Posts

Showing posts from March, 2018

Internet Technology

Image
What is web Browser? A web browser (commonly referred to as a browser) is a  software application  for retrieving, presenting and traversing information resources on the  World Wide Web . An information resource is identified by a  Uniform Resource Identifier  (URI/URL) that may be a  web page , image, video or other piece of content. [1]   Hyperlinks  present in resources enable users easily to navigate their  browsers  to related resources. Although browsers are primarily intended to use the World Wide Web, they can also be used to access information provided by  web servers in  private networks  or files in  file systems . The most popular web browsers are  Chrome ,  Edge (preceded by  Internet Explorer ),  Safari ,  Opera  and  Firefox . What is  Web Address ? A web address, also known as a URL (uniform resource locator), is an Internet or intranet name that points to to a location where a file, directory or website pa

Security Measures

Image
DATA BACKUP  A  data backup  is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft (etc). If you are responsible for business data, a loss may involve critical financial, customer, and company data. If the data is on a personal computer, you could lose financial data and other key files, pictures, music, etc that would be hard to replace. As part of a data backup plan, you should consider the following: What data (files and folders) to backup What compression method to use How often to run your backups What type of backups to run* What kind of media on which to store the backups Where to store the backup data for safekeeping 2. Cryptography Cryptography includes techniques such as microdots, merging words with images, and other ways to hide

Types Of Computer Security Risks

Image
A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. types of security risk s ; (a) Malware :       Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely  alter the computer’s operations. Types of Malware : *Computer viruses :  A potentially damaging program that affects, or infects a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission *Worms : P rogram that copies itself repeatedly, for example in memory, using up resources and possibly shutting down the computer, device or network. * Trojan Horses : P rogram that hides within or looks like a legitimate program.  Unlike a virus or worm, a trojan horse does not replicate itself to other computers or device.   (b )  Hardware Theft  poses les

What is Computer Ethics ?

Image
COMPUTER ETHICS is the moral guidelines that govern the use of computers , mobile devices and information systems .  Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic  content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artific