Risks of Having a Facebook Account. Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with.
The Risks of Having a Facebook Account Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with. I am particularly keen with the privacy settings of my profile in any social networking site I associate my identity and email address with so the privacy check that I engaged in a few weeks ago was just to verify whether or not I have properly safeguarded my Facebook profile. What I did was to sign out from Facebook and search my name as an anonymous individual. I recognized my profile among others whom I shared a name with through my profile picture. What made my name stand out from all the other Gerard Padillas were the university and high school networks which were under my name. I clicked my name and realized that only a larger version of the thumbnail of my current profile picture is further revealed upon clicking my name. I checked some of my friends' profiles and theirs disclosed a few of their friends. This revelation is already quite jeopardous since spammers and people who are up to no good can collect information and also be able to verify assumptions through one's set of friends. Also, the friends who are revealed, especially those who have weak privacy settings, are put in a risk. What really alarmed me was the
Task One - Impact on Information Availability What electronic information do I access and what impact has this had on my life The internet has had a huge impact on people's lives throughout the world, it allows people from all over the world to communicate and meet in one place, and the impact is clearly visible in today's society. Originally used for communication and business the internet has quickly grown and everything can now be found on the internet quickly and easily. Personally, the internet plays a big part in my life as it is easy to find any information that I may require. It assists me in my school work and revision with sites like BBC Bitesize set up with revision resources and links to other helpful sites. I also use the internet for the latest news (and weather) using sites such as BBC News which contain all the days main headlines as well as discussion by the public on these stories. More recently I have been using the internet for online shopping, which is particularly helpful for events such as Christmas, with sites like Amazon and Play supplying goods for cheaper prices than most high street retailers as well as quick and efficient delivery. All of these websites listed are everyday sites which I use as helpful aids in my life, but I also use the internet for my interests and hobbies. I frequently visit sites such as Skysports to check all the latest
Online shopping. Online shopping is a great way for providers to promote their items internationally. Its very easily accessed to anyone around the world.
Online shopping is a process where you can buy or sell items online via the internet. There are many advantages of shopping online some include, there is a lot more choice for example if there is an item you want a lot more shops online sell the same or similar items so you have more to choose from. There is also a wider range of items and people from all around the world can sell their items online because the internet is open to anyone with internet access around the world. The biggest disadvantage of online shopping is the security; so many frauds have happened with online shopping more and more people are having trust issues with using the online shopping. Although it is very convenient for people who are less able to get out of the house they have access to the world wide shops right at their finger tips. Online shopping is a great way for providers to promote their items internationally. Its very easily accessed to anyone around the world. There is a lot more advantages for shopping online, it's a lot more convenient to some people for example not everyone has enough time to go out shopping. It has 24 hour service so people who work nights that aren't able to go shopping then they are able to do online shopping at any time of the day or night. Also less able people who aren't able to get out very much, it gives them some sort of freedom because they can do anything
M1 explain the role of web architecture in website communications On the internet, there are many websites which let you share information with other users. This is where web 2.0 comes in. While many people may think that web 2.0 is a newer version of the World Wide Web, It is actually just a change in the way that developers use the web. Web 2.0 refers to design that is made to help interactivity, information sharing and communication. It includes web communities such as social network sites like facebook, video/photo sharing websites and blogs and wikis. There are many factors which all successful web 2.0 websites share. These include, being easy and fun to use, being affordable, they have a clear purpose and people can add and edit their own information. Blog A web page that presents short journal entries in chronological order, newest first, is typically referred to as a "blog" or "weblog." Most blogs emphasize links to other pages and sites, and most entries are short commentaries or even simple one-sentence links to an interesting page somewhere else. Many blogs are concerned with current news events and often provide unabashedly partisan commentary. "Blogging," of course, is the act of writing a blog; those who write blogs are sometimes referred to as "bloggers." Cloud Computing Cloud computing is Internet- based computing, whereby shared resources, software, and
