modern technology

24
Modern Technology RIDING THE WAVE The new app that might change the internet as we know it Email Dangers How To Make Rock Candy School Technology By Eric E. How to... Pranks and ideas that you can do at home Upgrade The new comput- ers that are chang- ing education SCP Wiki The ultimate cata- lauge of horror. Rubber Band Reform The terror of the class room. These weapons in school that are getting more and more advanced. Students weigh in on what they think about the rubber band wars Upgrade The new comput- ers that are chang- ing education

Upload: lasa-e-zine

Post on 10-Mar-2016

216 views

Category:

Documents


2 download

DESCRIPTION

A magazine on making and interacting with the latest technology.

TRANSCRIPT

Modern TechnologyRIDING THE WAVE

The new app that might change the internet as we know it

Email Dangers How To Make Rock Candy School Technology

By Eric E.

How to...Pranks and ideas that you can do at home

Upgrade The new comput-ers that are chang-ing education

SCP Wiki The ultimate cata-lauge of horror.

Rubber Band ReformThe terror of the class room. These weapons in school that are getting more and more advanced. Students weigh in on what they think about the rubber band wars

Upgrade The new comput-ers that are chang-ing education

Modern Technology P2P2

Bad Kindle17

Riding The Wave

12

The new fad of E-Books might not be quite as good as originally thought.

Rock Candy20Create a delicious treat which takes little effort or time on your part.

How to...22Have fun with your freinds at the office by pulling off some of these pranks.

Ruber Band 8The advancement of school weaponry is affecting class-rooms around the nation.

Upgrade10Computers are being re-placed around the school, but is this a good thing?

SCP Wiki16A reveiw on a fun website that is good for a small scare or just for amusement.

School Tech4Is the ban on most electron-ics by the administration really helping students?

Email Dangers6What are dangerous emails and how should deal with them?

Google’s latest project is a mixture of IM, Twitter, and email that is poised to revolutionize the inter-net. But how much of the hype is justified? Eric E. explores the latest from a company attempting to change the way we live.

Modern TechnologyCONTENTS FEATURES//

P2 P3P2 P3

Modern Technology

Benjamin G. Ben is a Freshman at Lasa High School. He was born and raised in Austin, Texas. He en-joys reading magazines such as Popular Sci-ence and Wired. He also likes to build things and play video games in his free time or hang out with freinds. He prefers Google to Yahoo and MLIA to FML. He likes Thai food and en-joys going to rock climbing twice a week.

Danish H.Danish is one half nerd and one half mon-key. He enjoys playing sports such as basketball, football, and cricket. He also likes to watch funny videos and hear good jokes. He prefers Google to Yahoo and even though doesn’t read either of them, he has been told that MLIA is better then FML.

Eric E.Eric E. is a freshmen at LASA high. He en-joys games of all types, movies, martial arts, writing, reading, and not wearing shoes. Unfortunantly, the administration forces him to wear shoes. FASCISM! REBEL AGAINST THE PRO-SHOE GOVERNMENT! Also, he likes prog rock, and is totally not an alien.

P4Modern Technology P4

Whenever I walk into school I have to stop take out any electronic devices. I might have an iPod or cell phone and make sure that they are all off. Then, once I go into the build-ing, I have to make sure that they stay completely out of sight and no admin-istrator ever sees them or else they will be taken. It feels as if we will be pros-ecuted if we try to do any thing relating to a person-al electronic device. Many modern day websites and electronic devices have been banned from our everyday life at school. Some of these resources could be very useful when you need to look up materials on many unconventional topics. Our technology use should not be limited to only those technologies which a select few deem accept-able. In the modern world we will need to know how

to use all types of tech-nology, not just the ones which the school board thinks we should use. Many would say that the allowance of many websites would allow students to look up inap-propriate or non-educa-tional materials. The easy way to remedy this is to just have a teacher who is willing to monitor the students when they are let on the computers. There are also systems so that a system administra-tor can view what all of the students are doing.Then, the administrator can take over computers which are not being used correctly (like playing a game) and teach the us-ers how there is a proper time and place for what they want to do. Cell phones and other electronic devices can be used for a quick bit of research or to access files

We use it every day and it shapes our lives. We center our lives around technology, but it has been banned in school. These technologies can and should be put to good educational use, so why not?

and information when a computer is not avail-able. Not one freshman core classroom in LASA High school (math, biol-ogy, English, and geogra-phy) has a computer for student use. Many of the classrooms would benefit from the ability to use the Internet or print out documents from personal electronics. In an article by the Center on Media and Child Health, more than 80 percent of teens have cell phones. All of these cell phones could be used for educational purposes such as look-ing up information when a computer is not easily accesible, and keeping an organized day planner. Instead they have been banned and made an item which you could be fined for having. Many items that have been banned can be used for learning and

School Technology

Benjamin G.

