In this week's lesson, I learned about the multitude of ways in which a business or enterprise can store its data. Options include HSM (where data is migrated to cheaper storage if it is not used frequently in order to conserve valuable expensive storage for the data that is used frequently), SAN (where a network is designed specifically for sharing storage resources among a set of servers), Virtualization (a technique for running multiple "virtual computers" on a single physical host computer system, or through a Thin Client (small inexpensive--compared to a personal computer-- terminal-like computer that mostly relies on a server for data storage and processing. This week began with sort of a throw back to the start of the course with the types of storage methods.
RAID 1 (Mirroring)--which involes a pair of drives, where each block of data is written to both drives. If a single drive was to fail, no data would be lost and the system would still run at full speed. This creates redudancy, which is great if you want to protect your data from drive failures. RAID 0 (Striping)--which involves two or more drives, where blocks of data spread across all drives equally. This creates a fast read and write speed due to multiple disks simultaneously working. There is no redundancy which means that if one drive fails...all data is lost. It is statistically less reliable than a single disk drive in that the more drives there are, the greater the total chance of there being a failure. Raid 5 involves three or more drives, where data blocks spread across all drives except one. This exception drive is used to store "parity" data--this is where data in the form of ones and zeros are added up to formulate an even or odd number..if even, the data is stored as "0" on the parity drive...if odd, the data is stored as "1" on the parity drive. This creates fast reads similar to striping, with moderate write speed due to the computations involved with storing data as parity. If a drive fails, no data is lost but the system will run at a reduced speed because the parity drive is being used to compute the data lost from the missing drive. There is even a "hot spare" which is an extra hard disk that remains idle only until a drive fails...then it will automatically begins to mirror the infomation of the lost drive. Finally, there is Raid 6 which is any RAID that can continue to run if there were to be two drive failures at the same time. It's performance is similar to RAID 5 and it protects agains read failure during rebuild of big disks which could result in data lost.
Sunday, November 28, 2010
Sunday, November 21, 2010
Secure Email Project
Website link: http://www.indexel.net/actualites/pertes-de-donnees-1-entreprise-sur-4-n-est-pas-protegee-3107.html --Website may need to be translated from French to English.
The article exclaims that companies are sometimes oblivious to the fact that their are financial losses associated with data losses. According to a recent survey by Quocirca Research Institute, the loss of computer data directly affects respective companies-- in terms of billions of Euros. The lack of protection associated with this can arise hefty fines, especially with today's government system. According to Quocirca, businesses reduce computing security to the internal network, without realizing that a Data Flow actually exists on other devices i.e. removable hard drives, CDs, USB sticks, laptops, etc. They are often sensitive throughout their life cycle.
I found this article relevant because it comes from both a technological stand point and a business point of view as well. If one's data is not protected, or one chooses to not take the appropriate measures in order to protect important iformation, then it can only be that person or company's fault. At the end of the day, you are to blame for the unfortunate and preventable situation that comes with not protecting your data.
Week 13: Clear
This week's lesson was fairly simple but very crucial when it comes to computer safety. I learned that there are a plethora of ways that one's computer can suffer security risks; this is any action that can cause loss of data, and damage to your computer's software, hardware, or processing ability. However, there are also certain measures one can take to decrease the likelihood of their computer being attacked. Unauthorized access and use of a computer or network without permission is one way you can be affected. To prevent this, you can disable file and printer sharing on the network, use a firewall and protect your username and password. Moreover, creating a strong password is key when it comes to keeping information safe--the more characters you have in a password, the harder it will be for a hacker to figure out that password. Information theft, the stealing of personal or confidential information, is another security risk. Some components to information theft include phishing (often sent as an email that looks official but then asks users to verify personal information), spoofing (altering the header of an email to make it appear as if it is coming from someone else, and pharming (installing malicious code on a computer to redirect users to fake websites). Prevition can be accomplished by way of encryption, digital signatures, and authentication controls.
One of the most apparent securtiy risks are Internet and Network attacks. Information traveling over networks is at a higher risk than local information because there are more ways to intercept the information. Viruses are programs that alter the computer by damaging files and system software. It requires human action to spread--ex. through e-mail. Worms are programs that copy itself and take up resources on your computer. It does not require human action to spread. A Trojan Horse is something that looks like something else. It is software that hides behind something that may seem harmless. They do not spread to other computers like that of worms and viruses. In order to limit the risks involved with these types of attacks, you can use a firewall, anit-virus and make sure it is always up-to-date, being care of email attachments, and watching the news in order to be informed about when there are new cases of attacks.
