Friday, January 22, 2010
Tuesday, January 19, 2010
Review Questions #10 and 11
10. Computers threaten our personal privacy on several front. Corporate and government databases accumulate and share massive amounts of information about us against our will and without knowledge. Corporate managers use monitering software to measure agencies secretly monitor telephone calls and transmitted data.
Security measures are ued to prevent computer crime and help protect privacy rights.
11. Smart weapons are missiles that use computerized guidance systems to locate their targets and allows a human operator to control its path. It can greatly reduce th eamount of civilian destruction. A problem with samrt weapons is that they reduce the time humans have mor life-or-death situations.
Posted by Muna at 11:20 AM 0 comments
1. i do nit RFID tags will be widely accpted becuase it may require time for people to adjust to a new ideo world-wide.
Posted by Muna at 7:00 AM 0 comments
Monday, January 18, 2010
Review Questionspage 379
#7 What are the two inherit characteristics of computers that make security so difficult?
1. A comp uter does exactly what it is porgrammed to do, including reveal sensitive information. Anyone can program a computer.
2. a computer can only does what it is programmed to do, it cannot protect itself from malfunctions.
8. Describe several different computer security techniques, and explain the purpose of each.
some computer secuirty techniques include, a smart card containing digitally encoded identification in a built-in memory chip.
Voice print or finger print detected by biometrics.
Firewalls keep networks secure while enabling communication with the rest of the internet.
Encryption protects transmitted information.
Posted by Muna at 11:19 AM 0 comments
Thursday, January 14, 2010
pg 372-374
Will computers be democratic?
Today computers are used to promote democtratic ideals such as blogging experiences at war or lobbying for a cuase online but many organizations use computers t o promotes personal businesses. Many wonder Will personal computers and the internet empower ordinary citizens to make better lives for themselves?
Will the Global Village be a community/
Many countries are able tom comuncate online, this may promote peace throughout countries or have countries fihting in information wars.
Will we become information slaves?
MAny wonder if humans will be able to adapt to a h\faster paced society with the advent of the internet. The information age may change the way people act, learn and interact.
Standing on the shoulders of Giants
By learning about the inventors and their inventions we are able to learn about the past and past inventions that make up modern day society.
There are many uses for computer technology today such as improving health care in differenct countries and education opportunities or the invention of unmanned combat aircraft to prevent a lost life.
Posted by Muna at 10:19 AM 0 comments
Wednesday, January 13, 2010
Review Questions #2/4
Why is it hard to estimate the extent of computer crime?
Many computer crimes go undetected and unreported becuase businesses fear if computer crfimes are detected thay would lose more from negative publicity than the actual crime. businesses do know that instituions lose billions of dollars every year to computer criminals.
What is the most common computer crime? Who commits it? What is being done to stop it?
Theft is the most common form of computer crime, computers are used to steal money, goods, information and computer resources.
Examples of people that have commited computer crime are intruders who broke into a credit card website, the company has created a safer website.
two Russian men were arrested for breaking inteo several US Company networks.
Posted by Muna at 11:21 AM 0 comments
Many computer users today face a growing problem of hacked files and emails, proving passwords are just not enough. New technologies have emerged as a solution to this poblem such as security questions aupon accessing your network or biometric technology that may scan physical features. These techniques which are now used by many people continue to grow ad develope and serve as a solution to these social and ethical issues such as security or reliability issues.
Posted by Muna at 12:07 AM 0 comments
Wednesday, January 6, 2010
What are the different levels of access to the internet?
The levels that one can access the internet by are categorized by scope and scale.
Posted by Muna at 1:00 AM 0 comments
Monday, January 4, 2010
Questionsjanuary 4, 2009
2-Watch Networks video 1, 2, 33- Watch video:http://www.youtube.com/watchv=Cma3MABaHsw
Posted by Muna at 11:55 AM 0 comments
