Sunday, 18 March 2012
storage
In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor. There are two general usages.
1) Storage is frequently used to mean the devices and data connected to the computer through input/output operations - that is, hard disk and tape systems and other forms of storage that don't include computer memory and other in-computer storage. For the enterprise, the options for this kind of storage are of much greater variety and expense than that related to memory. This meaning is probably more common in the IT industry than meaning 2.
2) In a more formal usage, storage has been divided into: (1) primary storage, which holds data in memory (sometimes called random access memory or RAM
) and other "built-in" devices such as the processor's L1 cache, and (2) secondary storage, which holds data on hard disks, tapes, and other devices requiring input/output operations.
Primary storage is much faster to access than secondary storage because of the proximity of the storage to the processor or because of the nature of the storage devices. On the other hand, secondary storage can hold much more data than primary storage.
In addition to RAM, primary storage includes read-only memory (ROM) and L1 and L2 cachememory. In addition to hard disks, secondary storage includes a range of device types and technologies, including diskettes, Zip drives, redundant array of independent disks (RAID) systems, and holographic storage. Devices that hold storage are collectively known asstorage media.
A somewhat antiquated term for primary storage is main storage and a somewhat antiquated term for secondary storage is auxiliary storage. Note that, to add to the confusion, there is an additional meaning for primary storage that distinguishes actively used storage from backup storage.
RELATED GLOSSARY TERMS: hard disk, magnetoresistive head technology, yottabyte, serverless backup, byte, partition, InfiniBand, failover, RAMAC (random access method of accounting and control), Fibre Channel
output divice
Here are some examples of output devices.
Monitor - A monitor is the screen on which words, numbers, and graphics can be seem. The monitor is the most common output device. | ![]() |
Compact Disk - Some compact disks can be used to put information on. This is called burning information to a CD. NOTE: A CD can also be an input device. | ![]() |
Printer - A printer prints whatever is on the monitor onto paper. Printers can print words, numbers, or pictures. | ![]() |
Speaker - A speaker gives you sound output from your computer. Some speakers are built into the computer and some are separate. | ![]() |
Disk Drives - A disk drive is used to record information from the computer onto a floppy disk or CD. | ![]() |
Floppy Disk - A floppy disk is used to record information on. The information is stored on the floppy disk and can be used later or used on another computer. | ![]() |
Headphones - Headphones give sound output from the computer. They are similar to speakers, except they are worn on the ears so only one person can hear the output at a time. | ![]() |
input device
Here are some examples of input devices.
Note: An APPLICATION is a type of computer program.
Some applications are word processing, spreadsheets, databases, and games.
Camera - most cameras like this are used during live conversations. The camera transmits a picture from one computer to another, or can be used to record a short video. | ![]() |
Compact Disc (CD) - CDs store information. The CD can then be put into another computer, and the information can be opened and added or used on the second computer. Note: A CD-R or CD-RW can also be used as an OUTPUT device. | ![]() |
Keyboard - The keyboard is a way to input letters or numbers into different applications or programs. A keyboard also has special keys that help operate the computer. | ![]() |
Mouse - The mouse is used to open and close files, navigate web sites, and click on a lot of commands (to tell the computer what to do) when using different applications. | ![]() |
Digital Camera - A digital camera can be used to take pictures. It can be hooked up to a computer to transfer the pictures from the camera to the computer. Some digital cameras hold a floppy disk, and the floppy disk can be taken out of the camera and put directly into the computer. | ![]() |
Drawing Tablet - A drawing tablet is similar to a white board, except you use a special pen to write on it and it's connected to the computer. Then the word or image you draw can be saved on the computer. | ![]() |
Microphone - A microphone is used to record sound. The sound is then saved as a sound file on the computer. | ![]() |
Scanner - A scanner is used to copy pictures or other things and save them as files on the computer. | ![]() |
Disk Drive - A disk drive can hold a CD or a floppy disk. It reads the information on the disk so that the computer can use it. | ![]() |
Joystick - A joystick is used to move the cursor from place to place, and to click on various items in programs. A joystick is used mostly for computer games. | ![]() |
Touch Screen - A touch screen is a computer screen or other screen that you can touch with your finger to enter information. Examples of touch screens include a smart board, a microwave, a dishwasher, or an ATM at a bank. | ![]() |
Bar Code Scanner - A bar code scanner scans a little label that has a bar code on it. The information is then saved on the computer. Bar code scanners are used in libraries a lot. | ![]() |
Friday, 24 February 2012
What is Intellectual Property?
