Email Dangers How To Make Rock Candy School Technology
Modern Technology RIDING THE WAVE
The new app that might change the internet as we know it By Eric E.
How to...
Pranks and ideas that you can do at home
Upgrade
The new computers that are changing education
SCP Wiki
The ultimate catalauge of horror.
Upgrade
The new computers that are changing education
Rubber Band Reform
The terror of the class room. These weapons in school that are getting more and more advanced. Students weigh in on what they think about the rubber band wars
4
School Tech
Is the ban on most electronics by the administration really helping students?
6
Email Dangers
What are dangerous emails and how should deal with them?
8
CONTENTS // FEATURES
Modern Technology
12
Ruber Band
The advancement of school weaponry is affecting classrooms around the nation.
10
Upgrade
Computers are being replaced around the school, but is this a good thing?
16
SCP Wiki
A reveiw on a fun website that is good for a small scare or just for amusement.
17
Bad Kindle
The new fad of E-Books might not be quite as good as originally thought.
20
Rock Candy
Create a delicious treat which takes little effort or time on your part.
22
How to...
Have fun with your freinds at the office by pulling off some of these pranks.
Modern Technology
Riding The Wave
Google’s latest project is a mixture of IM, Twitter, and email that is poised to revolutionize the internet. But how much of the hype is justified? Eric E. explores the latest from a company attempting to change the way we live.
P2
Modern Technology Danish H.
Danish is one half nerd and one half monkey. He enjoys playing sports such as basketball, football, and cricket. He also likes to watch funny videos and hear good jokes. He prefers Google to Yahoo and even though doesn’t read either of them, he has been told that MLIA is better then FML.
Benjamin G.
Ben is a Freshman at Lasa High School. He was born and raised in Austin, Texas. He enjoys reading magazines such as Popular Science and Wired. He also likes to build things and play video games in his free time or hang out with freinds. He prefers Google to Yahoo and MLIA to FML. He likes Thai food and enjoys going to rock climbing twice a week.
Eric E.
Eric E. is a freshmen at LASA high. He enjoys games of all types, movies, martial arts, writing, reading, and not wearing shoes. Unfortunantly, the administration forces him to wear shoes. FASCISM! REBEL AGAINST THE PRO-SHOE GOVERNMENT! Also, he likes prog rock, and is totally not an alien.
P3 P3
School Technology We use it every day and it shapes our lives. We center our lives around technology, but it has been banned in school. These technologies can and should be put to good educational use, so why not? Benjamin G. Whenever I walk into school I have to stop take out any electronic devices. I might have an iPod or cell phone and make sure that they are all off. Then, once I go into the building, I have to make sure that they stay completely out of sight and no administrator ever sees them or else they will be taken. It feels as if we will be prosecuted if we try to do any thing relating to a personal electronic device. Many modern day websites and electronic devices have been banned from our everyday life at school. Some of these resources could be very useful when you need to look up materials on many unconventional topics. Our technology use should not be limited to only those technologies which a select few deem acceptable. In the modern world we will need to know how
Modern Technology
to use all types of technology, not just the ones which the school board thinks we should use. Many would say that the allowance of many websites would allow students to look up inappropriate or non-educational materials. The easy way to remedy this is to just have a teacher who is willing to monitor the students when they are let on the computers. There are also systems so that a system administrator can view what all of the students are doing. Then, the administrator can take over computers which are not being used correctly (like playing a game) and teach the users how there is a proper time and place for what they want to do. Cell phones and other electronic devices can be used for a quick bit of research or to access files
and information when a computer is not available. Not one freshman core classroom in LASA High school (math, biology, English, and geography) has a computer for student use. Many of the classrooms would benefit from the ability to use the Internet or print out documents from personal electronics. In an article by the Center on Media and Child Health, more than 80 percent of teens have cell phones. All of these cell phones could be used for educational purposes such as looking up information when a computer is not easily accesible, and keeping an organized day planner. Instead they have been banned and made an item which you could be fined for having. Many items that have been banned can be used for learning and
P4
education if the correct materials are given to the students. According to a study published on PubMed by Shih YN, Huang RH, and Chiang HS, college students who listen to music before a test do significantly better than those who did not listen to music. According to another survey by Ipodnn.com, 92 percent of teens own and use an MP3 player. Many schools and school district have banned listening to music on these. The study on PubMed, I previously stated, shows that not only does listening to music not harm the students, it actually helps them. Many websites such as Gamefaqs and Gamespot (both review sites that do not actually provide online gaming) have been blocked regardless of content but just depending on the name. Many
of these websites could phone use when necessary be used for educational or useful. Websites that purposes but have been have been blocked should blocked by the harsh and be accessible with a teachunforgiving AISD firewall. er password. 17 out of 21 students in Technology is generMs. Richey’s (an Elecally looked tronic Magazine down upon “Technology is generteacher at LASA) ally looked down upon by the school by the school district class say that district, but but much of the banned they have tried much of the technology has uses in” to access a webbanned techsite for educational purnology has good uses in education. Even though poses before, but it has technology has been been blocked. This large percentage of students is banned in schools, it is present in the real world present in most if not all freshman classes at LASA. and should be taught Technology helps stu- about in schools. It should be used to give students dents learn so the obvious thing to do would be experience with the techto allowed personal elec- nology so they are ready for the real world. In the tronic devices in schools real world, there will not under certain conditions. IPods and other MP3 play- be bans on cell phones or IPods, so we should learn ers should be allowed in school but the use of them to work with them rather than only use them at should be controlled and certain times when adminregulated by the teachers istrators believe it is good of students’ classes. The for us. teacher should allow cell
P5
Email Dangers
By Danish H.
