Today's schedule is C-D-A-B
C Block Law 9/10 - Today we'll start with our profile of the typical computer hacker here at Vanier. I'll show you some information about hackers to add to your profile.
From the article Psychological Profile of Network Intruder by Dragan Pleskonjic, Veljko Milutinovic, Nemanja Macek, Borislav Djordjevic and Marko Caric
A hacker is defined as a person who knowledgeably use computer to avoid rules and restrictions. All kinds of network intruders can also be called hackers. A simple conclusion can be made - hacking is about respect, reputation and acknowledgment. Any individual might be tempted to believe that hackers are very altruistic, do serve the environment and are socially engaged. Hackers try to solve interesting problems, and they learn to keep score primarily by what other hackers think of their skill.
Hackers are more or less anonymous so it is not easy to provide detailed information about their activity and motivation. Does the very fact that they spend much time using computer for activities not considered to be scientific but yet involving curiosity, suggests their personality? Is the choice of their interest caused by their inner disharmony? Regarding the amount of damage they caused, rough answer would often be yes! However, we should emphasize once again that it difficult to properly classify all those invading network systems.
• most of computer users are white males aging 12-28 years
• most of hackers have a good repertoire of social skills
• the term middle-class is meaningless, for most computer users considers themselves members of middle-class
Intrusion in the network system requires skill, creativity and very often the ability to deceive other people. It can be classified as a mixture of computer skills and psychology. In any case, it would be person who uses the secrets of his trade to make all kinds of manipulations. It does not necessarily mean that he deceives everybody and everyone, but it definitely means that in many situations he feels relieved of moral responsibility for his actions. Moreover, he would often justify them. Hackers are likely to practice their profession until the age of thirty after which time most of them willingly leave such way of life. This comes in support of a profile of typical young burglar who is not critical enough of his actions. The fact that they are young and reckless, however, cannot fully justify such behavior A hacker is particularly inspired by the opportunity to commit a crime of theft without being physically present. Even the reward can come by itself. The ones who steal are called thieves. The ones who cause damage to the property are called destructive.
After we'll watch a Criminal Minds episode P911. From TV.COM...
A young boy who had disappeared a year ago turns up for sale by a child pornographer on an online auction. A former profiler who now heads the FBI's Innocent Images Unit asks Gideon and the BAU to help her save the boy's life. We'll try to make sense of the profile that the BAU creates at the end of the episode.
D Block Social Studies 11 - Today we'll start by finishing the Prime Minister activity that we started in yesterday's class. We had three partner groups present John Turner, Lester B. Pearson and Sir Wilfred Laurier and we'll finish our quick presentations today. After, I'll give you the rest of the class to work on a "Job Wanted" advertisement for the Prime Minister of Canada. On your wanted ad you will need to include:
- Job description (role and powers that the PM has)
- Job requirements (expectations and necessary capabilities)
- Preferred personal characteristics (choose five qualities of leadership that we discussed and explain what they mean for a PM) and
- Symbols (of Canadian identity)
A Block Criminology 12 - Today we'll look at a Power Point on crime trends and patterns and you'll see that there are 3 ways we collect crime data (UCR, PRVS, Self Report surveys). We'll also look at patterns and see that the crime rate follows the population of young males in society (the more young males the higher the crime rate and vice versa). When we finish, I will have you work on questions 2 and 4 from page 51 in the Criminology: The Core textbook. We'll work on that for the first half hour or so and then we'll watch the Law & Order: Special Victim's Unit episode "Closure" This episode deals with the short and long-term effects of a sexual assault on a victim.
From TV.com "Benson does her best to help a rape victim who is able to describe her attack in perfect detail, yet unable to properly identify her attacker when push comes to shove. When the detectives revisit the case a few months later, they find the woman even less willing to talk about what happened, as she claims she has moved on." I want you to think hard during this episode and pay careful attention to what happens with Harper's character.
What are the short and long term impacts on victims of Crime? Use Harper in the Law & Order episode you watched today and Chapter 3 pages 54-7 in Criminology: The Core textbook to help. This will form the basis of your blog entry on Monday.
B Block Geography 12 - Yesterday we looked at magma, igneous rocks, and plutonic (intrusive) igneous rock features (both concordant and discordant). Today we will focus on sedimentary and metamorphic rocks. We'll take down a cross section diagram of the geology here in south western British Columbia. We'll collectively define compaction, cementation, recrystallization, clastic sedimentary rock, and non clastic sedimentary rock. We will define contact, regional, and dynamic metamorphosism and you'll have question 15 from page 366 in your Geosystems text for homework.Check out the Dynamic Earth Interactive Rock Identification site here
Check out the Flash animation of Metamorphic Rock Creation here
Pau Hana Ohana.
No comments:
Post a Comment