P4P4 P5

education if the correct materials are given to the students. Accord-ing to a study published on PubMed by Shih YN, Huang RH, and Chiang HS, college students who listen to music before a test do significantly bet-ter than those who did not listen to music. Ac-cording to another sur-vey by Ipodnn.com, 92 percent of teens own and use an MP3 player. Many schools and school district have banned listening to music on these. The study on PubMed, I previously stated, shows that not only does listening to music not harm the students, it actually helps them. Many websites such as Gamefaqs and Gamespot (both review sites that do not actually provide on-line gaming) have been blocked regardless of content but just depend-ing on the name. Many

of these websites could be used for educational purposes but have been blocked by the harsh and unforgiving AISD firewall. 17 out of 21 students in Ms. Richey’s (an Elec-tronic Magazine teacher at LASA) class say that they have tried to access a web-site for educational pur-poses before, but it has been blocked. This large percentage of students is present in most if not all freshman classes at LASA. Technology helps stu-dents learn so the obvi-ous thing to do would be to allowed personal elec-tronic devices in schools under certain conditions. IPods and other MP3 play-ers should be allowed in school but the use of them should be controlled and regulated by the teachers of students’ classes. The teacher should allow cell

phone use when necessary or useful. Websites that have been blocked should be accessible with a teach-er password. Technology is gener-

ally looked down upon by the school district, but much of the banned tech-

nology has good uses in education. Even though technology has been banned in schools, it is present in the real world and should be taught about in schools. It should be used to give students experience with the tech-nology so they are ready for the real world. In the real world, there will not be bans on cell phones or IPods, so we should learn to work with them rather than only use them at certain times when admin-istrators believe it is good for us.

“Technology is gener-ally looked down upon by the school district

but much of the banned technology has uses in”

Modern Technology P6P6

Don’t worry, I’ve felt like answering some of those or following the instructions and send-ing them to contacts, too. To tell the truth, every teenager has probably felt this urge. The important thing is not to forward them. I will tell you from personal experience that chain mails can be ex-tremely annoying and can be harmful. According to snopes.com there are actually many types of dif-ferent emails that you might want to reply to.

TYPES OF HARMFUL EMAILS

1. Give you money (pyra-mid schemes)- These come in saying that you have to send $5 to the person at the top of the list. Then remove his name, put yours at the bottom, and move the list up. Basically, each time someone sends the list your name will move up until you get to the top, when you will get $5 from those be-neath you. Now one side will say these will help you gain quick money, but I say there are a lot of problems that may occur. First of all, there can be dishonesty. Anybody can put

their name at the top, or not give the $5 before forward-ing the mail. Secondly, there are not enough people. According to the U.S Security and Exchange Comis-sion, if there were just 13 levels in this, there would be 13,060,694,016 participants. This is already more than the world population. Most importantly it is illegal. “Ti-tle 18, section 1302 of the US Postal and Lottery Laws actually states that chain letters (email or otherwise) are

a message electronically to everybody on your con-tact list. The adrenaline rushes through your body because you know you just have to wait now. Just wait until your wish is granted. Just wait and you will get $10,000 dollars. Just wait and get the girl of your dreams. Just wait…

CLICK! IT’S AS

EASY AS THAT.

JUST BYPUSHING

YOUR FINGER DOWN, YOU’VE FOR-WARDED

By Danish H.

Email Dangers

P6 P7P6 P7

illegal ‘if they request money or other items of value and promise a substantial return to the partici-pants.’” -BreakTheChain.org 2. Give you luck or avoid-ance of misfortune-According to Snopes.com, these letters gener-ally follow this structure:Invocation: The letter begins with telling you to pray or kiss someone as a sign of love.Origins: A description of the per-son who began the letter is given.

Success Story: Lists the hap-py stories of people who followed instructions are given, with their rewards described in detail. Per-sonally speaking, these are very unrealistic.Punishment Story: Accounts are given of the setbacks or tragedies people who ignored the letter had.Instruction and Promise: You are told how many copies of the letter to send and are reassured of luck. I know that everyone has

gotten one of these and may have forwarded it. People will say that they don’t want to have these mis-fortunes, so it is better to be safe than sorry. Let me tell you, I per-sonally never forward these, and I have yet to receive any misfortune specified in this style of chain let-ter. They may also promise you something, but some of my friends have forwarded these and have not had the success mentioned in the story. Also, these are very annoy-ing. Story Continued on page p. 23

We do not have permission for this image yet. If we cannot get it, we will take a picture like this ourselves...

