonly referred to as virtualization. Virtualization allows the user to see the communications of a network through a process of aggregation. Virtualization may also be used to run multiple operating systems at the same time.
There are several different types of virtual machines. Most commonly known, hardware virtual machine software. This type of software makes it possible to perform multiple identical executions on one computer. Through the use of the hardware virtual machine software, the user has a seemingly private machine with fully functional hardware that is separate from other users.
Virtual machine can also refer to application software. With this software, the application is isolated from the computer being used. This software is intended to be used on a number of computer platforms. A virtual machine may also be a group of computers that work together to create a more powerful machine. In this type of machine, the software makes it possible for one environment to be formed throughout several computers. This makes it appear to the end user as if he or she is using a single computer, when there are actually numerous computers at work.
I have posted a link with some very interesting info about virtual machines; Enjoy! http://en.wikipedia.org/wiki/Virtual_machine
Week 13 - Clear
0 comments Posted by Melinda Cooper at 5:45 AM Labels: Software Piracy, Week 13 - ClearIs Software Piracy okay? Absolutely Not!! It is not okay to make copies of any software, period. It is illegal, immoral, unethical and just plain wrong. This practice hurts a lot of people right in the pocket book. Illegally duplicating software and selling it costs the national economy billions of dollars every year. This is not just lost money; it is lost jobs, lost retail dollars and lost government taxes.
So you want to help stop piracy, but do not know for sure what a pirated copy of a software program really looks like. First of all the quality is bad. It usually does not come with key elements or documentation and the biggest clue is it has no warranty protection or upgrade options. Using pirated software is just asking for trouble, as many of the pirated copies come with a little something extra, viruses.
Look for authentic software with a label on it that states it is genuine. For instance, with Microsoft products look for something called the Certificate of Authority. It is not a license; it's just a visual identifier that says whether it's genuine Microsoft software. Other companies have similar kinds of identifiers to let you know your product is original equipment manufacturer.
While it may be really tempting to take and use a pirated copy of some software that you have been wanting for ages, it is not okay to have that copy. The right thing to do is report it. To report pirated software, go online and search for the company site of the original software and let them know the details of what you were offered. In doing this, you are doing what is right, moral, an ethical. If you ever see or know of pirated software, please use the link below to report it. https://reporting.bsa.org/usa/home.aspx
Project - Database Project
0 comments Posted by Melinda Cooper at 2:57 PM Labels: Database Project, ProjectMicrosoft Access is definitely in a league of its own. I have to say from the very beginning of the semester when I saw I had to complete a project using Access, I was very skeptical. Mainly because I had never used Access before. I guess you could say I was scared. After watching the lectures, I felt a little more comfortable with Access. After the completion of this project I learned many things that I never knew before. I learned how to create a brand new table. I also learned how to import, export, and append a database to an existing table. To take it a little further, I learned how to create a query and how to adjust a query to meet certain needs. Further, I learned about form and report activity. Form and Report Activity is pretty neat. With the form and report wizards, I learned that you customize a any form or report in so many ways.
There are many ways to enhance the database project. However, we all know the list could go on for days. In my opinion, one way I think that I could enhance this project is to create a different type of report activity. I would utilize the report activity in a different way. I would probably take out the members address and contact information as you already have that in the Members Table, which is just a click away. I would use the report to tell how many active individual and family members were at the gym and whether they were female or male. I think that it is more important to know how many active members (family or individual) you have. I think all the other information is easily gathered from the Members table, so to reduce the information on the report, I would narrow the fields.
A data-flow diagram is a graphical representation of the flow of data through an information system. DFD’s can also be used for the visualization of data processing. On a DFD, data items flow from an external data source or an internal data store to an internal data store or an external data sink, via an internal process.
A DFD provides no information about the timing or ordering of processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed, in what order, and under what circumstances, but not what kinds of data will be input to and output from the system, nor where the data will come from and go to, nor where the data will be stored.
Data-flow diagrams are one of the three essential perspectives of the structured-systems analysis and design method. With a data-flow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented.
http://it.toolbox.com/blogs/enterprise-solutions/data-flow-diagrams-dfds-14573
As one of the oldest components associated with computers, the database management system, or DBMS, is a computer software program that is designed as the means of managing all databases that are currently installed on a system hard drive or network. Different types of database management systems exist, with some of them designed for the oversight and proper control of databases that are configured for specific purposes.
