Thursday, 12 May 2016

Cyber Crime

Biometrics: A way to measure and analyse a form of human characteristic to identify and identify and individual. These include fingerprints, voice patterns, eyes, facial scanners, palm prints.
Firewalls: A piece of software or hardware that stops harmful data from entering your computer.
Encryption: Scrambling data so that only the people with the code or key to unlock it can read it.
Anti-virus: A piece of software that detects a piece of malicious software that is already on your computer. It doesn't stop the software from entering your computer, that's what a firewall does.
Anti-spyware: Basically the same thing as anti-virus but it gets rid of spyware, and stops it from entering the computer.
Access rights: Permissions that are granted to a user or program, allowing them to use an application, read, write and erase files.
User ID's passwords: A specific password for a user to identify them when they log in to the computer. This allows for the IT technicians at whatever company the user is logging into to see and to track what that certain user does on that computer.
Audit logs: A log of activities that tracks every action taken by users on a network,
Developing of codes and conducts: Takes advantage of people's good nature (hopefully) by setting up rules that people have to stick to, like closing doors and windows, logging off after they're finished etc.


Explain the harm to teenagers that could be caused by the use of the internet.

Teenagers spent the most time of all age ranges on the internet, making them more susceptible to harm on the internet. This includes cyber bullying and cyber crime of varying types.

Cyber bullying is a form of bullying that is on any electronic device, but primarily on the internet. Because of the increase of availability to social media sites more and more people are getting bullied online. This increase in cyber bullying has increased the amount of suicides, self-harm and depression in teenagers, while it is being made easier to anonymously bully people over the internet through social media sites. Due to anonymity being easier to achieve it leads to more bullying, but it could be prevented through teaching teenagers how to report cyber bullying at school. Increasing the awareness of services like Childline would also reduce the amount of harm teenagers could be caused through the internet.

Cyber crime is also a form of harm that can be caused by teenagers. Their increased availability to social media and the internet would increase their chance of downloading malware or spyware.

Tuesday, 10 May 2016

Networking

A TWO MAN OPERATION SELLING EBAY ITEMS.- LAN

A LARGE MULTINATIONAL ORGANISATION SELLING INSURANCE. - Servers

A SMALL INDEPENDENT ONLINE GAME COMPANY. - Servers

A DOTA TOURNAMENT. - WAN



Describe three advantages to the school of networking the computers.

1) Using a client server network the school would be able to set up accounts for each pupil, allowing them to access their own files when they go on one of the computers.

2) Having a network would mean that a firewall would only be needed on the machine that data is sent and received through, making it so that no virus could get into the computers themselves.

3) Having a network would allow the IT manager to block certain inappropriate sites for the children.

Tuesday, 3 May 2016

Computer Misuse

The Computer Misuse act would be almost impossible to police unless the people policing it broke it
themselves, making a redundant law. The only way to reliably police the Computer Misuse Act would be to have total surveillance over everybody in the whole country. There is also a lot of aspects of the law that are outdated or completely superfluous, such as by obtaining a piece of malware, for example opening a malicious email, meaning that thousands of innocent people would be persecuted for simply opening an email.


Friday, 29 April 2016

Data Protection Act 29/04/16

What are my rights? 

Personal information must be fairly and lawfully processed.

Personal information must be processed for limited purposes.

Personal information must be adequate, relevant and not excessive.

Personal information must be accurate and up to date.

Personal information must not be kept for longer than is necessary.

Personal information must be processed in line withe data subjects' right.

Personal information must be secure.

Personal information must not be transferred to other countries without adequate protection.

It does not effect: National security, crime, taxation, heath, education and social work, or school and examinations.

Thursday, 28 April 2016

Database Query Questions

The airline has a database of customer names and addresses.
(e) The database makes use of simple and complex queries.
(i)What is the difference between a simple and complex queries.
A simple query uses only one parameter or criteria with two fields of data. A complex query has more than one parameter or two or more criteria. This can be split into an AND query which search both parameters, or an OR query which searches one or the other but not both.

(ii)Give an example of a simple query and a complex query that could be used to search the customer database.

Simple: Departure of the flight as it only uses one parameter and doesn't need another to be a precise search.

Complex: Destination and date of the flight would allow for a more concise search as it would allow you to pinpoint when and where the flight is with the use of both parameters.




Give an example of a complex query that could be used to search the customer table (of a school).

For a school, a complex query that uses the parameters of surname and year group, which would allow a more concise search as there would probably be more than one person with a certain surname in a whole school. Using a year group would narrow this down to one or maybe two results, depending on the size of the school and the commonness of the name.

Tuesday, 26 April 2016

26/04/16 Data Dictionary questions

Describe three components of a data dictionary.

1) One component of a data directory is the topology of the database, which describes what each field and table in the database will do. It also includes a short description of each field or table.

2) Another component of a data dictionary is the data type of each field. This makes it easier to create the database because then only the correct data type can be input into the fields, for example, setting a name to text, else somebody could put numbers into it.


Bold=over lined

EMPLOYEE(EmployeeID, Surname, Forename, DateOfBirth, AddressLine1, AddressLine2, Town, Postcode, ContactNumber, DepartmentID, QualificationID, DateHired)

DEPARTMENT TABLE(DepartmentID, DepartmentDescription)

QUALIFICATIONS TABLE(QualificationID, QualificationDescription)





Field name                         Data type

Oder completed?                Text
Total cost of order               Currency (real number)

Thursday, 21 April 2016

3.1.5 Databse Questions

2) The airline has a database of customer names and addresses.
a) identify the most appropriate data type for the following fields:
House number: String
Price of tickets: Currency
Telephone number: String
b) Data entered into the database needs to be verified.
I)What is the purpose of verification?
Verification aims to make sense of data and must be complete and within acceptable boundaries.
Ii)Describe how proof reading works as a method of verification.
It makes sure that it is complete and makes sense, but it can also allow human error as if the same thing is overlooked on the second reading proof reading wouldn't be