Sunday, March 20, 2011

CONTROVERSIAL CONTENTS AND CONTROL..

2.6  Effect of controversial contents (PORNOGRAPHY and      SLANDER) on society :

Pornography

Pornography is any form of media or material (like books, video or photos) that show erotic behaviour and intended to cause sexual excitement. The effects of pornography on society are :


  • Can lead to criminal acts such as exploitation of women.
  • Can lead to sexual addiction.
  • Can develop lower moral values towards other people.
  • Can erode good religious, cultural, behaviours and beliefs.


        Slander
Slander is a false spoken statements about someone, intended to damage his or her reputation. The effects of slander on society are :

  • Can develop society that disregards on honesty and truth
  • Can lead to bad habits of spreading rumors and untruth
  • Can cause people to have negative attitudes towards another person.

2.5 AUTHENTICATION TECHNOLOGIES..

Authentication is a process where user verifies their identity.Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:

a. User identification (something you know - have to remember). User identification is a unique combination of 
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.




b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account. 

                              




c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 



hand geometry reader










d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation andbusiness transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.

2.4 WAYS FOR MAKING PERSONAL DATA MORE PRIVATE

Below are list measures you can take to make your personal data more private.


1. Purchase goods with cash, rather than credit card.
2. Install personal firewall.
3. Clear your history file when you are finished browsing.
4. Have unlisted telephone number.
5. Fill in only necessary information on warranty and registration form
.

2.3 INTELECTUAL PROPERTY LAW

Intellectual Property laws cover ideas, inventions, literary creactions, unique names, business modals, industrials processes, computer program codes and many more.

Four types Intellectual property
a. Patents for inventions
b. Trademark for brand identity
c. Copyright for materials

Tuesday, March 1, 2011

COMPUTERISED AND NON-COMPUTERISED SYSTEMS

COMPUTER SYSTEM


A system is an arrangement of elements that when it is put together it becomes an organised and established procedure. A system typically consists of components connected together in order to facilitate the flow of information, matter or energy.

A computer system consists of a set of hardware and software which processes data in a meaningful way. 
 
Free Website templatesfreethemes4all.comFree Blog TemplatesLast NewsFree CMS TemplatesFree CSS TemplatesFree Soccer VideosFree Wordpress ThemesFree Web Templates