LIFE WITH COMPUTER
Saturday, 30 January 2021
Thursday, 8 March 2018
Security Measure
Definition of security measures:
The
precautionary measures taken toward possible danger or damage.
Security Measure
|
Explaination
|
Cryptography
|
Technology of encoding
information so it can only be read by authorized individuals
Encryption
•
Process of converting readable data into unreadable characters
to prevent unauthorized access
Decryption
•
Process to decode encrypted data.
|
Data Backup
|
•
A data backup is the result of copying or archiving files
and folders for the purpose of being able to restore them in case of data
loss.
•
Data loss can
be caused by many things ranging from computer viruses, hardware failures,
file corruption, system failure or theft.
|
Antivirus
|
•
Anti-virus software is a program or set of programs that are designed to prevent,
search for, detect and remove software viruses and other malicious
software like worms, Trojan horses, adware and more.
|
Anti-spyware
|
•
Spyware is
a type of malware that is installed on a computer without the user's
knowledge in order to collect information about them.
|
Human Aspect : Awareness
|
•
Ethics - Be a good cyber citizen
Do not engage in inappropriate
conduct,
such as cyber
bullying, cyber stalking or
rude and offensive behavior.
Do not use someone else's password or other
identifying information.
|
Firewall
|
•
A firewall is a system designed to prevent unauthorized
access to or from a private network.
|
Physical Access Control
|
•
Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a
coffee shop, use a security device, such as a laptop security cable.
•
Lock doors and windows, usually adequate to protect the equipment.
|
![]() |
Firewall |
![]() |
Data Backup |
![]() |
Cryptography |
Types of Computer Security Risk
What is computer risk??
Any
event or action that could cause a loss
of or damage to
computer hardware, software, data, information or processing capability.
|
Areas of Computer Ethics
WHAT DOES IT MEAN BY COMPUTER ETHICS???
The moral
guidelines that
govern the use of computers, mobile devices and information systems.
There 5 types of Areas of Computer Ethics
![]() |
Information Accuracy |
![]() |
Green Computing |
![]() |
Intelectual Property |
![]() |
Information Privacy |
![]() |
Code of Conduct |
Information Accuracy
•One of the concern because many users
access information maintained by
other people or companies.
•Do not assume
all the information on the Web is
correct.
•Users should evaluate
the value of a Web page before relying on its
content.
•Be aware that the organization providing
access to the information may not be the
creator of the information.
Green Computing
Environmentally
responsible and eco-friendly use of computers and their resources.
In broader
terms, it is also defined as the study of designing,
manufacturing/engineering,
using and disposing of computing
devices in a
way that
reduces their environmental impact.
Intelectual Property
•Unique and original works such as ideas,
inventions, literary and artistic works,
processes, names and logos.
•Or,
refers to creations of the mind: inventions,
literary and artistic works, and
symbols, names, images, and designs used
in commerce.
•Intellectual property rights are the rights to which creators
are entitled for their
work.
Information Privacy
The right of individuals and companies to
deny or
restrict the collection, use, and dissemination of
information about
them.
Codes of Conduct
Written
guideline that helps determine whether a specific
action is ethical/unethical
or allowed/not allowed.
(Intellectual
Property - IP)
- Patent
- Trademark
- Copyright
The importance of intelectual property:
•To protect any original work that
created by individual person/ company for
example, image, drawing, lyric,
publishing and so on.
•Preserve the features and processes
that make things work. This lets
inventors profit from their inventions.
PATENT
A
patent is a set of exclusive rights granted by a government to an inventor or
applicant for
a limited amount of time (normally 20 years from the filing date).
Its
a legal document defining
ownership of a particular area of new
technology.
Invention - a product or a process that
provides a new way of
doing something, or
offers a new technical solution to a problem.
The
right granted by a patent excludes
all others from making, using, or selling a
COPYRIGHT
Protection provided to the authors
of “original works” and
includes such things
as literary, dramatic, musical,
artistic, and certain other intellectual creations, both
published and unpublished.
TRADEMARK
Trademark is a word,
phrase, symbol, design, combination of letters or numbers, or
other device that identifies
and distinguishes products
and services in the marketplace.
• Or a distinctive
sign which identifies certain goods or
services.
•Or can be any distinctive
name or logo.
Thursday, 1 March 2018
Rules of Netiqquette
Today is the second day March , this week are very hectic because there are alot of assignment to do.What I have done to make sure my assignment can be done on time is arranging my time wisely.
So, today I would like to share about the rules of netiqquete..
Firstly,what do you mean about the netiquette?
Netiquette is ;
So, today I would like to share about the rules of netiqquete..
Firstly,what do you mean about the netiquette?
Netiquette is ;
- Refers to the etiquette of the internet
- Is the code of acceptable behaviours users should follow while on the Internet or online or cyberspace.
- Rules for all aspects of the:
- World Wide Web
- Instant Messaging
- Chat rooms
- Newsgroups & message board
When do these rules apply?
Anytime
when you are using…
•Chatting
online
•Using
email •Social
media
•Using
web
•Internet
messaging
•FTP
•Posting
to a discussion
•Blogging
•Playing
online games
So, there are alot of guidelines netiquette for online communication.
Rule 1: Remember the Human
When communicating electronically, whether through email, instant message, discussion post, text, or some other method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written word
are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?"
Rule 2: Adhere to the same standards of behavior online that you follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?
Rule 4: Respect other people's time and bandwidth
Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.
Rule 5: Make yourself look good online
One of the best things about the virtual world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind:
- Always check for spelling and grammar errors
- Know what you're talking about and state it clearly
- Be pleasant and polite
Rule 6: Share expert knowledge
The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well.
Rule 7: Help keep flame wars under control
What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.
Rule 8: Respect other people's privacy
Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.
Rule 9: Don't abuse your power
Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you who posesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human.
Rule 10: Be forgiving of other people's mistakes
Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.
![]() |
Do not spam |
![]() |
Use the emoticons |
![]() |
Use the abbereviation |
![]() |
Be polite |
Subscribe to:
Posts (Atom)
-
What is computer risk?? Any event or action that could cause a loss of or damage to computer hardware, software, data, information or...
-
Definition of security measures: The precautionary measures taken toward possible danger or damage. Security Measure Ex...
-
Today is the second day March , this week are very hectic because there are alot of assignment to do.What I have done to make sure my assign...