CLICK! YOUR IT’S AS FINGER EASY AS DOWN, THAT. YOU’VE JUST BY FORPUSHING WARDED
TYPES OF HARMFUL EMAILS 1. Give you money (pyramid schemes)- These come in saying that you have to send $5 to the person at the top of the list. Then remove his name, a message electronically to everybody on your con- put yours at the bottom, and move the list up. Basically, tact list. The adrenaline rushes through your body each time someone sends the because you know you just have to wait now. Just list your name will move up wait until your wish is granted. Just wait and you until you get to the top, when you will get $5 from those bewill get $10,000 dollars. Just wait and get the girl of neath you. Now one side will say these will help you gain your dreams. Just wait… quick money, but I say there are a lot of problems that may occur. First of all, there can be dishonesty. Anybody can put Don’t worry, I’ve felt like answering some their name at the top, or not give the $5 before forwardof those or following the instructions and send- ing the mail. Secondly, there are not enough people. ing them to contacts, too. To tell the truth, every According to the U.S Security and Exchange Comisteenager has probably felt this urge. The important sion, if there were just 13 levels in this, there would be thing is not to forward them. I will tell you from 13,060,694,016 participants. This is already more than personal experience that chain mails can be ex- the world population. Most importantly it is illegal. “Titremely annoying and can be harmful. According tle 18, section 1302 of the US Postal and Lottery Laws to snopes.com there are actually many types of dif- actually states that chain letters (email or otherwise) are ferent emails that you might want to reply to.
Modern Technology
P6
Phising image courtesy www.pcnetuser.com
We do not have permission for this image yet. If we cannot get it, we will take a picture like this ourselves...
Counter-clockwise from top: Phising is practically a hand reaching out from the computer and stealing your credit card. The computer is like a bomb that can explode at any time. Scams are like mousetraps, but with money instead of cheese and people instead of mice.
Mousetrap image courtesy www.boingboing.net
illegal ‘if they request money or other items of value and promise a substantial return to the participants.’” -BreakTheChain.org 2. Give you luck or avoidance of misfortune-According to Snopes.com, these letters generally follow this structure: Invocation: The letter begins with telling you to pray or kiss someone as a sign of love. Origins: A description of the person who began the letter is given.
Success Story: Lists the happy stories of people who followed instructions are given, with their rewards described in detail. Personally speaking, these are very unrealistic. Punishment Story: Accounts are given of the setbacks or tragedies people who ignored the letter had. Instruction and Promise: You are told how many copies of the letter to send and are reassured of luck. I know that everyone has
gotten one of these and may have forwarded it. People will say that they don’t want to have these misfortunes, so it is better to be safe than sorry. Let me tell you, I personally never forward these, and I have yet to receive any misfortune specified in this style of chain letter. They may also promise you something, but some of my friends have forwarded these and have not had the success mentioned in the story. Also, these are very annoying. Story Continued on page p. 23
P7 P7
Rubberband Reform Homemade toys are being redefined by makers. Developments are making these toys faster, stronger and better overall.