Counter-clockwise from top: Phising is practically a hand reaching out from the computer and steal-ing your credit card. The computer is like a bomb that can explode at any time. Scams are like mousetraps, but with money instead of cheese and people instead of mice.

Mousetrap image courtesy www.boingboing.net

Phising image courtesy www.pcnetuser.com

Modern Technology P8P8

Rubberband ReformHomemade toys are being redefined by makers. Developments are making these toys faster, stronger and better overall.

By Danish H.

Most of you can think back to your unruly classrooms. You certainly must remember the weapon wars that went on. A smoothly folded square piece of paper flew across the room and smashed into the child across from you. A loud yelp of pain was followed by retaliation. He slowly ripped a sheet of paper beneath the table you shared with him as you looked out for adults. You remember that small piece of paper he fold-ed before he was ready. He took out a rubber band and put it

around his fingers. He pulled the rubber band back, made sure the teacher was not looking, and fired. “In the beginning, there was the classic rubber band and hornet, and now there is a more sophisticated weapon,” Thomas M. says, a freshman at the Lib-eral Arts and Science Academy (LASA), who used to make such toys. Children have been making rub-ber band toys like these for years, but now they are making newer, faster toy weapons. They can do this because they have something no other generation has had, the Internet. Now, when somebody makes a new toy, they can post a tutorial on the Web. Due to this process, some new developments are moving away from the old rubber band-powered pa-pers, called hornets, and rubber band guns, towards more complex things like crossbows made from pens. “ I think it might in a way help their engineering skills…it will help their innovative skills, but not in a significant way” Thomas explains. The makers of these must master the instructions for

Simple things such as bic pens can be the most useful elements in toy weaponry.

P8 P9P8 P9

making such a toy. They must know the toy, be the toy. They must put care into it and know how it works. This is why the weapons can be so successful. The students must also be able to understand the mechan-ics of the machine to make it work better and to create “new and im-proved” models. Just as everything else, the toy starts off as something very simple. “I just think it is a reflection of technological advancement in the smallest level,” Thomas says. First, there is the original invention. It is passed on orally to friends who find it interesting. Then, the tutorial for this may be posted on the Web, for a greater audience. There is now a great amount of people who can see the problems and edit them. These problems are fixed and the pro-cess is repeated several times until something great is finally invented. This leads to many different ways of making the same thing. There are crossbows made from pens and from pencils. There are bb guns

made from dust-remover cans and from mechanical pencils. “The internet is a resourceful guide for creativity to inspire new and better ideas” Matias K. says, also a LASA freshman. The Inter-net may be a good guide and a good place to gather ideas for makers of such toys, but is it really where the improvements come from? “Even before the internet you could get a rubber band. These things are passed on by word of mouth,” Jordan S, another ninth grader at the school, says. He says that rubber band toys were already popular before the dawn of the In-ternet. Many people don’t look up tutorials on the Web, so the actual reason for the advances may just be the improvements that are made while the instructions are passed on orally. But no matter how it’s hap-pening, the technology is advanc-ing, and many say that’s a good thing. “I think they’re good be-cause they stimulate your senses,

especially in a boring class,” Matias says. He says the shock of a paper hornet can give you some pleasure to balance out the boredom. Yet others disagree with him. “I don’t think children should be making weapons in the first place,” Thomas admits, who quit making them himself because he thinks they are too immature. “They are totally bad…they distract kids from doing their work,” Jordan says. He also says that they give a sharp sting and are painful. Jordan suggests that stu-dents stretch out their rubber bands before using them, so that they will not hurt as much. What can we expect to see in the future? Matias and others see continued production and higher quality devices. The toys will most certainly improve and be fun to play with, but they will be more danger-ous. In fact, you may find the paper start to resemble actual bullets quite soon.

Do It YourselfHere are insturctions to make a crossbow from a bic pen, rubberband, and scissors. Cross-bows are some of the newer toy weapons that are being made by students and workers.Disassemble

First you must take the pen apart. Keep every-thing besides for the cap and the small stopper at the end of the pen. Keep everything else.

Make the Hole

Cut out a small hole on each side of the middle of the long tube. Don’t make these too big or it will break. Put the red tube through these hole.

Almost Done

Put the ink cartridge through the red tube in the middle of the barrel. Make small cuts at the top and bottom of the barrel for the rubberband

Fire! (Carefully)

Now just add any kind of rubberband on the notches you made. Pull it back with the cartridge and fire. Be careful, we aren’t liable for injuries.