The DBMS is marketed in many forms. Some of the more popular examples of DBMS solutions include Microsoft Access and Filmmaker. These products provide for the creation of a series of rights or privileges that can be associated with a specific user. This means that it is possible to designate one or more database administrators who may control each function, as well as provide other users with various levels of administration rights. This flexibility makes the task of using DBMS methods to oversee a system something that can be centrally controlled, or allocated to several different people.
There are four essential elements that are found with just about every example of DBMS. The first is the implementation of a modeling language that serves to define the language of each database that is hosted via the DBMS. Second, data structures also are administered by the DBMS. Data structures are what allow DBMS to interact with the data without causing and damage to the integrity of the data itself. A third component of DBMS software is the data query language. This element is involved in maintaining the security of the database, by monitoring the use of log in data, the assignment of access rights and privileges, and the definition of the criteria that must be employed to add data to the system. Last, a mechanism that allows for transactions is an essential basic for any DBMS. This helps to allow multiple and concurrent access to the database by multiple users, prevents the manipulation of one record by two users at the same time, and preventing the creation of duplicate records.

What is TCP/IP? Taken directly from the dictionary, it is data transmission protocol: a protocol used for transmitting data between computers and as the basis for standard protocols on the Internet; TCP is short for transmission control protocol and IP is short for Internet protocol. It can also be used as a communications protocol in a private network. When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
It is named from two of the most important protocols in it; the Transmission Control Protocol (TCP) and the Internet Protocol (IP). Today's IP networking represents a synthesis of several developments that began to evolve in the 1960s and 1970s, namely the Internet and LANs, which emerged in the mid- to late-1980s, together with the introduction of the World Wide Web in the early 1990s.
The Internet Protocol Suite, like many protocol suites, may be viewed as a set of layers. Each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the upper layer protocols based on using services from some lower layers. Upper layers are logically closer to the user and deal with more abstract data, relying on lower layer protocols to translate data into forms that can eventually be physically transmitted. The TCP/IP model consists of four layers; Link Layer, the Internet Layer, the Transport Layer, and the Application Layer.
I found a few interesting articles about TCP/IP; feel free to check them out.
TCP/IP Article 1
TCP/IP Article 2

Before I started the Excel Project, I completed the Excel Scavenger Hunt. Let’s just say, thank goodness for that. The Scavenger Hunt thoroughly prepared me for the actual project. Don’t get me wrong, it took some common “Excel” sense, but if you have ever used excel for the basic spreadsheet, then you would know how to maneuver around.
I learned quite a bit about Excel through this project. Some of the things I learned, I never knew before; all thanks to this project. I learned several shortcut functions and syntax's. And most of all I learned how to create a pivot table. Who would have ever guessed that Pivot Tables could be so important to an excel spreadsheet. They are ultimately easy to use with a little bit of practice. Overall I thought this project was pretty easy, but only with the help of the lectures, the excel book, and of course a little bit of common knowledge. I definitely will take a lot from this project, and can't wait until I am tasked with an Excel Spreadsheet job!
Week 9 - Muddy
0 comments Posted by Melinda Cooper at 7:11 AM Labels: Pivot Tables and how they are usefulWhat Is a Pivot Table
The Pivot Tables tool is one of the most powerful yet intimidating features in Excel. Pivot tables allow you to quickly summarize and analyze large amounts of data in lists and tables in your spreadsheet by dragging and dropping columns to different rows, columns, or summary positions.
Creating neat, informative summaries out of huge lists of raw data is a common challenge, and while Excel gives you all the tools you need to create such summaries, the actual work of writing formulas, cutting and pasting information, and organizing your totals into a new table can be extremely tedious. Fortunately, Excel has a feature called pivot tables that can solve all these problems. Pivot tables quickly summarize long lists of data. By using a pivot table, you can calculate summary information without writing a single formula or copying a single cell. But the most notable feature of pivot tables is that you can arrange them dynamically. Pivot tables are a hidden gem in Excel. Many otherwise experienced spreadsheet fans avoid them because they seem too complicated at first glance. I have discovered that pivot tables are really just a convenient way to build intelligent, flexible summary tables, nothing more, and nothing less.