M
By Danish H. ost of you can think back to your unruly classrooms. You certainly must remember the weapon wars that went on. A smoothly folded square piece of paper flew across the room and smashed into the child across from you. A loud yelp of pain was followed by retaliation. He slowly ripped a sheet of paper beneath the table you shared with him as you looked out for adults. You remember that small piece of paper he folded before he was ready. He took out a rubber band and put it around his fingers. He pulled the rubber band back, made sure the teacher was not looking, and fired. “In the beginning, there was the classic rubber band and hornet, and now there is a more sophisticated weapon,” Thomas M. says, a freshman at the Liberal Arts and Science Academy (LASA), who used to make such toys. Children have been making rubber band toys like these for years, but now they are making newer, faster toy weapons. They can do this because they have something no other generation has had, the Internet. Now, when somebody makes a new toy, they can post a tutorial on the Web. Due to this process, some new developments are moving away from the old rubber band-powered papers, called hornets, and rubber band guns, towards more complex things like crossbows made from pens. “ I think it might in a way help their engineering skills…it will help their innovative skills, but not in a significant way” Thomas explains. The makers of these must master the instructions for Simple things such as bic pens can be the most useful elements in toy weaponry.
Modern Technology
P8
making such a toy. They must know the toy, be the toy. They must put care into it and know how it works. This is why the weapons can be so successful. The students must also be able to understand the mechanics of the machine to make it work better and to create “new and improved” models. Just as everything else, the toy starts off as something very simple. “I just think it is a reflection of technological advancement in the smallest level,” Thomas says. First, there is the original invention. It is passed on orally to friends who find it interesting. Then, the tutorial for this may be posted on the Web, for a greater audience. There is now a great amount of people who can see the problems and edit them. These problems are fixed and the process is repeated several times until something great is finally invented. This leads to many different ways of making the same thing. There are crossbows made from pens and from pencils. There are bb guns
made from dust-remover cans and from mechanical pencils. “The internet is a resourceful guide for creativity to inspire new and better ideas” Matias K. says, also a LASA freshman. The Internet may be a good guide and a good place to gather ideas for makers of such toys, but is it really where the improvements come from? “Even before the internet you could get a rubber band. These things are passed on by word of mouth,” Jordan S, another ninth grader at the school, says. He says that rubber band toys were already popular before the dawn of the Internet. Many people don’t look up tutorials on the Web, so the actual reason for the advances may just be the improvements that are made while the instructions are passed on orally. But no matter how it’s happening, the technology is advancing, and many say that’s a good thing. “I think they’re good because they stimulate your senses,
especially in a boring class,” Matias says. He says the shock of a paper hornet can give you some pleasure to balance out the boredom. Yet others disagree with him. “I don’t think children should be making weapons in the first place,” Thomas admits, who quit making them himself because he thinks they are too immature. “They are totally bad… they distract kids from doing their work,” Jordan says. He also says that they give a sharp sting and are painful. Jordan suggests that students stretch out their rubber bands before using them, so that they will not hurt as much. What can we expect to see in the future? Matias and others see continued production and higher quality devices. The toys will most certainly improve and be fun to play with, but they will be more dangerous. In fact, you may find the paper start to resemble actual bullets quite soon.
Do It Yourself
Here are insturctions to make a crossbow from a bic pen, rubberband, and scissors. Crossbows are some of the newer toy weapons that are being made by students and workers. Disassemble Make the Hole Almost Done Fire! (Carefully)
First you must take the pen apart. Keep everything besides for the cap and the small stopper at the end of the pen. Keep everything else.
Cut out a small hole on each side of the middle of the long tube. Don’t make these too big or it will break. Put the red tube through these hole.
Put the ink cartridge through the red tube in the middle of the barrel. Make small cuts at the top and bottom of the barrel for the rubberband
Now just add any kind of rubberband on the notches you made. Pull it back with the cartridge and fire. Be careful, we aren’t liable for injuries.