Modern Technology P10P10

Upgrade

People sit around all day staring at a glowing screen. The computers allow us to communicate quickly and cheaply, they give us the power to manipulate and solve problems, and they create jobs in our economy. Now this powerful tool is being reintroduced into the Liberal Arts and Science Academy (LASA) in the form of new computer labs. LASA has been receiving new computers, as many students might have noticed in the past year. These comput-ers are being used in a few classrooms around the school and also in the creation of new computer labs. Most believe that this advancement is a good thing, but many believe that this is not the way that it should carried out. There are currently eleven com-puter labs at LASA high school. Several of the labs are rather old, with similarly aged computers, but recently, a new batch of Dell workstations has arrived in the

school and they are being distributed to the labs. The computers that are being distributed are, as Fred Cutler, LASA’s information tech-nologist, says; “Pretty much Dell’s top of the line.” “I like the labs. They are simple and easy to use and the system seems to work fine,”

LASA student Christopher G. said. Other students have mixed opinions on the computer labs though. 9th grade student Reese H. says, “They’re a good idea, but there should be enough that you don’t have to sign up for them and stuff... because that’s dumb.” This mixed view is also shared by many of the students. The labs at LASA require that you have a teacher, and that teacher signs up beforehand for a predetermined time slot. This creates waiting lines and problems when individuals or small groups of students need to use computers. When asked about this problem Christopher G. respond-ed; “I like the idea of computer labs, but in a school like LASA/LBJ, I think it is necessary that there are a few more, consider-ing how there are twice as many students that need to use them, and students need to use them more often.” Some dislike the idea of a lab altogether. The general idea of these students and faculty members is that computers should be easily accessible and not stashed away in small clus-ters around the school. “Every classroom should have a computer. Preferably four or more, so teachers won’t have to give students a lot of passes to the library. And sometimes teachers can run out of

In America, citizens are addicted to the computer

P10 P11P10 P11

library passes,” claims LASA freshman Will W. “While my friends and I were working on an English project, we had to go to the library, but our teacher ran out of library passes.” The only computers that all students are allowed to use are those in the library. In the library, an ID is required to come in, which, according to Will is a “nuisance,” and since both LBJ and LASA use the library computers, the computers can some-time fill up and leave one no room to work. It is suggested that if there were a few computers in each teacher’s room then it would be much easier for small groups to get time on a computer. If a whole class needs computers then they could go to one of a few labs around the school. But views on the opposite side of the spectrum are also

apparent. Personal computers have been suggested as the way to go. Each student would be given a laptop to care for ,and then no computer labs would be needed. “I think that the best idea is that every student has a laptop. We could have electronic books then and we wouldn’t have to warehouse books. Instead of car-rying around 60 pounds of books and writing materials you could carry around a four pound laptop.” States Fred Cutler as a final opinion.

Modern Technology P12

If you believe the hype, it seems Google Wave will completely revolutionize the way we use the Internet. Email, chat, twit-ter, even image sharing; it seems Google’s killer app can do anything. But can Google live up to the expectations they’ve set up?

Eric E.

P12

P13

RIDINGTHE WAVES

Modern Technology P14P14

If you believe the hype, it seems Google Wave will completely revolution-ize the way we use the Internet. Email, chat, twitter, even image sharing; it seems Google’s killer app can do anything. But can Google live up to the expectations they’ve set up? But what does Google Wave actually do? Google describes it as “An online tool for real-time communication and collabora-tion. A wave can be both a conversation and a document where people can discuss and work together using richly formatted text, photos, videos, maps, and more.” Basically, it’s file sharing and IM rolled into one.Wave has the potential to become a storm. Open source code and a system of modifica-tion sharing will let users customize their account in any number of ways.Eventually, says Google, you’ll be able to up-date your Facebook status, check your email, write a tweet, and send your teacher your

report, all from one page.Many people have been comparing Wave to social networking sites like twitter and Face-book, although Wave user Tim Harrison says otherwise.“Twitter is more of a ‘shouting into the void’ kind of thing. Wave is much more collabora-tive. You invite the people into a wave and you all have a conversation.” Currently Google’s newest applica-tion is riddled with bugs, although these will most likely be fixed by the time it’s officially launched The most startling thing, though, is Wave’s incompatibility with e-mail. Google has decided to wait until an effective spam filter is developed, or else the servers may be flooded with spam. Of course, adept programmers will be able to make a modifier allowing access to email. Wave’s most interesting feature is its