One of the most apparent securtiy risks are Internet and Network attacks. Information traveling over networks is at a higher risk than local information because there are more ways to intercept the information. Viruses are programs that alter the computer by damaging files and system software. It requires human action to spread--ex. through e-mail. Worms are programs that copy itself and take up resources on your computer. It does not require human action to spread. A Trojan Horse is something that looks like something else. It is software that hides behind something that may seem harmless. They do not spread to other computers like that of worms and viruses. In order to limit the risks involved with these types of attacks, you can use a firewall, anit-virus and make sure it is always up-to-date, being care of email attachments, and watching the news in order to be informed about when there are new cases of attacks.
Sunday, November 14, 2010
Week 12: Clear
This week contained a large amount of information to be absorbed in regards to Communication and Networks. The lesson started out very general, giving an overview of communications and its protocols. Protocols are rules that enable orderly communications to occur. Mr. Olson compared it to the way two people would talk to each other...how only one person would talk at a given time while the other would listen. In addition, networks are a collection of devices connected together via communication devices and transmission media. There are four types of networks, PAN, LAN, MAN, WAN. All of which vary in terms of scale or "reach" that is available. For example, PAN (Personal Area Network) has a 10 foot reach, while a MAN (Metropolitan Area Network has the possibility of a 50 mile reach, connecting several organizations under one network). Bandwidth (measure of data transfer capacity) also plays a key role.
I learned about TCPIP addressing vs. DHCP. The latter being easier to scale to a multitude of clients. Routers link multiple networks together and is responsible for traffic (data) that passes through it. It provides somewhat of a network security by the use of a VPN (Virtual Private Network) by encrypting data whenever it receives data to be sent out to another party, such as the untrused public WAN (Internet). The benefits of Voice Over Internet Protocol (VoIP) were also clear to me. It is basically telephone over the internet. There are situations where it can be free, VoIP-to-VoIP calls, and situations where you can be charged. The only time you the average person will be charged is when a VoIP call is made to a PSTN--normal telephone network--and the data must be converted in order to go through the Public Switch Telephone Tetwork. However, one down side is that if Internet connection is lost, then one is not able to make emergergency calls. For ex: 911. It can also be incorporated with video and web conferencing. This week contained a an abundance of information that was interesting and of course useful in both a business and personal aspect.
I learned about TCPIP addressing vs. DHCP. The latter being easier to scale to a multitude of clients. Routers link multiple networks together and is responsible for traffic (data) that passes through it. It provides somewhat of a network security by the use of a VPN (Virtual Private Network) by encrypting data whenever it receives data to be sent out to another party, such as the untrused public WAN (Internet). The benefits of Voice Over Internet Protocol (VoIP) were also clear to me. It is basically telephone over the internet. There are situations where it can be free, VoIP-to-VoIP calls, and situations where you can be charged. The only time you the average person will be charged is when a VoIP call is made to a PSTN--normal telephone network--and the data must be converted in order to go through the Public Switch Telephone Tetwork. However, one down side is that if Internet connection is lost, then one is not able to make emergergency calls. For ex: 911. It can also be incorporated with video and web conferencing. This week contained a an abundance of information that was interesting and of course useful in both a business and personal aspect.
Extra Credit: Avatar
For my avatar creation, I used the "Face Your Manga" to create an avatar that I felt was as close in resemblance as possible. The web tool was very easy to use and understand. The steps included simply clicking the create option on the website and you are immediately started on creating a new avatar. There are many details that could be altered to your pleasing. These included fatial features, hair style, clothing options, and background. I have never created an avatar before, so this was fun for me. Although it may not be totally accurate (of course), it shows what people think of themselves. I'm sure if you were to tell someone else to design an avatar based on another person, that avatar would be quite different from the original avatar. It was an enjoyable extra extra credit opportunity.
