Wednesday, 28 November 2012

Unit 1 M2


Unit 1 M2:
There are some threats and risks that occur in our IT based Communication Company. Risks like becoming almost addicted or mentally stressed about your work on the internet so much that you could isolate themselves from others and become stuck to the computer and become almost mental with work. There are some threats on the internet and email also technical defaults, here is some have problems that have occurred:
·      The introduction of malicious code,
·      System hardware or software failures,
·      Attacks on system from external networks or hackers,
·       Eavesdropping on the system.
 Your computer could get hacked or information robbed if you’re in a company. You could also lose data through corruption and maybe even memory loss. The hardware you’re using could break down from viruses or even just because most hardware only last a maximum of 4 years. Also computers cost more and to get them fixed will be equally as expensive. 

Wednesday, 14 November 2012

Unit 1 D1


Unit 1 d1
Risk and safety issues:
On social networking sites you need to be careful what links you go on to or what requests you reply to. A prime example is Facebook you can find links on certain group pages that include viruses/malware, if you get an invite of a game that you have never heard of and none of your friends have been its probably got key loggers on it who if you are giving personal/valuable information someone on a different computer can see what you are typing.  You can avoid that though by being cautious about links you don’t recognize  invites to certain games/apps etc. These are a big risk because they can find out your pins and other important personal information. Social networking sites are a classic place for cyber bullying and it could happen to anyone so you need to know for positive who you add on social network sites it could be someone trying to start a fight or even a dodgy 50 year old pretending to be someone he’s/she’s not, the only way you can avoid this is to just double check that you know who your talking to and if you insist on talking to someone you don’t know don’t give personal information away.

Tuesday, 13 November 2012

Unit 1 M1


Unit 1 M1
Blogger is an effective method of communication because it is powered by a reliable source (google) so you know that you can upload your work safely. You can put your work up (for free) and anyone can look at your work and if someone wants to leave feedback e.g. teachers, who will leave feedback on whether you have met the criteria or if not what to improve on. You will know if someone has left a comment on your blog as you get an email notification which is handy. It is also very handy as you can use this on your computer and if you’re out you can use it on your mobile phone if you have access to the internet.
This is also online so it is Eco friendly as it is not wasting tons of paper to write things on, so there for less pollution and more friendlier than using up school paper.