Adrian

Student Page Setup: Adrian1px2020 My lifetime Pom By Adrian Cheng Period C2  I was frustrated on accidently hitting my head with the reinforced wall but I was never frustrated sitting down on the softened floor. I was patient about reading the mysterious book but I was impatient about waiting for lengthened hours. I enjoy playing tedious games but I did exasperating tests unenjoyably. I loved to fall in dreams but I hated uninteresting classes.
 * __ Yesterday __**

I am frustrated to reassemble a colossal Rubik’s Cubes but solving one never frustrates me! I am patient when solving logical questions but I am impatient of tedious reading. I enjoy motivating tests but I do worksheets unenjoyably. I love to feel proud but I hate when others say unenthusiastic things to me.
 * __ Today __**

Thinking too hard will frustrate me but I won’t be frustrated when sleeping calmly. I will be patient if I am sitting but I won’t if I am standing. I will enjoy sitting on a couch doing nothing but I will exercise unenjoyably. I will love to be swarming in my family but will ate if I am alone.
 * __ Tomorrow __**

Three Happy Poems Adrian Cheng C2

Wake up in the clouds

can’t believe I can make it

my love is right here

Hearing stepping sounds

knowing my parcel arrived

I open the door

Peace in the large world

saving innocent people

love to everyone

The Horrible Incident Adrian Cheng C2 MY EXAMPLE:

A horrified moment of screaming, Becoming a falling stone, Crouched down while the bird is shattering,

Detached engines crashed into oblivion, Engines that still attached is flaming, Fast detaching cockpit shooting down to the ground like a bullet, Grabbing on to anything I can while bleeding, How it is so quite, It’s so still, so silent but still hearing people screaming, Just when I tried to stand up I hear a spark, Knowing and smelling jet fuel leaking, Last I will ever live, My vulnerable body is helpless but still hoping, Nasty waves of pain came in, On the moment of hopelessness, I can see lights flashing, Permanent death for anything, Questioning survival, Repeating flashback illusions, Separating from happy family, Together having dinner, Unbelieving resting on a stretcher, Vastly intense firemen, Washing out the fire, Xray scans by body, while in pain, Yes, knocking me into unconsciousness, Zzz I go.

Tech Mystery Adrian Cheng C2

The technical stuff that people don’t understand. Electronics that people use all day. Calculators that are so advanced we call it computers. How is it possible to make this thing with so many buttons so easy? Never know the mystery of the computers. Only scientists know the answer. Loving curiosity in the mystery. Oh so difficult but yet so easy. Gasping the thirst to know about the great machinery. Yelling to release excitement!

Apple

I am very famous. People like me and uses me and learn from me. I have a bite mark on the right. I love to be a logo of a company that have such a business. I am the fruit that the people love to eat and change the world by accidentally falling of my tree. I am the one that started the force that is known gravity. You know Isaac Newton.

**My persuasive essay** Adrian Cheng Friday, May 9th, 2014 Period C2  ** The Trojan horse In A Whole New Era ** Have you ever heard of a Trojan horse? A Trojan horse is a wooden statue of a horse used by the Ancient Greeks to hide soldiers in order to enter the kingdom of Troy. There is now a digital version of a Trojan called Trojan virus. It attacks when you download a program and you get a message that your computer has a virus. To prevent panic attacks, you have to know how it works, what is a fake AV, and what is a exploit Trojan.

As technology advances, hackers will have new ways to gain control over your electronic devices. Hacking is becoming an issue as more and more internet users are put their money in computers. Thus giving hackers a chance to invade personal properties. Nowadays, one of the most common viruses is Trojan. Trojan is a virus that spreads from a software into the computer itself. Unlike other viruses, Trojan doesn’t clone itself, instead they use different tactics to access to your privacy. There are many different types of Trojan; some of them can be as harmful as rendering the computer useless, whilst others wouldn’t affect the computer much. Be careful when downloading programs from the web and always use trusted and verified programs. One of the most downloaded Trojan is the Fake Av, meaning fake anti-virus. Most people are aware of the fake anti-viruses acting like they are searching for viruses or malware; malwares are programs that have viruses in them. What most people don’t know is when they click on the search button, they activate the virus spreading progress from the program itself and that can be dangerous. Usually the smart Fake Av programs will say there is a malware or virus that is detected and tells you that you have to click a button so that the Fake Av will pretend to get rid of the virus but instead the Fake Av will spread even more viruses while you think it is killing your computer’s viruses. Some Fake Av viruses aren’t harmful but some will actually do some damage. Always make sure you are downloading the right anti-virus program, otherwise instead of helping your computer, it harms your computer.

As you know by now, Trojan viruses disguise like a normal harmless program but it can affect your computer. Downloading unverified programs can be dangerous but the Exploit Trojan is one of the most harmful viruses that you can be infected on. The Exploit Trojan finds a security weakness in any of your installed programs that store confidential data from social media status up to bank accounts. The Exploit Trojan doesn’t only find security vulnerabilities, they also find bugs and glitches in the programs and if the Trojan has found the glitch or bug, it may start sending out your confidential information to the hacker itself making you as vulnerable as an ant under an elephant. Exploit Trojan is dangerous and it will absolutely and most definitely harm your computer.

Now you know what a Trojan is, you can go out and download stuff without getting panic attacks. Hackers already know what are your weaknesses are, but now you know the hacker’s weaknesses are so you can prevent yourself from being hacked or robbed.

My Poem Presentation media type="custom" key="24244946"

My FtM Project Presentation media type="custom" key="25508010" The animation video itself media type="file" key="FtM Project FINAL.mp4" width="300" height="300" media type="custom" key="24244964"