Sunday, November 7, 2010
Week 11: Clear
This week talked about the Information Systems and those who utilize this (System Analysts). What exactly is a system? It is a collection of interrelated components that interact with each other to a achieve a certain goal. A good correlation to this is the Ecosystem. In comparison, an information system deals with a collection of hardware, software, data, people and processes that work together to produce quality information. The System Development Cycle involves planning, analysis, design, implementation, operation, support and security. This cycle repeats over and over again, however, humans' intelligence are still needed to keep its functionality. System Analysts, often called Program Managers, put projects together and help to keep everything moving along smoothly. They enable other people to do work efficiently and effectively. They create road maps to get things done. The key to this is *communicaiton*.
A system analyst must derive the benefits and risks associated with a certain system. A well designed system is effective, easy to use and meets objectives. Poorly designed systems cost more than their value. They are hard to understand or use and are not dependable. The SDC (System Development Cycle) was develped to improve quality and create an overal better system. A great system analyst must accept certain leader responsibilities. This includes setting goals, objectives, expectations, estimating time constraints, estimating cost, defining order of activities and deciding the relationship of those activities. In conclusion, there are a plethora of reasons why there should be effective information systems and system analysts.
A system analyst must derive the benefits and risks associated with a certain system. A well designed system is effective, easy to use and meets objectives. Poorly designed systems cost more than their value. They are hard to understand or use and are not dependable. The SDC (System Development Cycle) was develped to improve quality and create an overal better system. A great system analyst must accept certain leader responsibilities. This includes setting goals, objectives, expectations, estimating time constraints, estimating cost, defining order of activities and deciding the relationship of those activities. In conclusion, there are a plethora of reasons why there should be effective information systems and system analysts.
Database Project
Watching the lectures and taking notes on Microsoft Access is one thing, but actually following guidelines to complete an Access project and putting what I learned in the lectures to use was quite a challenge. I learned how to create tables and the how to edit those tables to fit a certain criteria. In addition, I gained the knowlegde of importing and exporting data. There are two methods of importing data so that it can be merged with the current table. The first method involves appending where you make your table structure *identical* to the structure of the file being imported. Fields must be in the same order, with everything alike, including names. The other is the Copy/Paste method, where you import the external data to a new table and format the order of the fields in the original file so that it is the same as the exported file. Then all that is left to do is copy and ammend. I also learned how to create Queries, Forms and Reports. These are all specific ways of viewing a condensed form of the information that stems from an original data source. I also learned how to use functions and formulas, similar to Excel, in order to derive a range of data that was being asked for.
In terms of how Access can enhance its functionality, I would have to say that it can be more user friendly when it comes to the average user. In my case, I had opened up Access for the first time during Week 10 of this class. At that point in time, I was bewildered as to how to go about using the software. Without the lectures and having to do this project, I would probably still be clueless as to the majority of Access's functionalities. This can be anywhere from how one is to import or export a file, form queries/forms/reports and how to edit these as well. Simply reading a lot of text in Microsoft's help pane may not seem all that palpable to the average computer user. Instead, there should be example videos. The person shouldn't be forced to go searching online as to how to use this function or feature of Access. It is an extrememly great organizational tool however, one that most people do not utilize. This should not be the case. Now that I have some basic knowledge, I will spread the word on the usefullness of Microsoft Access.
In terms of how Access can enhance its functionality, I would have to say that it can be more user friendly when it comes to the average user. In my case, I had opened up Access for the first time during Week 10 of this class. At that point in time, I was bewildered as to how to go about using the software. Without the lectures and having to do this project, I would probably still be clueless as to the majority of Access's functionalities. This can be anywhere from how one is to import or export a file, form queries/forms/reports and how to edit these as well. Simply reading a lot of text in Microsoft's help pane may not seem all that palpable to the average computer user. Instead, there should be example videos. The person shouldn't be forced to go searching online as to how to use this function or feature of Access. It is an extrememly great organizational tool however, one that most people do not utilize. This should not be the case. Now that I have some basic knowledge, I will spread the word on the usefullness of Microsoft Access.
Week 10: Clear
This week dealt with Database Management. Everyone works with data and information. Data itself is unorganized and differentiates itself from information in that the latter is organized and can be of some use to people. However, *Databases* help to organize data so that it can become that useful information. One important tool that lets one do this is the rational database, Microsoft Access. In all honesty, before this week I had never even attemped to open the program. It is somewhat different than Microsoft Excel in that it has some key functionalites that seperate it.
