Category: Education

Why is the Bathroom on a Ship Called The Head?

Have you ever wondered why the bathroom on a ship is called the “head?” Here is the answer.

Things You Might Not Knows About Old Sayings

A SHOT OF WHISKEY In the old west a .45 cartridge for a six-gun cost 12 cents, so did a glass of whiskey. If a cowhand was low on cash he would often give the bartender a cartridge in exchange for a drink. This became known as a “shot” of whiskey. BUYING THE FARM During …

Continue reading

Palomar Observatory

Saturday I went for a drive to the Palomar Observatory. Prior to going I checked online to see what their hours of operation are and it showed from 9:00 AM-4:00 PM. After driving over there I got all the way to the gate just to find out the observatory was closed for a special event. …

Continue reading

Political Quotes From Famous People

1. In my many years I have come to a conclusion that one useless man is a shame, two is a law firm, and three or more is a Congress. -John Adams 2. If you don’t read the newspaper you are uninformed. If you do read the newspaper you are misinformed. -Mark Twain 3. Suppose …

Continue reading

Venus Fly Trap Eats Crickets

For the first time in my life I have a Venus Fly Trap for an office plant. Yesterday I was thinking that I want to see my plant eat some bugs so I did a little Internet search and found out that I can buy baby crickets from any Petco store. After work I drove …

Continue reading

Brief California History Lesson

Do you know what happened 166 years ago this summer…September 9th, 1850? California became a state! The people had no electricity, the state had no money and almost everyone spoke Spanish. There were gunfights in the streets. So basically nothing has changed except back then the women had real tits and the men didn’t hold …

Continue reading

Historical Old Photos in Color

Henry Ford, 1919 Cornell Rowing Team 1914 Brothers Robert Kennedy, Edward ‘Ted’ Kennedy and John F. Kennedy outside the Oval Office. Sophia Loren and Jayne Mansfield Two Boxers after a fight Brooklyn Bridge in 1904 Louis Armstrong plays to his wife, Lucille, in Cairo, Egypt 1961 An Oklahoman farmer during the great dust bowl in …

Continue reading

Juan Rodriguez Cabrillo Monument

Drove over to Point Loma in San Diego, California today to see the Cabrillo National Monument and take some photos to document my experience. Prior to going here I knew absolutely nothing about Juan Rodriguez Cabrillo and his monument. Now I know that Cabrillo, a navigator sailing under the flag of Spain, landed at San …

Continue reading

Interesting Bits of Knowledge

Glass takes one million years to decompose, which means it never wears out and can be recycled an infinite amount of times! Gold is the only metal that doesn’t rust, even if it’s buried in the ground for thousands of years. Your tongue is the only muscle in your body that is attached at only …

Continue reading

Sea Life Aquarium Carlsbad, California

One of the attractions as part of Legoland in Carlsbad, California is the Sea Life Aquarium. Here are some of the photos I took while I was there.

Point Loma Nazarene University

Drove over to Point Loma Nazarene University today in San Diego, California. Here are some of the photos that were taken around there. The thing that is so spectacular is the location. The university is overlooking the Pacific Ocean near the sunset cliffs. The views are just stunning and some of the architecture is neat …

Continue reading

Matsumoto Castle, Japan

Went to Matsumoto Castle located in Nagano Prefecture on the Island of Honshu, Japan. This was quite the experience and it was spectacular to be able to see the castle both on the inside and out, but also the panoramic views of the mountains and the city that was built long after the castle. Some …

Continue reading

Holland Michigan

Traveled over to Holland, Michigan today and took some photos of the windmill and the interesting things there, here are my photos of that experience. Many people may not know it, but one of the working windmills was taken apart from Holland in the Netherlands and shipped to Holland, Michigan in the United States where …

Continue reading

Hell Explained by a Chemistry Student on an Exam

Bonus Question: Is Hell exothermic (gives off heat) or endothermic (absorbs heat)? Most of the students wrote proofs of their beliefs using Boyle’s Law (gas cools when it expands and heats when it is compressed) or some variant. One student, however, wrote the following: First, we need to know how the mass of Hell is …

Continue reading

Student Who Obtained a 0% on an Exam

Q1. In which battle did Napoleon die? * his last battle Q2. Where was the Declaration of Independence signed? * at the bottom of the page Q3. River Ravi flows in which state? * liquid Q4. What is the main reason for divorce? * marriage Q5. What is the main reason for failure? * exams …

Continue reading

Where did Piss Poor Come From?