To read more on Pivot Tables and to see examples, please visit,
http://www.ozgrid.com/Excel/excel-pivot-tables.htm
Week 7 - Clear
0 comments Posted by Melinda Cooper at 11:24 AM Labels: Anti-Virus Programs, Week 7 ClearThis week was definitely Clear! I have to say I have had my share of computer “viruses”. According to many articles I read, computer viruses have always been surrounded by a mystery. With the majority number of viruses circulating the online world, people are always wondering where they come from or what they are. Viruses have the potential of causing a considerable amount of damage to your computer if your system is infected. The viruses themselves are written for one main reason; to reproduce. It does so by typically spreading from one computer to another. They are generally designed to cause damage by deleting data and performing malicious acts such as changing or inserting data on your computer. The threat of computer viruses is forever growing, which makes it ever more important that when you choose an anti-virus program for your computer, you choose the right one. There are many anti-virus programs out there. Of course some are more popular than others. That said popularity is not always essential. A few things I think that should being taken into consideration when choosing an anti-virus program for your computer are as follows; how frequently are virus definitions updated? Clearly, the more updated the virus definitions are, the better the chances are of you being able to prevent your computer from becoming infected. Secondly, does the software automatically update the virus definitions? Generally, there is nothing wrong with manually updating the virus definitions. However, since viruses tend to spread quickly, it is much better to have the virus definitions updated automatically. Having them updated automatically not only ensures that your virus definitions are being updated but it eliminates the possibility of you forgetting to manually update them. Thirdly, can you configure the software to check for updates whenever you go online? Your computer can become infected by a virus any time you go online, whether you are checking your email or just logging onto a website. The best way to protect your computer from viruses when you go online is to choose anti-virus software that can be configured to check for updates when you do go online.
http://frontpage.kmoraine.com/antivirus.asp
As you read, anti-virus software is almost a must if you own or are planning on owning a computer. There are tons of software programs out there. You just have to make sure you read the fine print, and then carefully select the one that fits your needs. There are of course free programs out there, but don’t expect them to be near as good as something you would purchase. Remember the Golden Rule, “you get what you pay for”. My advice is to make an investment when picking anti-virus software. It will save you a lot of heartache, time, and money in the future.
Web 2.0 Project from Mindy Cooper on Vimeo.
"Project" - Web 2.0
2 comments Posted by Melinda Cooper at 1:33 PM Labels: Up Up Away to Marriage, Web 2.0 ProjectI would be lying if I said this project was easy. I was a little skeptical at first, and to say the least I was very stressed! But when I actually started the project, it was fun! I started off by coming up with a topic. I thought what better to tell the story of my engagement vacation. From the balloon ride, to hiking in the Shenandoah Valley, to spending a romantic night with by future husband, this was a story that I wanted to share with my fellow piers.
This project definitely took some time. After much frustration I finally found my Web 2.0 tool I was going to use. I created my story in iMovie. This tool is pretty simple to use. Like any program, it took some getting used to. I chose Vimeo as my Web 2.0 tool and interaction method. It is basically like YouTube. Might I add, it was free and painless to use. I choose to create a separate blog as another interaction method as with Vimeo you have to have an account to comment. Further, I have also placed a Facebook widget as well as a Twitter widget; please click the interaction link at the bottom of this blog. These are both at the top of my Interaction Blog. I hope that some of you do comment through Vimeo, but if not please take a moment and create a post by clicking the link I have provided labeled Web 2.0 Interaction Method as well as taking a second to post it on your Facebook or Twitter.
I think that storyboards are a wonderful idea for the business community. One advantage of using storyboards in the business setting is that it allows the user to experiment with changes in the storyline to evoke stronger reaction or interest. The process of visual thinking and planning allows a group of people to brainstorm together. This fosters more ideas and generates consensus inside the group. I think that storyboards would be a great asset to any business venture.
My peer interaction feedback was right on point with what I was trying to convey. As Laura said, "what a sweet story" and that "we looked great together". That is exactly what I wanted to depict in my project. As for Paula's comments, "the story was wonderful and well planned", and "the photographs created a sequence of events to provide an emotional backdrop that lead to the big moment". I was thrilled with both comments as they were exactly the story I was trying to tell. I wanted to convey that getting engaged and the joys of marriage are one of the happiest times in your life, and that they should be cherished forever.
