Un-restricted Internet Access - Should Internet access be restricted in the UK as it is in some countries?
Yes it should because it protects people especially children from things that are unsuitable to view.
2. Copyright theft - should you be allowed to access and download music and films for free off the Internet?
No because its copyright theft, but personally I think you should be allowed
3. ICT and job losses - how have computers changed the workplace?Because it is a step forward in technology and it requires less people so less employees are needed so it saves big business’s money and time
CCTV and monitoring - Is it OK to have 'Big Brother' watching every move you make out on the street and on the Internet?
No because everyone has the right to privacy
5. Pace of life - Has ICT made life too fast? Or do we need to chill out a bit?
Yes it has made life too fast but it’s a step forward in technology and something that is used in everyday life, the world would struggle if we didn’t have computer
.Reading and writing - Does it matter that we are not reading and writing as much as people did a few decades ago. Should there be even less focus on skills like writing as many people rarely need to write anything (they type it all)? Should all exams be computer (typing) based?
I think that this does matter because it will make me people more and more illiterate and it doesn’t give them a chance to practice reading and writing skills
7. Communication - How has it changed over the last 20 years? What effects has this had on society?
8. Fitness - Is the world of IT leading to more people being unhealthy? Will we all become massively overweight and rarely step out of our houses when computer games become nearly perfectly lifelike and most jobs can be carried out from home via the Internet?
9. Relying on IT - Do we rely on IT too much?
Yes we do as we are very dependant on it and rely on it to do too much and most of the work in a everyday job
10. The price of technology - should everyone be given free access to computers? Should you all be given lap tops and free Internet access?
11. The digital divide - what can be done about the digital divide? Does it matter? What implications does it have? Are your grandparents
Friday, 27 March 2009
Tuesday, 24 March 2009
EXL 6
Computer Virus- Worldwide
The new virus "Conficker" has already spread, by some estimates, to nearly 9 million computers world wide 'Conficker' exploits Microsoft computers by stealing passwords via email, internet connection or by removable media devices like sub memory sticks.
the virus is dormant --hanging out in the background-- just waiting for the programmer to activate it. Until then no one knows who originated it and what it is designed to do. Peterson says the best defense against conficker is downloading computer updates, installing security software and changing passwords frequently. The worm is spreading through low security networks, memory sticks, and PCs without current security updates.
The malicious program - also known as Downadup or Kido - was first discovered in October 2008.
9.5 million computers have been infected
According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.
It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.
Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.
Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.
But Conficker does things differently.
Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.
The new virus "Conficker" has already spread, by some estimates, to nearly 9 million computers world wide 'Conficker' exploits Microsoft computers by stealing passwords via email, internet connection or by removable media devices like sub memory sticks.
the virus is dormant --hanging out in the background-- just waiting for the programmer to activate it. Until then no one knows who originated it and what it is designed to do. Peterson says the best defense against conficker is downloading computer updates, installing security software and changing passwords frequently. The worm is spreading through low security networks, memory sticks, and PCs without current security updates.
The malicious program - also known as Downadup or Kido - was first discovered in October 2008.
9.5 million computers have been infected
According to Microsoft, the worm works by searching for a Windows executable file called "services.exe" and then becomes part of that code.
It then copies itself into the Windows system folder as a random file of a type known as a "dll". It gives itself a 5-8 character name, such as piftoc.dll, and then modifies the Registry, which lists key Windows settings, to run the infected dll file as a service.
Once the worm is up and running, it creates an HTTP server, resets a machine's System Restore point (making it far harder to recover the infected system) and then downloads files from the hacker's web site.
Most malware uses one of a handful of sites to download files from, making them fairly easy to locate, target, and shut down.
But Conficker does things differently.
Anti-virus firm F-Secure says that the worm uses a complicated algorithm to generate hundreds of different domain names every day, such as mphtfrxs.net, imctaef.cc, and hcweu.org. Only one of these will actually be the site used to download the hackers' files. On the face of it, tracing this one site is almost impossible.
EXL 3
Across3.
This keeps your user area secure PASSWORD
7. Another name for a computer on a network WORKSTATION
8. This usually connects a LAN together CABLE
9. The software that keeps the network safe from hackers and viruses FIREWALL
Down1. The machine that stores your data and files FILESERVER
2. This tells the server who you are and which files to present to you USERNAME
4. Hardware that can be connected to a network and shared PERIPHERAL
5. The largest WAN in existence INTERNET
6. The network topology which has a server in the middle STAR
10. The network topology which sends data in one direction only RING
This keeps your user area secure PASSWORD
7. Another name for a computer on a network WORKSTATION
8. This usually connects a LAN together CABLE
9. The software that keeps the network safe from hackers and viruses FIREWALL
Down1. The machine that stores your data and files FILESERVER
2. This tells the server who you are and which files to present to you USERNAME
4. Hardware that can be connected to a network and shared PERIPHERAL
5. The largest WAN in existence INTERNET
6. The network topology which has a server in the middle STAR
10. The network topology which sends data in one direction only RING
Friday, 13 March 2009
In ICT terms, what is a virus?
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
When did the first ICT viruses appear and what did they do? The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971
What effects can malicious viruses have?
Can hack into your folders and delete your files
What is the most common way to be affected by a virus?
Through pornography or an email attachmentWhat is anti virus software?
Something that protects your computer and files from being infected by viruses.
Give two examples of anti virus software
Norton Anti Virus, MacAfee virus scan
Why is it important to constantly update anti virus software?
Because new viruses are introduced so software needs to be updated for protection against new viruses.
Give three sensible precautions you can take, to stop the spreading of viruses
Don’t go on porn
Check for viruses when opening an email
Update your virus software.
Describe what each of the computer pests do, and how they get onto your computer: Trojan, Worm, Adware/Spyware, and Logic bomb . You might need to surf the internet to find out about some of these.
A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.
When did the first ICT viruses appear and what did they do? The Creeper virus was first detected on ARPANET, the forerunner of the Internet in the early 1970s Creeper was an experimental self-replicating program written by Bob Thomas at BBN in 1971
What effects can malicious viruses have?
Can hack into your folders and delete your files
What is the most common way to be affected by a virus?
Through pornography or an email attachmentWhat is anti virus software?
Something that protects your computer and files from being infected by viruses.
Give two examples of anti virus software
Norton Anti Virus, MacAfee virus scan
Why is it important to constantly update anti virus software?
Because new viruses are introduced so software needs to be updated for protection against new viruses.
Give three sensible precautions you can take, to stop the spreading of viruses
Don’t go on porn
Check for viruses when opening an email
Update your virus software.
Describe what each of the computer pests do, and how they get onto your computer: Trojan, Worm, Adware/Spyware, and Logic bomb . You might need to surf the internet to find out about some of these.
Friday, 27 February 2009
EXL 1
The national lottery couldnt run without the use of OMR as it would make the process of processing tickets and making tickets very long and very tideous. Also they can process as much as 5,000 tickets an hour so this means the sales can go up as they are being produced much faster. Which means profits are raised for the business.
Subscribe to:
Posts (Atom)