P9 P9
Upgrade In America, citizens are addicted to the computer People sit around all day staring at a glowing screen. The computers allow us to communicate quickly and cheaply, they give us the power to manipulate and solve problems, and they create jobs in our economy. Now this powerful tool is being reintroduced into the Liberal Arts and Science Academy (LASA) in the form of new computer labs. LASA has been receiving new computers, as many students might have noticed in the past year. These computers are being used in a few classrooms around the school and also in the creation of new computer labs. Most believe that this advancement is a good thing, but many believe that this is not the way that it should carried out. There are currently eleven computer labs at LASA high school. Several of the labs are rather old, with similarly aged computers, but recently, a new batch of Dell workstations has arrived in the
Modern Technology
school and they are being distributed to the labs. The computers that are being distributed are, as Fred Cutler, LASA’s information technologist, says; “Pretty much Dell’s top of the line.” “I like the labs. They are simple and easy to use and the system seems to work fine,” LASA student Christopher G. said. Other students have mixed opinions on the computer labs though. 9th grade student Reese H. says, “They’re a good idea, but there should be enough that you don’t have to sign up for them and stuff... because that’s dumb.” This mixed view is also shared by many of the students. The labs at LASA require that you have a teacher, and that teacher signs up beforehand for a predetermined time slot. This creates waiting lines and problems when individuals or small groups of students need to use computers. When asked about this problem Christopher G. responded; “I like the idea of computer labs, but in a school like LASA/ LBJ, I think it is necessary that there are a few more, considering how there are twice as many students that need to use them, and students need to use them more often.” Some dislike the idea of a lab altogether. The general idea of these students and faculty members is that computers should be easily accessible and not stashed away in small clusters around the school. “Every classroom should have a computer. Preferably four or more, so teachers won’t have to give students a lot of passes to the library. And sometimes teachers can run out of
P10
library passes,” claims LASA freshman Will W. “While my friends and I were working on an English project, we had to go to the library, but our teacher ran out of library passes.” The only computers that all students are allowed to use are those in the library. In the library, an ID is required to come in, which, according to Will is a “nuisance,” and since both LBJ and LASA use the library computers, the computers can sometime fill up and leave one no room to work. It is suggested that if there were a few computers in each teacher’s room then it would be much easier for small groups to get time on a computer. If a whole class needs computers then they could go to one of a few labs around the school. But views on the opposite side of the spectrum are also
apparent. Personal computers have been suggested as the way to go. Each student would be given a laptop to care for ,and then no computer labs would be needed. “I think that the best idea is that every student has a laptop. We could have electronic books then and we wouldn’t have to warehouse books. Instead of carrying around 60 pounds of books and writing materials you could carry around a four pound laptop.” States Fred Cutler as a final opinion.
P11 P11
If you believe the hype, it seems Google Wave will completely revolutionize the way we use the Internet. Email, chat, twitter, even image sharing; it seems Google’s killer app can do anything. But can Google live up to the expectations they’ve set up?
Eric E.
Modern Technology
P12
RIDING THE WAVES
P13
If you believe the hype, it seems Google Wave will completely revolutionize the way we use the Internet. Email, chat, twitter, even image sharing; it seems Google’s killer app can do anything. But can Google live up to the expectations they’ve set up? But what does Google Wave actually do? Google describes it as “An online tool for real-time communication and collaboration. A wave can be both a conversation and a document where people can discuss and work together using richly formatted text, photos, videos, maps, and more.” Basically, it’s file sharing and IM rolled into one. Wave has the potential to become a storm. Open source code and a system of modification sharing will let users customize their account in any number of ways. Eventually, says Google, you’ll be able to update your Facebook status, check your email, write a tweet, and send your teacher your
Modern Technology
report, all from one page. Many people have been comparing Wave to social networking sites like twitter and Facebook, although Wave user Tim Harrison says otherwise. “Twitter is more of a ‘shouting into the void’ kind of thing. Wave is much more collaborative. You invite the people into a wave and you all have a conversation.” Currently Google’s newest application is riddled with bugs, although these will most likely be fixed by the time it’s officially launched The most startling thing, though, is Wave’s incompatibility with e-mail. Google has decided to wait until an effective spam filter is developed, or else the servers may be flooded with spam. Of course, adept programmers will be able to make a modifier allowing access to email. Wave’s most interesting feature is its
P14
open source nature. Users with programming knowledge will be allowed to create modifications and share them with other members. Users can then submit them for overview by the Google team, and if approved, the app will show up in the extension gallery. A preview of the gallery shows several staff-made extensions, as well some user developed ones, such as a gadget that allows you to search through Cregs list and view the results form your wave account. With the sheer amount of creativity on display in the gallery, it seems that users will happily be using wave for years to come. If only this were the case. But what exactly is the point of Wave? It is, in essence, IMing on steroids. Wave introduces no new technology or ideas, but introduces several new problems. For example, old waves won’t come to the top of your inbox once updated. This means that old conversations will quickly be forgotten or lost. The layout is jumbled and disorganized. Waves are constantly being updated and new ones are constantly being added. Trying to keep track of it all can be like trying to keep your eye on a certain rock in an avalanche. Wave isn’t exactly user friendly either. It has dozens of features and getting the hang of them requires a LOT of experimenting. “Since it’s so new, there isn’t anyone that you can talk to about how things work. You’ve got to figure it out for yourself,” says Harrison “Of course, as it goes along and more people join in, the learning curve won’t be as steep since people like me have already figured it out and can explain it more concisely than the sometimes wordy instructional videos.” The search engine uses code such as Caption: Bird to locate old waves, and the instructions on installing gadgets are incredibly vague. Only time will tell how Google’s new-
est project will work out. On one hand Wave grants access to dozens of features that could let you accomplish all sorts of tasks from one page. On the other, it’s cluttered, complex, and riddled with bugs. Google Wave may revolutionize the way we interact with the web, or it may fail spectacularly. Either way, this may be Google’s riskiest venture yet.