Like Excel, Access utilizes tables to display its information. It supports a wide range of data types, including Text, Memo, Hyperlink, Number, Currency, Date/Time, Object, and Autonumber. Access has the ability to import or export data. Data can be appended(created) to an existing table or imported into a new table. Many different import sources are supported. The most common transitional file however, are text files. These text files can be either delimited or fixed width. Delimited deals with characters that seperate fields in a text file; for example, semi-colons, commas, or pipes (|). Fixed width is where fields are alligned in columns, defined as specific character regions. For example: chars 1-10=user ID, chars 11-41=username. Excel also has the ability to create Queries, Forms, and Reports. These all stem off of each other with the table being the sort of origin. All in all, Access is a great organizational tool that more people should know how to use.
Like Excel, Access utilizes tables to display its information. It supports a wide range of data types, including Text, Memo, Hyperlink, Number, Currency, Date/Time, Object, and Autonumber. Access has the ability to import or export data. Data can be appended(created) to an existing table or imported into a new table. Many different import sources are supported. The most common transitional file however, are text files. These text files can be either delimited or fixed width. Delimited deals with characters that seperate fields in a text file; for example, semi-colons, commas, or pipes (|). Fixed width is where fields are alligned in columns, defined as specific character regions. For example: chars 1-10=user ID, chars 11-41=username. Excel also has the ability to create Queries, Forms, and Reports. These all stem off of each other with the table being the sort of origin. All in all, Access is a great organizational tool that more people should know how to use.
Sunday, October 24, 2010
Week 9: Clear
I have been using the Internet for as long as I can remember. However, it is only with this week's lesson did I gain a true grasp on the basics of web browsing and navigating the web. The most straight-forward lesson was Naviating the Web. I had never took into consideration the aspects of the link that displays itself in the search bar of every browser.
IP (Internet Protocal) address is a number that uniquely identifies each computer or device conncected to the Internet. It consists of four groups of numbers seperated by periods, 216.239.99. There is even a website (http//whatismyipaddress.com) that one can use to find his or her own IP address. Web addresses consist of protocol, domain name, top level domain, path, and file name. Ex.http://www.pickthebrain.com/blog/21-proven-motivation-tactics/ "http://" represents the protocol, "http://www.pickthebrain/" is the url, ".com" is the TLD, "blog/21-proven-motivation-tactics/" is the path, and there is no file name. Browsers are off course what allows you to view web pages, like Mozilla, Safari, and Internet Explorer.
IP (Internet Protocal) address is a number that uniquely identifies each computer or device conncected to the Internet. It consists of four groups of numbers seperated by periods, 216.239.99. There is even a website (http//whatismyipaddress.com) that one can use to find his or her own IP address. Web addresses consist of protocol, domain name, top level domain, path, and file name. Ex.http://www.pickthebrain.com/blog/21-proven-motivation-tactics/ "http://" represents the protocol, "http://www.pickthebrain/" is the url, ".com" is the TLD, "blog/21-proven-motivation-tactics/" is the path, and there is no file name. Browsers are off course what allows you to view web pages, like Mozilla, Safari, and Internet Explorer.
Sunday, October 10, 2010
Week 7: Clear
It is unfortunately true that I have been on the receiving end of one of those presentations that leaves you dying for a nap. However, it is even more unfortunate to say that I have given a few of those presentations myself. This week's topic taught me how to effectively create a well designed and meaningful presentaion. From layout principles to readability to color/theme, there are a multitude of aspects that make a presentation stand out from the rest.
One of the most important points absorbed was to avoid clutter. Utilize open space. One must keep in mind that not all empty space should be filled in. Sometimes, there is just too much going on in a slide. The signal-to-noise ratio (SNR) stresses to avoid "noisy" graphics or charts. This refers to giving the audience the most important information as opposed to unimportant information. Do not overcomplicate or use vague graphics because your audience will focus on trying to understand the slides instead of paying attention to what is being said.
Another crucial aspect of a good presention is its readability. Make the text big enough for people in the back to read. Slides are not reading material however. If there is alot of text, provide a handout. Provide the most important points or concepts in a slide and use formatting to highlight points. In addtion, using visuals and harmonious colors can keep an audience's attention; as opposed to boring them with same colored/themed slides.
One of the most important points absorbed was to avoid clutter. Utilize open space. One must keep in mind that not all empty space should be filled in. Sometimes, there is just too much going on in a slide. The signal-to-noise ratio (SNR) stresses to avoid "noisy" graphics or charts. This refers to giving the audience the most important information as opposed to unimportant information. Do not overcomplicate or use vague graphics because your audience will focus on trying to understand the slides instead of paying attention to what is being said.