P14 P15P14 P15

open source nature. Users with program-ming knowledge will be allowed to create modifications and share them with other members. Users can then submit them for over-view by the Google team, and if approved, the app will show up in the extension gallery. A preview of the gallery shows several staff-made extensions, as well some user developed ones, such as a gadget that allows you to search through Cregs list and view the results form your wave account. With the sheer amount of creativity on display in the gallery, it seems that users will happily be using wave for years to come. If only this were the case. But what exactly is the point of Wave? It is, in essence, IMing on steroids. Wave introduces no new technology or ideas, but introduces several new problems. For example, old waves won’t come to the top of your inbox once updated. This means that old conversations will quickly be forgotten or lost. The layout is jumbled and disorga-nized. Waves are constantly being updated and new ones are constantly being added. Trying to keep track of it all can be like try-ing to keep your eye on a certain rock in an avalanche. Wave isn’t exactly user friendly either. It has dozens of features and getting the hang of them requires a LOT of experiment-ing. “Since it’s so new, there isn’t anyone that you can talk to about how things work. You’ve got to figure it out for yourself,” says Harrison “Of course, as it goes along and more people join in, the learning curve won’t be as steep since people like me have already figured it out and can explain it more concisely than the sometimes wordy instruc-tional videos.” The search engine uses code such as Caption: Bird to locate old waves, and the instructions on installing gadgets are incred-ibly vague. Only time will tell how Google’s new-

est project will work out. On one hand Wave grants access to dozens of features that could let you accomplish all sorts of tasks from one page. On the other, it’s cluttered, complex, and riddled with bugs. Google Wave may revolutionize the way we interact with the web, or it may fail spectacularly. Either way, this may be Google’s riskiest venture yet.

“Since it’s so new, there isn’t anyone that you can talk to about how things work. You’ve got to figure it out for yourself.”

Modern Technology P16P16

WHAT: The SCP foundation, a group dedicated to cataloguing strange artifacts and persons that could threaten humanity.

WHERE: www.scp-wiki.wiki-

dot.com

If you’re in the mood for a good scare, or just want to let your imagination run wild, the SCP wiki is the right place for you. What originally began as a small group of objects has ballooned into a massive project that now includes a flash game, fan fiction, and al-most a thousand entries. Entries can range from razor sharp cherry blossoms to an extra-dimensional monster bent on de-stroying all life possible. The nature of the website means it has a mas-sive mythos: entire weeks could be spent browsing the list of objects, incident reports, and experiment logs. Despite it’s horror image, the series has a wickedly dark sense of humor. Just check out this quote from SCP-914’s experiment log-“Object had to be incinerated in order to stop it from singing and dancing. Whilst it appeared non-aggressive, the perpetual, deeply irritating song-and-dance number performed by the Object lead me to conclude that it was of no fur-ther use.”

SITE PROFILE:THE SCP FOUNDATION

P16

P16 P17P16 P17P16

BADKINDLE By Eric E

Modern Technology P18P18

veliquat. Ut acing euguero odolorer acilism odipit in vel do-loreet alit iriliquisl ipit lobor ad mod dolor ip ex et prat, commol-orer si blamconullum doluptat estissis et aut lobore exer ipit at. Ut autpatum alit ad dolortie do consequat, core eu feuis erat nulla commy non velesendre conullam, vel dolum nim zzri-usci tat. Ipit wismolore tation-ulput lan hent velessis nisis aut nulla facillam duis accummy nos etue min henim incipit acin-cilit loreet lutpat. Minis euguer-aesto el do ea adion ute facing erat praese faci et lut ulluptat adipit dolore facip esed ming ea facin et in vent luptat del utat.Ro consequ atummod olorperit lorem nosto ecte eum doluptatet wisciniam, consecte tem ip ea feu feum velit velis nulla feu-giamet dolorpe raesto consed tem amconum quamet wisl del-it ut wis nim dolor ilis alisim nonulla autat. Ut num quip et aliquamet, ver si estio commy nis autet, commy nibh eum irit adignis autet lan ullumsan vul-put alis duipsusto od doloreet, volobore min eugiamc onsequis aut iliquipis augait accum quam venit utpatumsan eriure et eum iusci bla am am iuscil ut el er irit lutpatin velis alisit ut alit adiam quip esto odio duisseq uipsum dio odionse dunt adiam verci tat.Em dolore magna conse te vel dignim iril in hent velisi ectet amconummy nos accum et adiat adiamet irit lortincilisi tin utpat la faccumsan enim nis ent auguer-

aessis del dolortio dolore feugait aliquissim dolorerosto odolore feum acilit dolumsan henisi.Am quam, conulpu tetuerci-dunt augait ad er sequatis non hendre vulla feuguercin velessi.Agnim zzrit nostrud ecte eu fac-cum eu feu facilit lorperos num diat veliquisl ing ex ecte tat ex-ercinis dolore esequisl illa feum zzriurer sis acinci tie do euisim aliquat, sed te facidunt praessim zzrit prat. Duisim accumsa ndreet il ing exerost isisci exerat prat.Ortie feumsandre modolore feummy nullutatie tat lamconul-lum veleseq uamconummy nulla consecte te consequis au-gait wisl eugait ad magna con-