They used to use urine to tan animal skins, so families used to all pee in a pot & then once a day it was taken & sold to the tannery… if you had to do this to survive you were “Piss Poor.” But worse than that were the really poor folk who couldn’t even …

Continue reading

1895 8th Grade Final Exam

What it took to get an 8th grade education in 1895… Remember when grandparents and great-grandparents stated that they only had an 8th grade education? Well, check this out. Could any of us have passed the 8th grade in 1895? This is the eighth-grade final exam from 1895 in Salina , Kansas , USA . …

Continue reading

Sequoyah Birthplace Museum

Today I went to the Sequoyah birthplace museum near Vonore, Tennessee. This was a very interesting museum because it talked about Sequoyah and the Cherokee Indians. In the museum they talked about the Trail of Tears which relocated the Cherokee indians from Tennessee to Oklahoma. There was all sorts of artifacts and information. Here are …

Continue reading

What is the main ingredient of WD-40?

Before you read to the end, does anybody know what the main ingredient of WD-40 is? Don’t lie and don’t cheat. WD-40. Who knew; I had a neighbor who bought a new pickup. I got up very early one Sunday morning and saw that someone had spray painted red all around the sides of this …

Continue reading

Topsy Turvy

I bought one of those Topsy Turvy’s like what you see on T.V. It looked like an interesting design and I wanted to see how well it worked. I planted some tomatoes in it and kept it watered very nicely. The cool thing about this design is that you are taking the dirt out of …

Continue reading

Management Challenges

[Abstract] The purpose of this document is to describe what types of management challenges can be incurred based upon a scenario of Kucera Clothier‚ introducing a collaboration system into their organization. Also included within this document are methods that can be used to manage change with expectations of other personnel. This document is intended for …

Continue reading

Security Concerns of a Collaboration System

[Abstract] The purpose of this document is to analyze the collaboration system that is to be migrated into the Kucera Clothier‚Äôs company and identify security concerns with the system, as well as, identify methods to minimize the risk of an incident of unauthorized access to company information. This document is intended for anybody looking to …

Continue reading

Problems Incurred When Implementing New Technology

[Abstract] The purpose of this document is to describe what types of problems are most likely to be incurred while implementing a technology into an organization, such as the collaboration system into the organization for Kucera Clothiers scenario. Also included within this document are recommendations for how the problems can be resolved. This document is …

Continue reading

Collaboration System

[Abstract] The purpose of this document is to provide an implementation and management plan, as part of a scenario, for implementing a collaboration system into Kucera Clothiers. Included within this document is a definition of the organizational goals or communication issues the collaboration system will resolve. Also included within this document is an explanation of …

Continue reading

Project “Phasing In”

[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …

Continue reading

Problems a Business Can Incur

[Abstract] The purpose of this document is to describe what types of problems are most likely to be incurred while implementing a technology into an organization, such as the collaboration system into the organization for Kucera Clothiers scenario. Also included within this document are recommendations for how the problems can be resolved. This document is …

Continue reading

Scenario Proposal of a Server Cluster

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

Proposed Server Cluster for Scenario Business

[Abstract] The purpose of this document is to provide a proposal for a server cluster that will be introduced to Kucera Clothiers. This proposal is based upon a scenario of Kucera Clothiers is looking to improve communications between their corporate headquarters that is located in Chicago and its 3,500 other locations throughout the world. Kucera …

Continue reading

“Phase In” Equipment into Business Operations

[Abstract] The purpose of this document is to explain the term ‚Äúphase in‚Äù and how it relates to phasing in a server cluster. Also included within this document is an explanation of what type of risk analysis needs to be conducted in order to phase in the cluster. This document is intended for anybody looking …

Continue reading

Analyze Trends and Technologies

[Abstract] The purpose of this document is to analyze trends and technologies based upon the recommendation I made for a company to utilize a collaboration system in order to improve communications throughout their organization. The recommendation was made based upon a scenario of a company called Kucera Clothiers whose IT strategy was to improve IT …

Continue reading

Business Trends

[Abstract] The purpose of this document is to describe two different business trends and determine if current business trends have a positive or negative affect on the company by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy of …

Continue reading

Strategic Information Management in Corporate Strategy

[Abstract] The purpose of this document is to critically examine the role of information management in corporate strategy by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three …

Continue reading

Strategic Information Management

[Abstract] The purpose of this document is to provide a basic understanding of managing information systems by utilizing a scenario of a store that has multiple sites and locations to deliver products in a fast and efficient manner. The corporate IT strategy is to improve IT communications throughout the organization. There are three projects under …

Continue reading

Cyber Crime Offenders

[Abstract] The purpose of this document is intended to discuss motives, opportunity, and means of typical cyber offenders. Also included within this document are three different reasons of why some cyber crime offenders are prosecuted, while others are not. This document is intended for anybody looking to gain a basic understanding of why different people …