Another crucial aspect of a good presention is its readability. Make the text big enough for people in the back to read. Slides are not reading material however. If there is alot of text, provide a handout. Provide the most important points or concepts in a slide and use formatting to highlight points. In addtion, using visuals and harmonious colors can keep an audience's attention; as opposed to boring them with same colored/themed slides.
Week 6: Clear
This week's topic on Multimedia (images, audio & video) was extremely informative. The area of images caught my attention the most however. It was a relatively simple lesson but now I will be able to tell the difference between Rasper vs. Vector graphics. I've always wondered why some images became pixelated and others did not...now I know. In addition, I learned about lossless vs. lossy compression and the practical uses of each.
First off, a Rasper image is represented by an array of colored dots. The problem with rasper graphics is that when it is zoomed or magnified, you are able to see the jaggedness or blocky aspects of the photograph. They do not scale well to larger sizes. As opposed to Vector Graphics which uses "primitives" (geometrical objects, points, lines, curves, and polygons that are all expressed mathematically. This results in the ability to zoom in or out almost infinitely with no loss of quality.
Lossless compression does not throw away any data but it eliminates redundancy in the image to save space. This is good for archiving and editing images. Lossy compression discards some data that is not usually discerned-- by the majority of people. It looks just as good/crisp and is widely used. The jpg image format uses this type of compression.
First off, a Rasper image is represented by an array of colored dots. The problem with rasper graphics is that when it is zoomed or magnified, you are able to see the jaggedness or blocky aspects of the photograph. They do not scale well to larger sizes. As opposed to Vector Graphics which uses "primitives" (geometrical objects, points, lines, curves, and polygons that are all expressed mathematically. This results in the ability to zoom in or out almost infinitely with no loss of quality.
Lossless compression does not throw away any data but it eliminates redundancy in the image to save space. This is good for archiving and editing images. Lossy compression discards some data that is not usually discerned-- by the majority of people. It looks just as good/crisp and is widely used. The jpg image format uses this type of compression.
Sunday, September 26, 2010
Week 5: Clear
Having not used Excel much, this topic has taught me an abundance of useful and practical lessons. The overview of using Microsoft Excel was more than I had known before taking this course. The Workbook Structure showed me the basics of using the application. It talked about simple naviagation of spreadsheets and the data it contains, in addition to shortcuts that increase effiency and productivity.
I think it's essential that everyone have somewhat of a clue on how to use Excel, especially if that person is going into the business field. A few of the things that I learned include: Colums are lettered and rows are numbered. 2007 Excel supports 16,384 columns to be exact, as well as 65,536 rows. This was amazing to me because the previous version of Excel, the 2003 edition, had no where close to this quantity. Each cell consists of the column letter plus the row number. A few keyboard shortcuts are : Cntrl+ arrow keys to reach a boundary of data, Cntrl+ Home takes you to the top left corner of the spreadsheet, Cntrl+ Page up or down takes you through the differend layers of spreadsheets. These are but a few things I learned in this week's topic.
I think it's essential that everyone have somewhat of a clue on how to use Excel, especially if that person is going into the business field. A few of the things that I learned include: Colums are lettered and rows are numbered. 2007 Excel supports 16,384 columns to be exact, as well as 65,536 rows. This was amazing to me because the previous version of Excel, the 2003 edition, had no where close to this quantity. Each cell consists of the column letter plus the row number. A few keyboard shortcuts are : Cntrl+ arrow keys to reach a boundary of data, Cntrl+ Home takes you to the top left corner of the spreadsheet, Cntrl+ Page up or down takes you through the differend layers of spreadsheets. These are but a few things I learned in this week's topic.
Friday, September 17, 2010
Week 4: Clear
Application software presents programs that humans use on their computer to get things done. It is the software we interact with directly. Examples are Microsoft Word, Google Chrome, and Photoshop. The OS software differs from this in that it interacts with the computer's hardware to make the computer function. In other words, it is an indirect interaction. Examples include Windows XP & Vista, Mac OSX, and Snow Leopard. In addition, utility software maintains the computing environment. Examples are file management, spam-blocker, firewalls, and anti-virus. I think being able to differentiate between these three software types are crucial in the business world. Moreover, one of the easiest concepts to gain a grasp on is Horizontal vs. Vertical Applications.
