Sunday, April 16, 2017

1.5 Ethics

SHOW UNDERSTANDING OF COMPUTER ETHICS, INCLUDING COPYRIGHT ISSUES AND PLAGIARISM COPYRIGHT IS A LEGAL BARRIER TO PREVENT OTHER PEOPLE FROM DOING A CERTAIN THING, AND ANYONE WHO DISOBEYS CAN BE PUNISHED BY THE LAW. IT IS WRONG TO BREAK COPYRIGHT LAWS. PLAGIARISM IS WHEN A PERSON COPIES SOMETHING WITHOUT GIVING CREDIT OR SOURCING THE INFORMATION. IT IS...

1.4.4 Security

DESCRIBE HOW THE KNOWLEDGE FROM 1.4.1, 1.4.2 AND 1.4.3 CAN BE APPLIED TO REAL-LIFE SCENARIOS INCLUDING, FOR EXAMPLE, ONLINE BANKING, SHOPPING THESE SECURITY MEASURES AND REASONS CAN BE APPLIED TO ANY REAL LIFE SCENARIO, SUCH AS WHEN BANKING ONLINE, OR SHOPPING ONLINE OR POSTING PRIVATE INFORMATION ONLINE. ...

1.4.3 Security

SHOW UNDERSTANDING OF THE NEED TO KEEP ONLINE SYSTEMS SAFE FROM ATTACKS INCLUDING DENIAL OF SERVICE ATTACKS, PHISHING, PHARMING DDOS ATTACKS ARE WHEN A SERVER BANDWIDTH IS FLOODED WITH GHOST IP’S OR COMPUTERS ALL TRYING TO GET INFORMATION, TO PREVENT LEGITIMATE USERS FROM ACCESSING THE DATA. THIS CANNOT REALLY BE PREVENTED EXCEPT INSTALLING ANTI-VIRUS SOFTWARE...

1.4.2 Security

SHOW UNDERSTANDING OF HOW DATA ARE KEPT SAFE WHEN STORED AND TRANSMITTED, INCLUDING: – USE OF PASSWORDS, BOTH ENTERED AT A KEYBOARD AND BIOMETRIC PASSWORDS (LONGER PASSWORDS ARE BETTER) AND BIOMETRICS SUCH AS FINGERPRINT, RETINA SCANNERS ETC.  – USE OF FIREWALLS, BOTH SOFTWARE AND HARDWARE, INCLUDING PROXY SERVERS FIREWALLS MONITOR NETWORK...

1.4.1 Security

SHOW UNDERSTANDING OF THE NEED TO KEEP DATA SAFE FROM ACCIDENTAL DAMAGE, INCLUDING CORRUPTION AND HUMAN ERRORS DATA CAN BE CORRUPTED OR LOST THROUGH MANY WAYS, SUCH AS ACCIDENTAL DAMAGE (DROPPING YOUR LAPTOP), CORRUPTION (INCORRECT SHUTDOWN PROCEDURE), AND HUMAN ERRORS SUCH AS ACCIDENTALLY DELETING A FILE.   SHOW UNDERSTANDING OF THE NEED TO KEEP...

1.3.7 High and low-level languages and their translators

SHOW UNDERSTANDING OF THE NEED FOR BOTH HIGH-LEVEL AND LOW-LEVEL LANGUAGES Advantages of high-level languages Advantages of low-level languages Read and understand closer to human language Make use of special hardware Write in a shorter amount of time Make use of special machine-dependent instructions ...