Intellectual property is any innovation, commercial or artistic, or any unique name, symbol, logo or design used commercially.
Intellectual property is protected by
• patents on inventions;
• trademarks on branding devices;
• copyrights on music, videos, patterns and other forms of expression;
• trade secrets for methods or formulas having economic value and used commercially
Computer Crime And Security
By Admin, 01/27/2012
Introduction
Data technologies poses numerous threats to businesses, institutions and people alike. Personal computer related threats might be either unintended or intended. Individuals with criminal intentions normally conduct the latter. Technology has transformed seemingly timid individuals into high tech criminals. In the past, one could simply utilize Security camera systems for protection, but not with these types of attacks. They have the potential to destroy the integrity or confidentiality of documents thus utilizing the information for their own ill intentioned purposes. The essay shall examine web crime and methods one can deal with it through IT security. (Honeynet, 2005)
How personal computer crime occurs
The world today is filled with malicious, careless or unscrupulous people. Some internet crimes are committed by members of the same organization although others could be committed by specialists who may have specialized in on-line crime. (Honeynet, 2005)
The initial category of criminals are disloyal staff members. These are individuals who have access to sensitive data and decide to dispense it to companies competitors or to company enemies. In such companies, employees have minimal sense of responsibility. It is likely that when they dispense sensitive data to competitors, they get material advantages in return. Ultimately, companies loose their competitive benefit.
Computer crime might happen in the form of unauthorized access to data. Here, people can gain access to information by figuring out passwords. In this case, passwords that are really obvious or those one that are shorter than six letters or also those ones that have been utilized for too lengthy are particularly susceptible.
Sometimes, the individuals who could bring about serious security threats are administrators themselves. Companies that face the highest risk are those ones that have 1 system both for normal production and for other specialized purposes. Also, such firms tend to give privileges to personal computer programmers who could abuse their positions. It is also likely that such businesses do not have a two-sided system of clarification. (Mandia and Prosise, 2001)
1 can assert that the worst threat emanates from external sources. For instance, some people may possibly specialize in permeating firewalls. Besides that, there are some personal computer wizards who know methods of dodging firewalls. Such wizards may access info or they may send harmful viruses, worms or other kinds of software program that might grow to be dangerously hazardous. There are pc wizards who dedicate a lot of time creating these viruses so that they can destroy innocent user’s info. The victim is then forced to contact them and invest substantial amounts of cash to eradicate the virus. Others have the capability of altering information with out knowledge from the user. Here, they master the architecture of the laptop or computer and then manipulate it. (Oaks, 2002)
At other times, it is likely that a malicious individual gets hold of back up storage data. Businesses that are most susceptible to this kind of crime are those ones are those ones that do not lock up their back up media appropriately or those ones with loose rules about accessing firm archives. (Viega and McGraw, 2004)
Approaches of enhancing net security
Prevention
This kind of approach refers to limiting the level of data available to personnel. In this case, businesses can guarantee that their employees only gain access to data that they will need to complete certain tasks. This indicates that even those who modify info really should only do this inside their own jurisdictions. Additionally, businesses really should restrict data availability fully for documents that are extremely sensitive. (Roily, 2007)
All the latter categories ought to be determined by the process of information classification. 1 can define data classification as the method of labeling information on the basis of security vulnerability or sensitivity. Organizations ought to location their documents into the following categories
Top secret
Open
Secret
Confidential
Open
Secret
Confidential
The classification system is the 1st step in protecting one’s documents because it lays out the significant framework for security. The person who really should do the classification is the owner of the details. Besides the latter, it is extremely needed for businesses to document all the classifications systems inside a security handbook. This is instrumental in the event that a security crisis occurs. (Fraser et al, 2005)
Policy changes
No approach of data security can be profitable without having changing the policies and procedures within organizations. Organizations should struggle to produce an environment where workers respect the problem of internet security. Here, it would be necessary to generate a disciplined environment where work practices foster details security. Additionally, those men and women who are given confidential info need to be capable of maintaining its integrity. This means that they should be trustworthy. Companies ought to also explain to their staff about the most vital data and information that is not. This means that a significant percentage of them will need to keep off sensitive data. (Garfinkel, 2001)
Organizations ought to train their employees about security threats. Here, the training sessions are supposed to inform the employees about how to use security tools, how to detect threats and how to deal with them. Here, employees need to know the experts they can contact in case of a perceived security threat. Besides that, they really should also be informed about how to make back up systems. Training is specifically essential for new employees within the company.