Web 2.0 Project
Web 2.0 Interaction Method
Muddy - Week 6
0 comments Posted by Melinda Cooper at 8:41 AM Labels: Computer Storage vs Computer MemoryComputer memory or computer storage; that is the magical question. As I watched the lecture on Storage, I was very surprised by the differences in memory and storage. I surprisingly found out that they are completely different. But all in the same, they are both very important, but in different aspects. Often times, computer memory and computer storage can be confused with each other, hence the reason my blog is “Muddy” this week. They are completely different components of computers with completely different purposes.
A computers memory is most commonly referred to as RAM. RAM stands for random access memory. Computer RAM is measured in megabytes and gigabytes. Most computers can handle between 1GB and 8GB of RAM memory. RAM is a simple computer chip that plugs into your computers motherboard. Computer memory’s purpose is for instant storage. Your computer needs instant storage to allow applications and processes to run up to speed.
http://en.wikipedia.org/wiki/Computer_memory
A computers storage is different from RAM in that it is permanent high capacity memory. Computer storage takes place within your computer’s hard drive. Computer storage and hard drive capacity is measured in gigabytes. The total capacity is 250GB. You can not store more than that unless you add more storage. Computer storage is used to store everything on your computer. Once something is in storage it will stay there until is manually deleted by a computer user. http://en.wikipedia.org/wiki/Computer_storage
To sum it up, computer RAM memory and computer hard drive storage work in combination with each other. For example, when you add a file or application to your computer, it is saved to the hard drive. Then when you go access that file from the hard drive, the actual process of using the application is then stored to the computer’s RAM. I hope you have enjoyed my crash course in computer memory and computer storage.
Clear - Week 5
0 comments Posted by Melinda Cooper at 4:53 PM Labels: Wireless Input Devices; Mice and KeyboardsWireless Input Devices
Input devices are not always glamorous. But there are a few pieces of equipment that definitely see more use. They also have more potential to affect your computing. Who says input devices have to be ordinary? A wireless mouse and keyboard not only provide the basic functionality that allows you to work with your computer, but also make your work much more pleasant. Wireless mice and keyboards are connected through infrared, radio frequency, and even Blue tooth. Infrared connections, reach the shortest distance. Radio Frequency connections have the longest range, and they also allow you to use your device practically anywhere. Blue tooth connection is similar to RF, but it only allows you to go approximately 30 feet.
The mouse is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. Physically, a mouse consists of an object held under one of the user's hands, with one or more buttons. It sometimes features other elements, which allow the user to perform various system-dependent operations, or extra buttons or features can add more control or dimensional input. The mouse's motion typically translates into the motion of a cursor on a display, which allows for fine control.
A keyboard is an input device, which uses an arrangement of buttons or keys. A keyboard typically has characters engraved or printed on the keys and each press of a key typically corresponds to a single written symbol. However, to produce some symbols requires pressing and holding several keys simultaneously or in sequence. While most keyboard keys produce letters or numbers, other keys or simultaneous key presses can produce actions or computer commands. In normal usage, the keyboard is used to type text and numbers into a word processor, text editor or other program. A computer keyboard distinguishes each physical key from every other and reports all key presses to the controlling software. Keyboards are also used for computer gaming, either with regular keyboards or by using keyboards with special gaming features, which can expedite frequently used keystroke combination's.
If you are interested in buying a wireless keyboard or mouse, I have attached a few websites, with some of my own recommendations. Happy Shopping! Or should I say Happy Mice and Keyboarding!! :)
http://www.fentek-ind.com/3m-mouse.htm
http://www.amazon.com/Microsoft-Wireless-Laser-Mouse-6000/dp/B000A6LSVY
http://www.officedepot.com/catalog/search.do?fkey=exu_qux953Xi8_eQXiupxop&Ntt=wireless+keyboard
Muddy - Week 4
0 comments Posted by Melinda Cooper at 6:59 AM Labels: Multimedia; What is Multimedia?Multimedia may be divided into linear and nonlinear categories. Linear active content progresses without any navigational control for the viewer. An example of this is a cinema presentation. Non-linear content offers user interactivity to control progress as used with a computer game or used in self paced computer based training. Hypermedia is an example of non-linear content. Multimedia presentation can be live or recorded. Multimedia presentations can be viewed in a variety of ways. It can be viewed on stage, projected, transmitted, or played on a media player or a similar program. Multimedia can also be used in advertisements, art, education, entertainment, etc. The list could go on and on. As we all know, multimedia is heavily used in the entertainment industry as well as in gaming world. For education, multimedia is used to produce computer based training courses and reference books like encyclopedias and almanacs.