“Since it’s so new, there isn’t anyone that you can talk to about how things work. You’ve got to figure it out for yourself.”
P15 P15
SITE PROFILE:
THE SCP FOUNDATION
WHAT: The SCP foundation, a
group dedicated to cataloguing strange artifacts and persons that could threaten humanity.
WHERE: www.scp-wiki.wikidot.com If you’re in the mood for a good scare, or just want to let your imagination run wild, the SCP wiki is the right place for you. What originally began as a small group of objects has ballooned into a massive project that now includes a flash game, fan fiction, and almost a thousand entries. Entries can range from razor sharp cherry blossoms to an extradimensional monster bent on destroying all life possible. The nature of the website means it has a massive mythos: entire weeks could be spent browsing the list of objects, incident reports, and experiment logs. Despite it’s horror image, the series has a wickedly dark sense of humor. Just check out this quote from SCP-914’s experiment log“Object had to be incinerated in order to stop it from singing and dancing. Whilst it appeared nonaggressive, the perpetual, deeply irritating song-and-dance number performed by the Object lead me to conclude that it was of no further use.”
Modern Technology
P16
BAD KINDLE By Eric E
P17 P17
veliquat. Ut acing euguero odolorer acilism odipit in vel doloreet alit iriliquisl ipit lobor ad mod dolor ip ex et prat, commolorer si blamconullum doluptat estissis et aut lobore exer ipit at. Ut autpatum alit ad dolortie do consequat, core eu feuis erat nulla commy non velesendre conullam, vel dolum nim zzriusci tat. Ipit wismolore tationulput lan hent velessis nisis aut nulla facillam duis accummy nos etue min henim incipit acincilit loreet lutpat. Minis eugueraesto el do ea adion ute facing erat praese faci et lut ulluptat adipit dolore facip esed ming ea facin et in vent luptat del utat. Ro consequ atummod olorperit lorem nosto ecte eum doluptatet wisciniam, consecte tem ip ea feu feum velit velis nulla feugiamet dolorpe raesto consed tem amconum quamet wisl delit ut wis nim dolor ilis alisim nonulla autat. Ut num quip et aliquamet, ver si estio commy nis autet, commy nibh eum irit adignis autet lan ullumsan vulput alis duipsusto od doloreet, volobore min eugiamc onsequis aut iliquipis augait accum quam venit utpatumsan eriure et eum iusci bla am am iuscil ut el er irit lutpatin velis alisit ut alit adiam quip esto odio duisseq uipsum dio odionse dunt adiam verci tat. Em dolore magna conse te vel dignim iril in hent velisi ectet amconummy nos accum et adiat adiamet irit lortincilisi tin utpat la faccumsan enim nis ent auguer-
Modern Technology
aessis del dolortio dolore feugait aliquissim dolorerosto odolore feum acilit dolumsan henisi. Am quam, conulpu tetuercidunt augait ad er sequatis non hendre vulla feuguercin velessi. Agnim zzrit nostrud ecte eu faccum eu feu facilit lorperos num diat veliquisl ing ex ecte tat exercinis dolore esequisl illa feum zzriurer sis acinci tie do euisim aliquat, sed te facidunt praessim zzrit prat. Duisim accumsa ndreet il ing exerost isisci exerat prat. Ortie feumsandre modolore feummy nullutatie tat lamconullum veleseq uamconummy nulla consecte te consequis augait wisl eugait ad magna con-
sandre magnim nulput irit adipis nostincidui enim dipit wis doluptat nit, quamcon sequat. Idunt nis dunt ilit er il iure feugueraesto dolobore delessim in hendiatet iniat ad dit eugiat. Ure tie facillametue feummodolent lum dit, volore velenim eugait praessim acilit nos dunt vent la accum nullumsandre facidui eraesse venim ipsumsandrem ea faciduisim vulputpat. Ut loborem venibh et alit volendrem dio enibh eugiamcommod magnit lore conumsan hent am vel dip eu facil dolore exer alit et ut dolortie feuis nullamet ad el eu feu feugiam corperci te dion er senit ute con ulla ad dit dolor