Clarification of problems
Security threats differ from company to organization. Some groups could be very vulnerable to internet crime even though some may possibly not. Consequently, guidelines ought to be laid out as to what constitutes a security threat and how vulnerable 1 is. The following should be outlined clearly
Security targets
Principles of info classification
Responsible personnel
Principles for reaching targets
Principles of info classification
Responsible personnel
Principles for reaching targets
In line with the latter, organizations really should develop a well laid out security plan. Even though curbing net crime can be carried out in variety of methods, businesses should prioritize the most essential security measures. Management and users will need to be told about their responsibilities. (Grimes, 2004)
Implementing web security
Security implementation can be carried out through a variety of methods. The 1st one is by means of authorization. Authorization ought to be accomplished via two key steps validation and identification.
Identification can be carried out via basic or far more complicated techniques. Some firms opt to use password systems. Here, particular people are given passwords that act as keys to info. Businesses that manage to use this system successfully are those ones that have one password for every individual. When everyone can use a password, then it makes it a lot less complicated for net crime to happen. Great passwords must be distinct, ought to be changed often and ought to not be repeated if they had ever been used in the past. Lastly, passwords need to be changed when people leave job positions or change departments. (Dekker, 2006)
These days, security systems have improved tremendously. The latter technique of passwords merely depends on something that a user possesses. However, far more powerful security measures depend on issues that one has and things that one knows. For example, an organization could ask for a password along with a magnetic card in order to enhance security. The magnetic card contains some confidential details which can be identified by the personal computer system. Additionally, companies can use chip cards. The chip usually has memory. (Van and Forno, 2001)
A far more successful system is one that combines, some thing one has, with something 1 owns and some thing that is such as biometric systems. Here, people are only allowed to access particular categories of info soon after their physical functions have been verified. 1 of the examples consists of finger print and retina patterns.
Internet security can also be enhanced via backing up information. This is due to the fact some viruses have the capacity to destroy ones’ documents entirely. In order to counter such actions, then it is necessary for businesses or individuals back up their data through another system of storage such as a removable device. The device can then be placed in a locked cabinet or a location that is completely secured.
Organizations should be careful about their back up systems since one can focus on the primary source of info and then ignore the other source of info. This means that in case the main details is destroyed, 1 would be forced to contend with obsolete info. Organisations need to be keen about editing and changing their back up details from time to time. This will go a lengthy way in promoting the reliability of the back up systems (Anderson, 2003)
Alternatively, organizations can choose to set up firewalls for their information. This is a system that prevents access to information between two networks. Firewalls can be divided into two. Some of them focus on restricting access although other people dwell on permitting selective access. A packet filter firewall allows packets of details to enter a protected server or they may have the ability to block those respective packets. The other kind of firewall called the application gateway is 1 that acts as a go between two servers by addressing packets to user application. (Zwicky et al, 2000)
Conclusion
The proliferation of Information Technology into all aspects of life has made users really vulnerable. Personal computer crimes could happen via a number of strategies and seriously compromise the user’s functions. It is as a result needed to implement a wide range of security measures that can avoid world wide web crime. Some of these measures contain preventive measures, changing security policies, creating data back ups, making use of firewalls, using biometrics, employing efficient passwords and lastly utilizing tangible methods of identification such as magnetic cards.