sequam quipsus cidunt ipit lor autat augait eum atum dolortie delit praessisit dolore dunt lutem et vullamet irit iril illa accum velit, sustio odolor si.Sandit lam il eui eu feugait do-lore ming exerost ionulla con vullaor eetumsan exeratu er-cilis eu facilla ndigna faccum eum in henis nonsequate do-loreros ad do dignibh et ver in utat ilit loboreet nullan ut init, quam iliquis nismoluptat lor-em in etuercing eugait acilissi.Equat. Ut adio conse min ut adiamcore magna aut wis al-iquiscidui bla facincillam dip-susto et adiamet lametue com-my num alit augiat elendit ad eugait lore commodo et num-

sandre magnim nulput irit adi-pis nostincidui enim dipit wis doluptat nit, quamcon sequat.Idunt nis dunt ilit er il iure feu-gueraesto dolobore delessim in hendiatet iniat ad dit eugiat. Ure tie facillametue feummodolent lum dit, volore velenim eugait praessim acilit nos dunt vent la accum nullumsandre facidui eraesse venim ipsumsandrem ea faciduisim vulputpat. Ut lo-borem venibh et alit volendrem dio enibh eugiamcommod mag-nit lore conumsan hent am vel dip eu facil dolore exer alit et ut dolortie feuis nullamet ad el eu feu feugiam corperci te dion er senit ute con ulla ad dit dolor

si bla acincinim ad diam vel ut velisim num nos ad tatum quam endip ectet, vent euis at lor inis nullam volore vel ut dit num-sandiamet vendigna facilla faci-pis dit, conummy nim quisi bla feuismo lobore tat autpatet lum-san heniamcore modolummy num nos eugait vel ing exer in vel et luptat, core commy nostrud er amet lut autpat eliquam, se faci esto core faciliqui te modignim veliquat. Duisl dolut ea con utat. Giam inisisit aliquat. Duis dip ercilit ut ilis ex erat wisit irilit wismodi onsequisse tisim vel ul-laore diamet alit la feugue dunt pratueril ipsum enim iure dion-um velissed do et in ulla feugait veniat, volore velenibh essed

BLAXH BlAH BlAHBLAH BLAH BVLAHBLAH BLAH BLAHA

P18 P19P18 P19

Digna consequamet estio doloreet ex el ipit, quam venis digna corer augiamet wisse dolorpercil exero erci blam, quis elit, consed do-lorem illaor sequam quis ent vel dolum ip esed minibh ea faccum vel utpatum sandiam, veniat lore molobor alit aute vendio odignis erit dolutat, velesen dipisi tat, quat am, veriureet, commodi onsequate commy nim velessenim dolore dolor ilit dunt praessent lorem quatincip eugue consequis nibh etue faci exerosto eummod diat amcommolor sustincin heniam ea corer aliqui bla feuguer iuscipit vulpute ea facil do ectet wis et ulput nonulputat volore min et inibh ea feui tatio eraese vel dit wiscing etumsan henim ipisim ing enis ate commy nulputpat velisl ut acilismolor iriurer si.Equissequat nullut prate magni-sim irit augait adionulla cor iriurer suscillut at at.Tem iustinci bla feuisl do con-sequi bla augue dolorem veliqui euiscilisit iuscidu ismodipit augue eugiat lorerit lum vero od erci ercilit atumsandre consequ amconullaor aliquis modipisci-lis et praessis doloreet, quip eu faccum duismod et alit adio od eugait dolesto ea conum velit acilisi scilla feugiat. Ismodip ea at eugiam zzrit adiat loborper ilisim incipisi.It alit am, quam euipsum verat, consequam, consed ea cons nosto conulla cortionummy non ero doloboreet, commolobor senis ea faciduisis accum iuscin ercin vele-nis nostrud tion henit dionsecte eum nonsed mincidu iscidunt vel-iqui elit, vullam, core eu feuis dio er sum zzril dolore feu feugiam, cor suscidunt ilit alis acil ip esse-quamet, sum diatumsan eu feugue