Multimedia represents the connection of text, pictures, video and sound into a single form. The power of multimedia and the Internet lies in the way in which information is linked.
So, now I have a better grasp on what Multimedia really is. Who knew that such a simple concept could be so confusing? I have listed below some links that I found helpful in my quest to find the real meaning of Multimedia.
http://www.webopedia.com/TERM/m/multimedia.html
http://education.yahoo.com/reference/dictionary/entry/multimediam
http://www.jhepple.com/MultiMedia/whatsmultimedia.htm
Creating an Avatar
0 comments Posted by Melinda Cooper at 4:38 PM Labels: My Avatar, My own speaking Avatar![]()
Creating an Avatar; what a fun project! I started off with creating a speaking Avatar. That was so much fun, I created another Avatar. One that in my opinion resembles the way I actually look. This was a very fun experience. You can get caught up in creating and Avatar for hours. From picking your hair style and color, picking your outfit, then to what you were going to say, and lastly the background. This was a very easy process. You had too of course create an account; but let me tell you if was so simple. Once you create the account, you activate it by clicking the email link they sent you. Once you did that, you were on your way to creating your own Avatar. You will see on my blog homepage, the Voki Avatar in the right upper hand corner, and my other Avatar on the actual blog. I hope you enjoy looking at them as much as I enjoyed creating them. If you haven't done so, I encourage you to take a few minutes (or hours), to create an Avatar. It will give you a nice break from studying!
Clear - Week 3
0 comments Posted by Melinda Cooper at 3:24 PM Labels: The Internet; what we should all knowSo we are coming to an end of week three (3). For this week, one of the things we learned about was the Internet. I am happy to say, this is a concept that I am pretty familiar with. One thing that I thought was very important in this weeks lesson, was how to find information on the Internet.
To find most of your information, you should utilize a search engine. A search engine is a web service that uses web robots to query millions of pages on the Internet and create an index of those web pages. You can then use these services to quickly and easily find the information they may be looking for. When searching for information on the Internet, there are a few things you should keep in mind. You should put quotations around your searches. For example if you are searching for multiple common words such as computer and help, it is a good idea to place quotes around the full search to get better results; i.e. "computer help". Another good thing to remember is be aware of stop words. Many search engines will strip out common words they refer to as stop words for each search that is performed. For example, instead of searching for why does my computer not boot, it'd search for documents with computer and boot. Further, you should familiarize yourself with Booleans. Many search engines allow Booleans, which can prevent results you many not want from being displayed. Your most common booleans include "and" / "or".
You should always know what features are available on the internet. See this Google tips section for additional tips and features you may not be aware of.
http://www.riches.com.au/articles/internet_search_tips.htm
Lastly, always try multiple search engines. Not all search engines contain the same information. For example, you could try using a Meta search engine, such as www.dogpile.com. A meta search can give you a fair picture of what's available across the Web and where it can be found, thus reducing your search time.
So, it is the middle of week two (2). I learned a multitude of things this week, but one that stuck out in my mind was computer literacy. Computer literacy is something that you probably hear very often in today’s world. The meaning of computer literacy has gone through many different definitions.
See, http://communication.ucsd.edu/bjones/comp_lit_paper.html; this is a term paper I found on the Internet. It is a very interesting read!
In the early days of computers, if your employment didn’t force you to work with a computer, you probably didn’t deal with them very much, or for that matter care anything about them. Nowadays, even your own grandmother can compose and send an e-mail. Since computers are now such a common thing in most households, the definition for the term computer literacy can be defined as anyone who has a basic understanding of their computer and can effectively use it to their advantage.
It’s safe to say that today, a majority of our society is computer literate. I think it is also safe to say that most people don’t have any formal training about computers, but can relatively learn a great deal of knowledge about computers with some hands-on experience. Even most kids these days are introduced to computers at a very early age. Further, many of our elders have been introduced into computers through their younger generations. I would agree that computer literacy is a valuable tool in today's fast paced society. I think that it is very important for people to be exposed to computers at a very early age. Computers are our future, not a fad that will eventually go out of style. As I am sure you will agree, computers should be a required course in grade school, just like english, math, and science. To function in society today, if you don't have a computer background or have some sort of computer literacy, you are *screwed*.
