Tuesday, June 29, 2010

Why the wedding ring should be put on the fourth finger?

First, center fingers bended and put together back to back. Second, the rest 4 fingers tips to tips.

Try to open your thumb, the thumb represent our parents. It can be opened because all human does go thru sick and dead; in which our parents will leave us one day.

Now close your thumb and open your second finger. It represents our brothers and sisters, they do have their own family but they too will leave us one day.

Now close your second finger and open up your little finger. It represents our children who sooner or later, they too will leave us for they got their own life to live.

Finally, close your little finger and try to open your fourth finger where we put our wedding ring.You will be surprise to find out that it cannot be opened at all!

Why, because it represents husband and wife, the whole life that you will be attached to each other. Real love that will stick together forever and ever!

Thumb represent parents Second finger represent brothers & sisters Center finger represent own self Fourth finger represent your partner Last finger represent your children.

Friday, June 25, 2010

Best Dad! Cake

Before we opened the box, I said "No thanks, it's just another chocolate cake from Red Ribbon." Flip one side down, and another, and another , and another, and finally the top. Wow! Simply unique! chocolate cake surround by sweet icing! Gi picture gyud nako before we ate.
RR Fathersday Cake 2
The icing is very very very sweet. Too sweet for me. Thank you to the person (one of my father's patients) who gave this! (not to me, my father). My favorite part: Buttons!

Ten Commandments of Computer Ethics

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people's computer work.

3. Thou shalt not snoop around in other people's files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not use or copy software for which you have not paid.

7. Thou shalt not use other people's computer resources without authorization.

8. Thou shalt not appropriate other people's intellectual output.

9. Thou shalt think about the social consequences of the program you write.

10. Thou shalt use a computer in ways that show consideration and respect.

Computer Science Assignment June 23, 2010

Internet Hoax

An internet hoax is a deliberate attempt to deceive or trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.

Spam

Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam.

Virus

A virus is a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer; "a true virus cannot spread to another computer without human assistance"

Trojan

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology.

Spyware

Computer programs that typically track your use and report this information to a remote location. The more malicious spyware programs may capture and report keystrokes, revealing passwords and personal information. Users are often tricked into installing spyware programs without their knowledge. Spyware is sometimes referred to as adware.

Adware

Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

Thursday, June 24, 2010

Foundation Day

Happy Foundation Day! No classes (yes!), fun games (is it?), & sorting. Honestly, I not happy because there are some games, but because there are no classes. I am a member of the green league but since I am an SCS officer, I am forbiden to join activities by the leagues. I wish I can help them (thru cheating), but i simply can't. I am looking forward to the games which I may facilitate (boring!). Pisay's foundation day is fast approaching. Pisay Rockz!

Me

Hello! As way of introduction, my name is Patrick Noel Z. Genio, a.k.a Rick. I am a 3rd year high school student at Philippine Science High School-Central Mindanao Campus.

I am hopeful that I can be an example of being able to just keep trying. Being here in Pisay can be a real challenge, well I have some experience. I hope to encourage you, or help you (if I can) in some way. I will also try to encourage you to enroll here at Pisay.

I hope to hear from the community. 1 w!11 +ry my b3$+ +0 4v01D +yp1n6 1!yk 4 j3j3m0n $+4r+1n6.... NOW!

Please feel free to visit here. Will blog you soon!!

-Patrick Genio-