doloreet la faccum dolor susci-dunt wis ad dolum eugait adip eugueros nullandre modionullaor iniamcor sismolor sim velis ad et utpat. Exero ex exero consectetue magna alisis nos ea feu faccum velendre mod esequat. Met nis-secte mincillummy nos autat utpat vel iliquatum veniamet atiniam ing elit ex enis alit volor iriure eugait wisi er augiat. Ut amconsed dolorpe raessi tincin utat.Dio del in henit loreet inci tat wisl er si.Adipis nostrud et nim dolorer irit et iurem ilit, summy nulland ip-sustrud te modigna alit amcommy nit la feu faciduis nim nim zz-rit veros adions non-sequat alis enis aliqua-tem voloreet lan ut adit prat, sis et alit nostrud elisci tetum ipit luptate con enis et dionsequissi ea feugait lorpercilis ad etumsan dreet, quat lumsan vulla facilla feum at, quatum acin henisci te ver sumsan utpatie vulputat. Na feugait aliquisisisi et lorperci tetue modo consequip eu-giatue dolore min elis nim velisl ilit ex exercipsusto dolore ver ipis euguer sum dunt lorpero core min velisit iriure dignim vulla corero eum in henibh et dunt dolore feui blaore dolummodiat, se modit at

velent etue magna consequatum zzrilit wismod tatincil ex et nulla faciduis eugait wis ad magnim iusto dio digna faccum veniam accummy nim zzriliquisci ea cons do delessi tinim zzrit autatuero conseniatum zzriustrud do cons nons at, conse facillamcore conse tet, commolu tatisse delis nul-lamet lutatum zzrit init ip eugue magna faccum zzriustin ea facil-luptat.Ugiat ing er sumsan velit, quamet, quip esed eugiatem voloboreet, veliquisl ulput adiatum enim quisl in hent nullandip euismol oreet, secte tat. Ibh ent num zzrilis el

delese consequis num vel ipit nul-putet acillaore exer augiate modi-ons eu facidui tatet ulla consequat nos nos dionsequi tatue tat. Ut nos niat alit am vullum irillaortin ent ero odolore vel ip eugiamc onse-quamet autat irit incin ut praestrud exer aut am dolore min henim dioRiure min exerosto corpercin hent nonsequisim velendion ul-lupta tismodit nim nonse magnibh ercil ute dolorem nos ametums andion et veliquatet, seniam,

Modern Technology P20P20

Rock Candy This is one cool project. It is

easy to make, and doesn’t require any real work.

This old fasioned candy is fun to share and tastes

great!

1) The first thing that you need to do is go col-lect materials. These materials can normally be found around your house. You will need a peice of string (four to five inches), a pencil, two glass cups full of water, a medium pan, a paperclip, and four cups of sugar (not all of this will be used). This project will take about a minute to prepare, but might need to sit in an undisturbed area for a day.

Materials

How to...

By Benjamin G

Difficulty Cost Amusement

High

Medium

Low

?

P20 P21P20 P21

2) First cut the string so that it about as long as the cup is deep and atach the paper clip to the end as a weight. Bring the water up to a boil and begin adding sugar. Pour each cup seperately and stir in between cups untill the sugar is dis-solved. Pour your syrup in the cup and then tie the string to the center of the pencil and place the pencil on the rim of the cup. The string should be dangling into the center of the cup.

Creating3) Now you just have to leave the rock candy and wait. You should leave it in clean place. You should start to see crystals after a few hours, and just pull the string out when you have a crystal size that you want. To maximize the size of the crystals you can let the water evaporate all the way away. You can enjoy this yourself or plastic wrap the candy in plastic to share it with a friend later.

Product

<divxmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photosyatenkaiouh/2249861760/"><a rel="cc:attributionURL" href="http://www.flickr.com/photos/yatenkaiouh/">http://www.flickr.com/photos/yatenkaiouh/</a> / <a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/2.0/">CC BY-NC-ND 2.0</a></div>

Modern Technology P22P22

How to...CONFUSE YOUR CO-WORKERSDifficulty: Pretty Easy Cost: Free All you need for this is a victims’s computer and about five minutes of distraction. When the victim leaves for a bathroom break, get on his computer and pull the prank. When he comes back, he won’t be able to click any of his desktop icons, or anything on the taskbar. He won’t be able to open anything on his computer. -Danish H.

1. Print ScreenGo to the desktop.Ctrl+Print Screen.

Print Screen shares a button with another command. Ctrl+v to paste on paint. Save.

2. Hide IconsRight click on the

desktop. Arrange Icons by > Show Desktop

Icons. Uncheck Show Desktop Icons by

clicking it.

3. Hide TaskbarRight click the taskbar

and uncheck “Lock the Taskbar”. Click the taksbar’s top so

you see the arrow. pull it all the way down

4.Set Fake DesktopRight click the desk-

top, Properties > Desk-top > Browse. Open

the picture from step 1. Now the prank is done.

Watch and laugh.