Continue reading

Justice System and Forensic Investigators

[Abstract] The purpose of this document is to discuss three elements of the United States justice system and how they relate to a forensics investigator. This document is intended for anybody looking to gain a basic understanding or knowledge of how the justice system applies to forensic investigators. [Content] Since the advent of the Internet …

Continue reading

Software Applications Forensic Investigators Use

[Content] In the realm of computer forensics, there are many different software applications and hardware that digital forensic investigators need to use to find evidence against a crime that was committed, protect the evidence so that it maintains its integrity, and then present the evidence that was found. The vast majority of software applications that …

Continue reading

Hashing Algorithms and CRC Uses

[Abstract] The purpose of this document is to provide a basic understanding of how hashing algorithms and cyclic redundancy checks can be used for evidence, authentication, and filtering. This document is intended for anybody looking to gain a basic understanding or knowledge of how forensic investigators find evidence to be used in a court of …

Continue reading

Hostile Code and Forensic Investigators

[Abstract] The purpose of this document is to identify five different examples of hostile codes and how they impact information systems. Also included within this document is an explanation of how forensic investigators should find the sources of hostile code. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Areas Digital Forensic Investigators Find Evidence

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five areas in computers and computer applications a forensic investigator can look for digital evidence. Also included within this document are three types of criminal investigations that can utilize the services of computer forensic investigators. Lastly, a description …

Continue reading

Challenges Forensic Investigators Face

[Abstract] The purpose of this document is to provide a basic understanding of computer forensics by identifying five technology-related challenges that digital forensics investigators are faced with. Also included within this document are solutions to resolve each of the challenges. This document is intended for anybody looking to gain a basic knowledge or understanding of …

Continue reading

Internet Protocol Security (IPsec)

Abstract The purpose of this document is to provide a basic knowledge and understanding of the Internet Protocol Security otherwise known as IPSec to include additional protocols that are used as part of the IPsec suite. This document is intended for anybody looking to gain a basic knowledge and understand of what IPSec is and …

Continue reading

Pretty Good Privacy

Abstract The purpose of this document is to provide a basic understanding Pretty Good Privacy (PGP) and how it applies to message security. Also included within this document is an explanation to provide a basic understanding of what functions PGP performs to ensure a message is secured. Finally this paper explains why the first two …

Continue reading

Digital Signature Properties

Abstract The purpose of this document is to explain specific properties that a digital signature should have. This document also provides an explanation of the differences between direct and arbitrated digital signatures. Lastly this document explains what a suppress-replay attack entails. This document is intended for anybody looking to gain a basic understanding or a …

Continue reading

Message Authentication

Abstract The purpose of this document is to define message authentication, as well as, to identify different types of attacks that message authentication was designed to protect against. This document is intended for anybody looking to gain a basic knowledge or understanding of message authentication. Content A Message Authentication Code (MAC) is a short piece …

Continue reading

Public-key Directory

Abstract The purpose of this document is to explain the four key elements to a public-key directory. Also included in this document is an explanation of what a public-key certificate is. This document is intended for anybody looking to gain knowledge about public-keys and public-key certificates. Content When working with the public-key cryptography there is …

Continue reading

Public-key Cryptography

Abstract The purpose of this document is to provide a basic understanding of public-key cryptography. Also included within this document is a description of the basic components to the public-key cryptography system. This document is intended for anybody looking to gain a basic understanding or knowledge of public-key cryptography. Content When the Internet was first …

Continue reading

Data Encryption Standard and 3DES

Abstract The purpose of this document is to explain how Data Encryption Standard (DES) works and why 3 DES is now used. Also included within this document is an explanation of why the middle portion of 3DES is a decryption instead of an encryption. The last item talked about within this document is a nonce …

Continue reading

Link and End-to-End Encryption Techniques

Abstract The purpose of this document is to provide fundamental differences between link and end-to-end encryption techniques. Also included within this document is a description of traffic padding and what its fundamental purpose is. The last item that can be found within this document is a description of differences between a session key and a …

Continue reading

Encryption Techniques

[Abstract] The purpose of this document is to analyze cryptographic transposition techniques by showing a few examples of some different techniques. The next portion of this document is to provide an answer to the question ‚ÄúIs it possible to decrypt the message that was encrypted with a two-stage transposition technique with a different key?‚Äù The …

Continue reading

Business Continuity

[Abstract] The purpose of this document is to provide a basic knowledge of how having a business backup plan can maintain business continuity. Also included within this document are guidelines to maintain business continuity and an explanation of some consequences for not following the business continuity guidelines. [Content] When the September 11th attacks on the …

Continue reading