CONTROVERSIAL CONTENT
CONTROVERSIAL CONTENT
A controversial content is information that causes disagreement in opinions and may cause
the disruption of peace because different people or culture will have different views about the
contents.
ISSUES ON CONTROVERSIAL CONTENTS
The issues on controversial contents are always focusing on
pornography and slander. Malaysia considers pornography and slander
as illegal.
Pornographic and slanderous activities can be in the forms of plots and
actions displayed on video games, controversial rhythm or lyrics of
music, controversial contents of books and controversial issues on
religion and philosophy.
Pornography: Creative activity (writing or pictures or films etc.) of no literary or artistic value
other than to stimulate sexual desire.
Slander: Oral communication of false statements injurious to a person's reputation. A false
and malicious statement or report about someone.
DEFINITION OF PORNOGRAPHY
The definition of pornography is any form of media or material (like books or photographs)
that depicts erotic behaviour and is intended to cause sexual excitement. Pornography tends
to exploit men, women and children in a distasteful manner.
SLANDER
Slander is another example of controversial content.
Slander is a legal term for false and malicious statement (meaning knowing
that it is false, or “reckless disregard” that it was false) about someone.
Examples :
You wrote an e-mail that a fellow classmate was having an affair with a teacher, even though
it was not true. You then sent it to five other friends.
Ahmad is a muslim. One day, he received a “spam” e-mail stating that his favourite soda drink
“Moda Soda” uses non-halal food colouring, but he does not know if the source of the content
is credible or true. He decides to forward the e-mail to 50 of his friends.
Chin Wei spreads a rumour that a Government Minister is receiving bribes from an enemy
government.
IMPACTS ON MALAYSIAN SOCIETY
Pornography
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person
CONTROVERSIAL CONTENT
A controversial content is information that causes disagreement in opinions and may cause
the disruption of peace because different people or culture will have different views about the
contents.
ISSUES ON CONTROVERSIAL CONTENTS
The issues on controversial contents are always focusing on
pornography and slander. Malaysia considers pornography and slander
as illegal.
Pornographic and slanderous activities can be in the forms of plots and
actions displayed on video games, controversial rhythm or lyrics of
music, controversial contents of books and controversial issues on
religion and philosophy.
Pornography: Creative activity (writing or pictures or films etc.) of no literary or artistic value
other than to stimulate sexual desire.
Slander: Oral communication of false statements injurious to a person's reputation. A false
and malicious statement or report about someone.
DEFINITION OF PORNOGRAPHY
The definition of pornography is any form of media or material (like books or photographs)
that depicts erotic behaviour and is intended to cause sexual excitement. Pornography tends
to exploit men, women and children in a distasteful manner.
SLANDER
Slander is another example of controversial content.
Slander is a legal term for false and malicious statement (meaning knowing
that it is false, or “reckless disregard” that it was false) about someone.
Examples :
You wrote an e-mail that a fellow classmate was having an affair with a teacher, even though
it was not true. You then sent it to five other friends.
Ahmad is a muslim. One day, he received a “spam” e-mail stating that his favourite soda drink
“Moda Soda” uses non-halal food colouring, but he does not know if the source of the content
is credible or true. He decides to forward the e-mail to 50 of his friends.
Chin Wei spreads a rumour that a Government Minister is receiving bribes from an enemy
government.
IMPACTS ON MALAYSIAN SOCIETY
Pornography
• can lead to criminal acts such as exploitation of women and children
• can lead to sexual addiction or perversion
• can develop low moral value towards other men, women or children
• can erode good religious, cultural and social beliefs and behaviour
Slander
• can develop into a society that disregards honesty and truth
• can develop bad habit of spreading untruths and rumours
• can lead to unnecessary argument
• can cause people to have negative attitudes towards another person
Subscribe to:
Posts (Atom)