Prank Your Greedy Friends All you need for this is a quarter (or some other coin), some strong super glue, and

good placement. You might want a video camera to re-live the moment later on, but it is not necessary. Super glue the quarter to the floor and let it dry. Hide and watch as people come by and fail to lift the glued down quarter. You might even want to count how many times they try before they finally choose to give up on the whole mission. -Damish H.

HOW TO PULL OFF A GREAT OFFICE PRANKDifficulty: Very EasyCost: free (unless you have to buy the tape)This is a simple prank to do in your office (or classroom). Wait until somebody leaves their computer unattended, or just distract them. When they are not there, get a piece of scotch tape and put it on the opti-cal sensor (the flashy thing on the bottom) of their mouse. Make sure this is complete-ly covered up. When the person comes back, the mouse will not respond to movement. So, he can move the mouse on the desk as much as he wants, but the screen mouse won’t budge until he no-tices the tape and removes it. It’s fun to do this to multiple people and see who takes the longest to figure out the trick.-Danish H.

P22 P23P22 P23

Email Dangers Whenever I receive these, the name tricks me to think that it is important so I click it and end up very angry. By sending chain mails to your friends and family, you’ll probably just annoy them and waste their time. Then when you actually have something im-portant to send them, they may just delete it. 3. Altruistic- These kinds of emails are the ones that invoke pathos. They don’t tell you that you will win loads of money, but that someone needs your help. These will tell you to donate ten dol-lars to a certain child so he can be cured. Some may feel bad for this child and want to help. In truth, I feel like helping too, but I know this young child is not real. He ex-ists only in the minds of a scammer who is hustling you for your mon-ey. This kind of letter will end by saying, “send this to all you know so that this poor kid may become healthy again”. Let me tell you, if you really want to be a good per-son, send donations to a local chil-dren’s hospital or old home. Also, these kinds of e-mails shouldn’t be forwarded because they make your friends have to make the decision you weren’t able to. These were three types of emails, but what dangers do they actually present? There are the four different types of email dan-gers according to cipcug.org.

DANGERS OF EMAIL 1. Scams- These are the types of emails that will take your bank account information. They include the email about the Nigeri-an widow that needs to take his/her

money out of their rich spouse’s accounts and will give you 10% in exchange. They tell you they need to transfer money through your account and they need your ac-count number. They will take your money. Some may feel bad for the Nigerian widow, but don’t give in. According to some statistics, this scheme is one of the top three sources of income for individu-als in Nigeria. It is an easy way to make money for the sender, NOT for you. If you want to stay safe, never send your bank or personal information through email. 2. Phising Schemes- These types of schemes act like they are real companies and try to get you to log on to a fake website. This website will ask you to re-confirm who you are by asking personal questions such as mother’s maid-en name or social security num-ber. From this point they use your information to make changes. A tip for this is to never click a link in an email and never open email attachments. If you have already given personal information, then it would probably just be best to contact the real company and get help from them. 3. Viruses- Viruses can destroy all of your files, use your computer to send copies of them-selves, or even use your computer to do illegal things. You may think this is just bogus, but a virus has hit my computer. I lost all of my documents, including photos, vid-eos, and important school work, because I had not updated my anti-virus. Update your antivurus software. It is really hard to get those files back, and I was not able to do it. Just as with the phising

scams, never open an attatchment or email link. Even if it is from your contacts, don’t open it. This is because there have been emails sent through your contacts who opened the attachment from their contacts. The only exception is if you have verbally talked to the person sending the attachment to make sure it is safe. 4. Hoaxes- These are not really dangerous, they are just time-wasting. These will rally your spirits. They will talk about politics or religion or something else realistic and important. I have received my fair share of these, and it is good to just delete them instead of wasting everyone else’s time. Believe me, I always used to forward these before my friends and family started telling me it’s annoying. Now, I completely agree with them. There are many dangers involved with email accounts and everyone must be careful about what emails they view and send. Now, I’m saying this to myself before anyone else, because these can be tempting to me too. The best way to stay safe is to never give away any personal informa-tion on the web. Also, don’t open any attachments or links in emails, unless they’re from a contact who has assured you it is safe. Another thing is to never forward an email that says “please forward this to (insert number) people” or “for-ward to all you know”. One more thing is to make sure the article is not using a lot of convincing lan-guage including ALL CAPS and a lot of exclamation points!!!!!! To summarize, make sure an email is important before opening it.

Modern Technology P24

YOU.Yes you. Come here. Closer. Closer. Now, Pick me up. You know you want to. Hold me firmly in your arms. Flip me over and open me. But remember, you aren’t just opening a magazine, you are opening a new world of endless possibilities. You will learn about computers and schools and danger and danc-ing bananas and pranks and candy and web-sites. So why are you still reading this, turn me over and begin your journey...

Modern Technology