BLAXH BlAH BlAH BLAH BLAH BVLAH BLAH BLAH BLAHA sequam quipsus cidunt ipit lor autat augait eum atum dolortie delit praessisit dolore dunt lutem et vullamet irit iril illa accum velit, sustio odolor si. Sandit lam il eui eu feugait dolore ming exerost ionulla con vullaor eetumsan exeratu ercilis eu facilla ndigna faccum eum in henis nonsequate doloreros ad do dignibh et ver in utat ilit loboreet nullan ut init, quam iliquis nismoluptat lorem in etuercing eugait acilissi. Equat. Ut adio conse min ut adiamcore magna aut wis aliquiscidui bla facincillam dipsusto et adiamet lametue commy num alit augiat elendit ad eugait lore commodo et num-
si bla acincinim ad diam vel ut velisim num nos ad tatum quam endip ectet, vent euis at lor inis nullam volore vel ut dit numsandiamet vendigna facilla facipis dit, conummy nim quisi bla feuismo lobore tat autpatet lumsan heniamcore modolummy num nos eugait vel ing exer in vel et luptat, core commy nostrud er amet lut autpat eliquam, se faci esto core faciliqui te modignim veliquat. Duisl dolut ea con utat. Giam inisisit aliquat. Duis dip ercilit ut ilis ex erat wisit irilit wismodi onsequisse tisim vel ullaore diamet alit la feugue dunt pratueril ipsum enim iure dionum velissed do et in ulla feugait veniat, volore velenibh essed
P18
Digna consequamet estio doloreet ex el ipit, quam venis digna corer augiamet wisse dolorpercil exero erci blam, quis elit, consed dolorem illaor sequam quis ent vel dolum ip esed minibh ea faccum vel utpatum sandiam, veniat lore molobor alit aute vendio odignis erit dolutat, velesen dipisi tat, quat am, veriureet, commodi onsequate commy nim velessenim dolore dolor ilit dunt praessent lorem quatincip eugue consequis nibh etue faci exerosto eummod diat amcommolor sustincin heniam ea corer aliqui bla feuguer iuscipit vulpute ea facil do ectet wis et ulput nonulputat volore min et inibh ea feui tatio eraese vel dit wiscing etumsan henim ipisim ing enis ate commy nulputpat velisl ut acilismolor iriurer si. Equissequat nullut prate magnisim irit augait adionulla cor iriurer suscillut at at. Tem iustinci bla feuisl do consequi bla augue dolorem veliqui euiscilisit iuscidu ismodipit augue eugiat lorerit lum vero od erci ercilit atumsandre consequ amconullaor aliquis modipiscilis et praessis doloreet, quip eu faccum duismod et alit adio od eugait dolesto ea conum velit acilisi scilla feugiat. Ismodip ea at eugiam zzrit adiat loborper ilisim incipisi. It alit am, quam euipsum verat, consequam, consed ea cons nosto conulla cortionummy non ero doloboreet, commolobor senis ea faciduisis accum iuscin ercin velenis nostrud tion henit dionsecte eum nonsed mincidu iscidunt veliqui elit, vullam, core eu feuis dio er sum zzril dolore feu feugiam, cor suscidunt ilit alis acil ip essequamet, sum diatumsan eu feugue
doloreet la faccum dolor suscidunt wis ad dolum eugait adip eugueros nullandre modionullaor iniamcor sismolor sim velis ad et utpat. Exero ex exero consectetue magna alisis nos ea feu faccum velendre mod esequat. Met nissecte mincillummy nos autat utpat vel iliquatum veniamet atiniam ing elit ex enis alit volor iriure eugait wisi er augiat. Ut amconsed dolorpe raessi tincin utat. Dio del in henit loreet inci tat wisl er si. Adipis nostrud et nim dolorer irit et iurem ilit, summy nulland ipsustrud te modigna alit amcommy nit la feu faciduis nim nim zzrit veros adions nonsequat alis enis aliquatem voloreet lan ut adit prat, sis et alit nostrud elisci tetum ipit luptate con enis et dionsequissi ea feugait lorpercilis ad etumsan dreet, quat lumsan vulla facilla feum at, quatum acin henisci te ver sumsan utpatie vulputat. Na feugait aliquisisisi et lorperci tetue modo consequip eugiatue dolore min elis nim velisl ilit ex exercipsusto dolore ver ipis euguer sum dunt lorpero core min velisit iriure dignim vulla corero eum in henibh et dunt dolore feui blaore dolummodiat, se modit at
