Skip to main content

Posts

Security of data

S ecurity  Of Data Security of data is concerned with keeping data safe and uncorrupted by restricting access to data so that malicious damage to it is minimized. Hacking Is the process of entering a computer system without the owner's knowledge or consent.  Data loss, data corruption, data editing, data copying, identity theft, exposure of a company (for instance, wiki leaks), disruption, and production halting are all possible outcomes of hacking. Firewalls, strong passwords that are frequently changed, protection software to detect and block hacking attempts, and hiring a professional hacker to test the vulnerabilities of your system are all ways to prevent hacking. Computer Virus Is a piece of software that can install and spread itself throughout a computer system without the user's knowledge or consent. Computer viruses can harm in a number of ways, including by causing computers to crash, run slowly, deleting files that can cause the computer to malfunction, copying dat
Recent posts

Effective Use Of Internet

  E ffective Use Of Internet "Internet" refers to a global network infrastructure that allows for file transfers between computers as well as online shopping, banking, and social networking. World Wide Web (WWW)  Is a part of the internet that can be accessed using a web browser and consists of a massive collection of web pages. Web browsers access documents and available downloaded media to the network through web servers. Intranet,  Is normally accessible by internal members of the company by a username and password. Information are specific to the needs of the company. They have a less chance of getting hacked and viruses. The Hypertext Transfer Protocol (HTTP & HTTPS)  Is a set of rules followed when sending data over the internet.  Rules are agreed between the sender and recipient when transferring data.  HTTP means Hypertext Transfer Protocol, meanwhile HTTPS means Hypertext Transfer Protocol Secure variant. Hence, HTTPS is more secure than HTTP. URLs are complete

Physical safety

  P hysical Safety There are a number of physical safety issues that can arise from using ICT devices. Some of these safety issues include: Trailing Cables Have you ever heard about trailing cables? When cables go across the floor, there is a risk that people might trip over them . So, it is a good safety practice to keep trailing cables inside carpets or ducts . This is done to prevent accidents caused by computer cables. Because of the many cables attached to the computer, people can trip over and be injured by the cables. Such as injuries and electric shock. Heavy equipment If your computer is heavy, there is a risk of injury when you move it , if a heavy item falls on someone. Devices must be placed in suitable positions. Make sure equipment is placed on tables or shelves that are strong enough for them; if it will be large enough to support the device.  Also, devices need to be placed where users can get at them easily.    Electrical Overload If you overload the electric system

E-Safety

E -Safety E-Safety is associated with the use of internet, protecting people from harm while they are using technology so they don't put themselves at risk.  It also protects data relating to a living individual.   Personal data Personal data  is information about a recognized or identifiable person. Individual identification can be as basic as a name or a number, or it might incorporate other identifiers such as an IP address, a cookie identifier, or other characteristics. A person's telephone, credit card, or personnel number, account data, number plate, appearance, customer number, or address are all examples of personal data. Because the definition includes "any information," it follows that the word "personal data" should be defined as broadly as feasible. Social networks can be beneficial, but if not used carefully, they can lead to serious problems. - Cyberbullying can occur when people have access to an individual on a social networking site, es