Thursday, 17 January 2013
Wednesday, 14 November 2012
Unit 1 M2
Threats and risks likely to arise from using IT based communication within a large company.
Some threats form using IT based communication in a large company is that you can get a virus this would be very bad for your computer, if you had a virus it could affect some of the computers within the large company you work. There is also little risks like if you forget your password this obviously can be fixed easily but can hamper employees. Another problem is that if you are hacked then there would be serious problems as people would see key information and possible company secrets. Most threats are caused by people trying to hack into the companies computers or if a virus gets in this is why it is important to have up to date and effective security.
Tuesday, 13 November 2012
Unit 1 D1
Risks And Safety Issues With Social Networking Sites
There are some issues with social networking sites a few are problems with safety. Some issues are that with social networking sites such as Facebook are prone to having advertisements and sometimes pop ups this is a problem as some links and pop ups cause viruses but sometimes that cannot be prevented but something that can be prevented is the amount of people that give crucial information out such as : if they are going to be on holiday or some company information sometimes you just need to think about what you are typing and the possible repercussions and safety issues and that would rapidly decrease. You should also not click on links unless you know its ok or you might face a virus. There are also people who are key loggers who when you have clicked a link can see what you are typing so they can see information about you like pin codes and passwords, this can be prevented by not clicking on unfamiliar advertisements or websites.
There are some issues with social networking sites a few are problems with safety. Some issues are that with social networking sites such as Facebook are prone to having advertisements and sometimes pop ups this is a problem as some links and pop ups cause viruses but sometimes that cannot be prevented but something that can be prevented is the amount of people that give crucial information out such as : if they are going to be on holiday or some company information sometimes you just need to think about what you are typing and the possible repercussions and safety issues and that would rapidly decrease. You should also not click on links unless you know its ok or you might face a virus. There are also people who are key loggers who when you have clicked a link can see what you are typing so they can see information about you like pin codes and passwords, this can be prevented by not clicking on unfamiliar advertisements or websites.
Unit 1 M1
Why Blogspot is an effective method of communication ?
There are many reasons why Blogspot is an effective method of communication, Blogspot is handy as it is accessible from a mobile device, this is handy as there are very few websites and blogs that have this capability. Your uploads and work can also be seen this is handy in a school or work situation, it would be far more handy to use Blogspot than Facebook. A very good feature is that you get email notifications to let you know about changes on your Blogspot and if someone has uploaded or commented on a video or on your website. Another good point is that it is easily accessible at home/work or on the move this makes Blogspot a good website and an effective method of communication and far superior then other blog sites.
Thursday, 8 November 2012
Unit 2 M1
M1 – Web designer for Edward Cowen
1.
The skills needed for this job is an extensive
knowledge of how to program, edit and publish websites.
2.
You also need to be able to attract people with
clever, witty and informative websites.
3.
A good knowledge of software needed on both
Microsoft and McIntosh.
4.
You need to be willing to take constructive
critism.
5.
Take pride and presentate your work.
You also need to work independently and
take your work home to make improvements.
These skills are very important because you
will need the skills to actually do your work and the other skills you will
need to become a well-respected and like employee and individual at the office.
Thursday, 18 October 2012
Unit 14 M3
Unit 14 M3
There are many mechanisms put in place to combat and control the likely hood of some off the illegal occourences in P6 happening
Some mechanisms put in place are WiFi's are equipped with there own individual password so the likely hood of piggy backing is next to none the only way is if you hacked the password. If you have a password you can also prevent war driving.
The way to stop phone hacking is to change the password this is how the scandeled occoured as some of the passswords where 0000 or 1234 so if you change it then there is less of a chance of being hacked.
If you check your phones and run regular scans and make surwe no one can hack into your phone your data will also not be stolen.
Unit 14 D2
I used Bluetooth in P7 because even though it is slower it is more effective and it always goes through as long as you give it time another good aspect is that its free but there are a few negative point such as you cannot take the phones far away from each other so you are limited to what you can do until it sends but it is the easiest way for begginers as it is simple and you don't have to do too much.
Subscribe to:
Comments (Atom)