Free Essay


In: Computers and Technology

Submitted By johnpoole12k
Words 312
Pages 2
John Poole
Unit 1: Assignment 1

An example of an application would be XBOX to make it an HTML feature. A few Safety and security pose for over site there’s three valid situations, one is using Use parental controls, monitoring kid’s play, and making sure the player disguises his or her identity. Another situation where and argument of Xbox Live chatter between a Canadian and a Texan turned serious when the latter gamer disclosed plans to shoot up his high school. The Texas gamer began by detailing his troubles in school to a Port Alberni, British Columbia Xbox Live opponent, which was normal enough, but eventually the Texas gamer spilled details on plans for attacking his school, including rattling off the names of fellow students he was going to target. The talk alarmed the B.C. gamer enough that he contacted local Royal Canadian Mounted Police personnel, who started a cyber-investigation. The RCMP contacted Microsoft and was eventually directed to a teenage suspect in San Antonio, Texas, who was arrested and is facing untold charges. Port Alberni RCMP Staff Sgt. Lee Omilusik commented on the case: This incident demonstrates the power of the electronic world and how different enforcement agencies can quickly work together to protect the citizens they serve, regardless of obstacles such as international barriers The arrested boy was 16-years old and a student at John Marshall High School. The school issued a short message (PDF) to parents indicating that the boy would be removed from school “indefinitely.” Local ABC station KSAT indicated that the gamers were playing Call of Duty: Modern Warfare 2. Thanks Andrew and whoever posted about it in the Shoutbox! Basically by calling Xbox service they typically handle these situations and threats commonly.

Similar Documents

Free Essay

Wcdma Ho & Cdr Problem Huawei

...W-Handover and Call Drop Problem Optimization Guide For internal use only Product name WCDMA RNP Product version 3.3 Confidentiality level For internal use only Total 201 pages W-Handover and Call Drop Problem Optimization Guide (For internal use only) Prepared by Reviewed by Jiao Anqiang Xie Zhibin, Dong Yan, Hu Wensu, Wan Liang, Yan Lin, Ai Hua, Xu Zili, and Hua Yunlong Wang Chungui Date Date 2006-03-16 Reviewed by Approved by Date Date Huawei Technologies Co., Ltd. All Rights Reserved 2009-10-10 All rights reserved Page 1 of 201 W-Handover and Call Drop Problem Optimization Guide For internal use only Revision Records Date Version Description Completing V2.0 W-Handover and Call Drop Problems. According to V3.0 guide Author Cai Jianyong, 2005-02-01 2.0 Zang Liang, and Jiao Anqiang requirements, Jiao Anqiang reorganizing and updating V2.0 guide, focusing more on operability of on-site engineers. All traffic statistics is from RNC V1.5. The update includes: Updating flow chart for optimization Moving part of call drop due to handover problem to handover optimization part Specifying operation-related part to be more 2006-03-16 3.0 applicable to on-site engineers Updating RNC traffic statistics indexes to V1.5 Integrating traffic statistics analysis to NASTAR of the network performance analysis Optimizing some cases, adding new cases, and removing outdated cases and terms Moving content about handover and......

Words: 49826 - Pages: 200