Horizontal Applications are software programs that are used across different industries for many different uses by a multitude of people. They are general use programs that *span across* numerous industries (thus the name "horizontal" application). Examples include word processing, web browsing, and music software. Whereas Vertical Applications are programs that are designed to meet the specific needs of a business market. It meets the needs of a single industry. Usually pertains to enterprise class software which is what you would rely on to run a business. Examples include CRM (customer relations management) software, which keeps track of a customer's connection to a company in terms of his or her history, and Point-to-Sale software, which keeps track of inventory and supplies needed. Applications are vital when it comes to running a business. Thus knowing what kind of application is needed, can be done using a "needs analysis," can greatly benefit one's company in regards to efficiency and productivity.
Sunday, September 12, 2010
Week 3: Clear
After watching all the lectures, I learned so much about computers that I felt like I should have known before. Now I have a general idea of what certain components look like, they're function, and how it adds to the fluidity of the operating system. But what got my attention was the short little video on Ergonomics. I think that this is a crucial bit of information to anyone who uses a computer for a long period of time.
I learned that Musculoskeletal Disorders account for one third of all work related illnesses which was a shock to me. It can be easily prevented by having a neutral body posture, which is when your body is in natural allignment, using the larger muscle groups (i.e hands over fingers), and maintaing neural posisiton of your wrist. These three simple steps can lead to a productive experience in the office environment or to anyone at home.
I learned that Musculoskeletal Disorders account for one third of all work related illnesses which was a shock to me. It can be easily prevented by having a neutral body posture, which is when your body is in natural allignment, using the larger muscle groups (i.e hands over fingers), and maintaing neural posisiton of your wrist. These three simple steps can lead to a productive experience in the office environment or to anyone at home.
Sunday, September 5, 2010
Week 2: Muddy
I'm going to be completely honest. I am not the most technology-suave person. Even typing is sometimes a hassle for me because I'm not very fast so it takes me a while to get things done. Moreover, the topic at hand this week, "The Personal Computer," seems really interesting.
As I mentioned before, I'm not all that good with technology, but going in depth on opertings systems and the types of hardware needed should bring me closer to understanding a computer. In addition, businesses are all about money. Therefore having the knowledge of what kind of hardware, or what kind of requirements are needed to fulfill a certain job, is invaluable to a business. Not only will they become more productive, but also more efficient.
As I mentioned before, I'm not all that good with technology, but going in depth on opertings systems and the types of hardware needed should bring me closer to understanding a computer. In addition, businesses are all about money. Therefore having the knowledge of what kind of hardware, or what kind of requirements are needed to fulfill a certain job, is invaluable to a business. Not only will they become more productive, but also more efficient.
Thursday, September 2, 2010
Week 1: Clear
To start things off, the topics being discussed in the first week of this class gave me a much better understanding of using the World Wide Web in general. In all actuality, I found the lesson on what constitues a copyright the most clear. Before reading up on it, I did not know the basis for which one can use copyrighted material. Only one of the following must apply when one uses a copyrighted work: 1. user is also copyright owner, 2. copyright owner has given permission to the user in the form of writing, 3. material is in the public domain.
One thing that was a treat for me was the Disney Copyright video. Not only was it witty in terms of the collective characters used, but for the purpose it was used for. During the video I was thinking to myself, "Doesn't this count as copyright ingringement." This was because they were using clips from another company's movies. However, I understood why this was not the case when the video was coming to a closure. This is due to the fact that the video was being used for *educational* purposes. Thus, I truly enjoyed the video and the lesson.
Link to "Disney Copyright video": http://www.youtube.com/watch?v=CJn_jC4FNDo
One thing that was a treat for me was the Disney Copyright video. Not only was it witty in terms of the collective characters used, but for the purpose it was used for. During the video I was thinking to myself, "Doesn't this count as copyright ingringement." This was because they were using clips from another company's movies. However, I understood why this was not the case when the video was coming to a closure. This is due to the fact that the video was being used for *educational* purposes. Thus, I truly enjoyed the video and the lesson.
Link to "Disney Copyright video": http://www.youtube.com/watch?v=CJn_jC4FNDo
Subscribe to:
Comments (Atom)