velent etue magna consequatum zzrilit wismod tatincil ex et nulla faciduis eugait wis ad magnim iusto dio digna faccum veniam accummy nim zzriliquisci ea cons do delessi tinim zzrit autatuero conseniatum zzriustrud do cons nons at, conse facillamcore conse tet, commolu tatisse delis nullamet lutatum zzrit init ip eugue magna faccum zzriustin ea facilluptat. Ugiat ing er sumsan velit, quamet, quip esed eugiatem voloboreet, veliquisl ulput adiatum enim quisl in hent nullandip euismol oreet, secte tat. Ibh ent num zzrilis el
delese consequis num vel ipit nulputet acillaore exer augiate modions eu facidui tatet ulla consequat nos nos dionsequi tatue tat. Ut nos niat alit am vullum irillaortin ent ero odolore vel ip eugiamc onsequamet autat irit incin ut praestrud exer aut am dolore min henim dioRiure min exerosto corpercin hent nonsequisim velendion ullupta tismodit nim nonse magnibh ercil ute dolorem nos ametums andion et veliquatet, seniam,
P19 P19
How to... High
Medium
Low Difficulty
Cost
Amusement
Rock Candy This is one cool project. It is easy to make, and doesn’t require any real work. This old fasioned candy is fun to share and tastes great! By Benjamin G
? Modern Technology
Materials 1) The first thing that you need to do is go col-
lect materials. These materials can normally be found around your house. You will need a peice of string (four to five inches), a pencil, two glass cups full of water, a medium pan, a paperclip, and four cups of sugar (not all of this will be used). This project will take about a minute to prepare, but might need to sit in an undisturbed area for a day.
P20
<divxmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos yatenkaiouh/2249861760/"><a rel="cc:attributionURL" href="http://www.flickr.com/ photos/yatenkaiouh/">http://www.flickr.com/photos/yatenkaiouh/</a> / <a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/2.0/">CC BY-NC-ND 2.0</a></div>
Product Creating 2) First cut the string so that it about as long as
the cup is deep and atach the paper clip to the end as a weight. Bring the water up to a boil and begin adding sugar. Pour each cup seperately and stir in between cups untill the sugar is dissolved. Pour your syrup in the cup and then tie the string to the center of the pencil and place the pencil on the rim of the cup. The string should be dangling into the center of the cup.
3) Now you just have to leave
the rock candy and wait. You should leave it in clean place. You should start to see crystals after a few hours, and just pull the string out when you have a crystal size that you want. To maximize the size of the crystals you can let the water evaporate all the way away. You can enjoy this yourself or plastic wrap the candy in plastic to share it with a friend later.
P21 P21
How to...
HOW TO PULL OFF A GREAT OFFICE PRANK
CONFUSE YOUR CO-WORKERS
Difficulty: Pretty Easy Cost: Free All you need for this is a victims’s computer and about five minutes of distraction. When the victim leaves for a bathroom break, get on his computer and pull the prank. When he comes back, he won’t be able to click any of his desktop icons, or anything on the taskbar. He won’t be able to open anything on his computer. -Danish H.
1. Print Screen
Go to the desktop. Ctrl+Print Screen. Print Screen shares a button with another command. Ctrl+v to paste on paint. Save.
2. Hide Icons
Right click on the desktop. Arrange Icons by > Show Desktop Icons. Uncheck Show Desktop Icons by clicking it.
3. Hide Taskbar
Right click the taskbar and uncheck “Lock the Taskbar”. Click the taksbar’s top so you see the arrow. pull it all the way down
4.Set Fake Desktop
Right click the desktop, Properties > Desktop > Browse. Open the picture from step 1. Now the prank is done. Watch and laugh.
