To download the file click here
Topics Covered : Computer System and its applications in different field, Programming Language : C, Java ,PHP etc.
Capabilities of ICT devices
What things do ICT devices do well?
ICT devices and systems are
capable of performing lots of tasks very well. Some of these are listed below:
- Speed
Computers perform tasks very fast. Some cpu's can execute literally
'billions' of instructions per second.
- Accuracy
If programmed properly, computers are capable of performing the same tasks
100% accurately every time.
- Multi-Tasking
Computers are able to perform many tasks at the same time.
- Repetitive Tasks
Computers will carry out boring and repetitive tasks accurately. Humans
tend to get bored and make mistakes.
- Networking
Computers can be joined together (either as a LAN or a WAN) and allows
them to easily share resources such as printers and data.
- Huge amounts of
Data Storage Computer databases can store
enormous amounts of data. All types of data be stored including text,
numbers, images and video.
- Fast Searches
Computers can search for stored data extremely fast. For example, the
police can match fingerprints in a database in minutes rather than
spending weeks searching through printed copies.
- Security
Data can be secured with passwords or encryption.
What things do ICT devices not do well?
Computers, and other
devices, are not without their problems. Limitations of ICT devices are listed
below:
- Battery Life
Portable device such as laptops, PDAs and mobile phones are limited by
their battery life. These devices only remain charged for so long before
they need to be plugged into the mains.
- Weight
Some portable devices are heavy (especially laptops). This does not make
them ideal for carrying around.
- Screen and
Keyboard Size Smaller devices such as mobile
phones and PDAs have very small screens and keyboards which can cause
problems for some people.
- Bandwidth is the speed that data can be transported over the Internet. Low bandwidth means that large files will take a long time to transfer.
How do hackers and fraudsters try to steal our data?
How do hackers and fraudsters tryto steal our data?
Phishing
1.
'Phishing' is used to describe methods
that thieves use to 'fish' for our data. This is where fraudsters try and trick
us into giving up our bank details, credit card details, usernames and passwords.
2. Phishing
is usually carried out over emails pretending to be from legitimate organizations
like banks and building societies.
3. The
emails usually say that there is a problem with your account and then they ask
you to provide your usernames, passwords or account numbers so that the problem
can be rectified.
Ways
to reduce the risk of getting 'phished'
1.
Never ever give your bank details or
passwords out over email. Banks NEVER ask their customers for this information.
2. Some
phishing scams promise you enormous wealth "If you pay a small
administration fee". If something sounds too good to be true then it
probably is and you would be best off ignoring the mail.
3. Report
any phishing attempts to your email account provider.
4. Don't
respond to emails from people you do not know.
Pharming
- The
intention of pharming is the same as phishing..... to obtain personal
information such as usernames, passwords and bank details etc. Pharming
usually targets users of online banking or shopping websites.
- The
way this is done however is slightly different. 'Pharmers' infect
legitimate websites with malicious code that will 'redirect' you to their
bogus version of the website.
- The
bogus website will look very similar, or even identical, as the legitimate
website. This makes pharming very dangerous and difficult to detect.
Ways
to reduce the risk of getting 'pharmed'
- Check
the url (web address) of the website before you enter personal
information. The bogus website will usually have a slightly different
address to the legitimate website.
- Make
sure that you are on a secure website before entering personal
information. The way to tell is to look at the url:
·
A secure connection's address will begin
with https
·
An unsecure connection will begin with
http
Spam
- Spam
is 'junk email' that is sent automatically to thousands, or even millions,
of email inboxes. Spam overruns your inbox very quickly and it is a pain
to have to delete all of these unwanted emails every day.
- 'Spammers'
send these unwanted emails for a range of different reasons including:
·
Advertising low quality products
·
Spreading viruses
·
Phishing purposes
Spammers
get your email address from a range of sources. This is called 'harvesting
email addresses'. The sources include:
·
Mailing lists
·
Chat rooms
·
Programs that scour websites for email
addresses
·
Bought illegally from dishonest
employee's of internet companies
Ways
to reduce the risk of spam
- Spam
filters are included with most email accounts. These can be used to
automatically separate junk email from legitimate emails. You can then
quickly delete the contents of the junk email folder.
- Don't post your email address in public websites like chat rooms or social networking sites.
Subscribe to:
Posts (Atom)