So, as you can see, knowing how to use a computer effectively is a very important tool in today’s world. You may be a student typing a research paper, a manager planning the company budget, or just someone who wants to send an e-mail. It seems that computers are here to stay whether we are ready or not. There are various sites on the Internet that have good *old* and *new* knowledge about computer literacy. My advice to you is to take a moment and read about computer literacy. You just might learn something *new*.
Clear - Week 1
0 comments Posted by Melinda Cooper at 3:53 PM Labels: Netiquette = Network EtiquetteDuring week one (1) I learned a variety of things. One that stuck out was Netiquette. I ask, what is netiquette? We can simply say it is network etiquette. It is the etiquette that we use on the worldwide web or as we know it, cyberspace.
Netiquette is a set of rules for behaving and interacting properly online. Netiquette is important because cyberspace has its on culture. Cyberspace doesn’t have explicitly stated rules. To most people they are the unknown or unstated rules. Unless you know the rules you are sure to violate them. If don’t know them you might very easily offend someone. Let me give you a crash course in Netiquette. Probably the most important is, when you type an email or type a blog, don’t type in all caps. IF YOU TYPE IN ALL CAPS, it looks like you are shouting at the person you are writing to. Instead try using *asterisks* to get the point across. Another good rule is to be careful when using sarcasm and humor. You can use emoticons to express humor, i.e. :) would be a happy face, and :( would be a sad face. So, you get the point. Also, a good rule is when talking about a book try using _underscores_ to express the title. So, I have shown you three (3) good rules when it comes to Netiquette.
To learn more Netiquette rules, visit http://www.albion.com/netiquette/corerules.html.
Netiquette operates under a system of rules that may not be plainly stated but are expected and enforced all the same. When you enter any new culture you're sure to commit a few social blunders unless you know the rules. Also, you might offend people without meaning to. Or you might misunderstand what others say and take offense when it's not intended. The rules in cyberspace are essentially different than those of everyday life because cyberspace presents such a story like environment. To make matters worse, the common sense of communicating in cyberspace make it easy to forget that you're interacting with other real people.
So, next time you go to type an email, type an instant message, or even write a blog, look over the rules of Netiquette. Make sure you don’t commit the faux pas like a lot of other people do. Make sure you follow the rules of cyberspace. I have listed a few other sites below that I found interesting when learning about Netiquette; I hope you do the same! I am confident we will all follow the *rules* next time we write in cyberspace :)
http://internet.suite101.com/article.cfm/netiquette_guidelines
http://en.wikipedia.org/wiki/Netiquette
http://networketiquette.net/

My name is Melinda Cooper. I live in Jax with my husband Justin and 2 dogs, Turbo and Lance. We have lived in the area going on 5 years now. Justin is stationed at NS Mayport as a helicopter pilot. Being a Navy Wife is not always easy, but believe it or not it is very rewarding. It is an honor that my husband loves his country and serves for it everyday. I don't think we would have it any other way.
About 3 years ago, I decided that I wanted to finish my bachelors degree. With a little research I found UF's online business program. It was truly a blessing. I had to attend FCCJ to do some pre-requisites before applying, but after completion in May of 2009, I applied. Guess what, I got in! I am now in my second semester and I love it. A little stressful at times, but all in all, I wouldn't have it any other way.
Unfortunately things aren't cheap, so I have a day job. I am a paralegal for a DUI defense firm here in Jax. 90% of what we do is DUI defense. I am proud to say that we are probably one of the only firms in the state of Florida that does this and are very successful at it. Look us up on the web; http://www.flduidefense.com/. It has definitely opened my eyes up to a whole new world. I enjoy my job very much, but am excited to see what new adventures are ahead of me after graduating.
Hello to all my ISM mates! I have to say that I am new to blogging. I have always wanted to do a blog, but never spent the time to create it. I guess it is a good thing I am forced to create an account. It will hopefully get me in the habit, so after the class I will continue with it. I wish everyone good luck in!
Enjoy the class!
Melinda