Difficulty: Very Easy Cost: free (unless you have to buy the tape) This is a simple prank to do in your office (or classroom). Wait until somebody leaves their computer unattended, or just distract them. When they are not there, get a piece of scotch tape and put it on the optical sensor (the flashy thing on the bottom) of their mouse. Make sure this is completely covered up. When the person comes back, the mouse will not respond to movement. So, he can move the mouse on the desk as much as he wants, but the screen mouse won’t budge until he notices the tape and removes it. It’s fun to do this to multiple people and see who takes the longest to figure out the trick. -Danish H.
Prank Your Greedy Friends
All you need for this is a quarter (or some other coin), some strong super glue, and good placement. You might want a video camera to re-live the moment later on, but it is not necessary. Super glue the quarter to the floor and let it dry. Hide and watch as people come by and fail to lift the glued down quarter. You might even want to count how many times they try before they finally choose to give up on the whole mission. -Damish H.
Modern Technology
P22
Email Dangers
Whenever I receive these, the name tricks me to think that it is important so I click it and end up very angry. By sending chain mails to your friends and family, you’ll probably just annoy them and waste their time. Then when you actually have something important to send them, they may just delete it. 3. Altruistic- These kinds of emails are the ones that invoke pathos. They don’t tell you that you will win loads of money, but that someone needs your help. These will tell you to donate ten dollars to a certain child so he can be cured. Some may feel bad for this child and want to help. In truth, I feel like helping too, but I know this young child is not real. He exists only in the minds of a scammer who is hustling you for your money. This kind of letter will end by saying, “send this to all you know so that this poor kid may become healthy again”. Let me tell you, if you really want to be a good person, send donations to a local children’s hospital or old home. Also, these kinds of e-mails shouldn’t be forwarded because they make your friends have to make the decision you weren’t able to. These were three types of emails, but what dangers do they actually present? There are the four different types of email dangers according to cipcug.org. DANGERS OF EMAIL 1. Scams- These are the types of emails that will take your bank account information. They include the email about the Nigerian widow that needs to take his/her
money out of their rich spouse’s accounts and will give you 10% in exchange. They tell you they need to transfer money through your account and they need your account number. They will take your money. Some may feel bad for the Nigerian widow, but don’t give in. According to some statistics, this scheme is one of the top three sources of income for individuals in Nigeria. It is an easy way to make money for the sender, NOT for you. If you want to stay safe, never send your bank or personal information through email. 2. Phising Schemes- These types of schemes act like they are real companies and try to get you to log on to a fake website. This website will ask you to re-confirm who you are by asking personal questions such as mother’s maiden name or social security number. From this point they use your information to make changes. A tip for this is to never click a link in an email and never open email attachments. If you have already given personal information, then it would probably just be best to contact the real company and get help from them. 3. Viruses- Viruses can destroy all of your files, use your computer to send copies of themselves, or even use your computer to do illegal things. You may think this is just bogus, but a virus has hit my computer. I lost all of my documents, including photos, videos, and important school work, because I had not updated my antivirus. Update your antivurus soft ware. It is really hard to get those files back, and I was not able to do it. Just as with the phising
scams, never open an attatchment or email link. Even if it is from your contacts, don’t open it. This is because there have been emails sent through your contacts who opened the attachment from their contacts. The only exception is if you have verbally talked to the person sending the attachment to make sure it is safe. 4. Hoaxes- These are not really dangerous, they are just time-wasting. These will rally your spirits. They will talk about politics or religion or something else realistic and important. I have received my fair share of these, and it is good to just delete them instead of wasting everyone else’s time. Believe me, I always used to forward these before my friends and family started telling me it’s annoying. Now, I completely agree with them. There are many dangers involved with email accounts and everyone must be careful about what emails they view and send. Now, I’m saying this to myself before anyone else, because these can be tempting to me too. The best way to stay safe is to never give away any personal information on the web. Also, don’t open any attachments or links in emails, unless they’re from a contact who has assured you it is safe. Another thing is to never forward an email that says “please forward this to (insert number) people” or “forward to all you know”. One more thing is to make sure the article is not using a lot of convincing language including ALL CAPS and a lot of exclamation points!!!!!! To summarize, make sure an email is important before opening it.
P23 P23
YOU.
Yes you. Come here. Closer. Closer. Now, Pick me up. You know you want to. Hold me firmly in your arms. Flip me over and open me. But remember, you arenâ&#x20AC;&#x2122;t just opening a magazine, you are opening a new world of endless possibilities. You will learn about computers and schools and danger and dancing bananas and pranks and candy and websites. So why are you still reading this, turn me over and begin your journey...
Modern Technology Modern Technology
P24