E-commerce Ecommerce is the ability to, browse, decide, purchase goods online through the use of the internet and internet transactions exchange procedures. There are four different types of E-commerce and they are • Business to Business (B2B) • Business to Consumer (B2C) • Consumer to Consumer (C2C) • Consumer to Business (C2B) The advantages of using of ecommerce for the customers are * Buying can be easy and private because the product you want to buy maybe in another country making it easier to buy it from your own home and it can be brought privately this way because no one has to know that you have brought that product. * You would have much choice over the internet because the internet has become so big there are endless products you would want to buy. * It can also save you time buying something over the internet because the place you would want to go to could be a long distance away making it more efficient to do it over the internet. * Buying is interactive and immediate because you can buy it with instant success making it easier and immediate. * Can be used 24/7 because the internet ever closes. Disadvantages of ecommerce for the customers are: * Security concerns with personal and credit card details. * You can't check the quality when purchasing like you could in a shop. * Things might look different online to what you get e.g. slightly
Capital Radio Capital Radio use I.C.T to promote their business online. They also use a lot of technology in their studio, for example to organise their play list of songs, to organise jingles and advert times. In the Advertising department they use ICT to listen to adverts to see if the adverts that are going to be used are ok to put on air. The Dj's in the Studio have there own account on the computer in the Studio so they can read the emails the listeners have sent. One of the most important things they use is a huge machine that can hold one of the biggest record collections In the world, This makes the Dj,s job easier to select songs for the listeners who want them. So they use ICT for that as well. ICT is important to Capital because every person who works there has their own computer so when they work it is less time consuming. Capital Radio uses ICT to record people's interviews/demos of songs in their studio. The new generation of radio (DAB) has made Capital radio use ICT to make their station and owned stations to sound better. A very important thing to Capital Radio are their share holders. They use ICT so that they can show if their shares go up or go down, on the internet. They use ICT on their website to give people news updates, Music news, and Company info. They allow people to post their thoughts about the radio station and let people
The Future of communication -"Behind every man now alive stand thirty ghosts, for that is the ratio by which the dead outnumber the living. Since the dawn of time, roughly a hundred billion human beings have walked the planet Earth. --Now this is an interesting number, for by a curious coincidence there are approximately a hundred billion stars in our local universe, the Milky Way. So for every man who has ever lived, in this universe, there shines a star." (from Clarke's foreword in 2001, A Space Odyssey, 1968) I think the next century; the educational revolution will ensure that learning will be completely liberated from the tyrannies of schedules and locations. Anybody, anywhere will be able to study any subject, and access any form of information - at his or her most comfortable speed. This will make education the life-long process it must be.*** I defiantly think the future of communications is in people. People will become more open to discussion or chat. Interaction of any kind is an important form learning, even body language; people will be more expressive and affectionate with each other. Who knows? The world may be a safer and ever more comfortable place to live…. I mean, we have seen single-interest groups - pro-choice, environmental, animal rights, and gay rights groups being the most prominent in the past centuary. Although I am always feeling since
Hardware and Network issues in e-commerce Introduction This review will discuss the issues and outline some future developments related to the three most prominent forms of network technology, broadband, m-commerce and wireless broadband. What is broadband? A good definition of broadband is: "Broadband refers to any communication technology that permits clients to play streaming video and audio files at acceptable speeds - generally anything above 100 Kbps" (Laudon and Traver, 2002). Typically, broadband is characterised by very high upload and download speeds and most interestingly it is an 'always-on' technology as opposed to narrowband where the user has to 'dial-up' to the server every time they begin a new session on the internet, whereas with broadband the user simply has to click on the internet icon on their desktop and they are instantly linked to home page of their choice. Types of broadband There are many types of broadband access available to the internet user. The most commonly used type of broadband connections made by the general consumer is via cable modem and DSL connections. Cable Modem is usually used by consumers who cannot get DSL connections in their area or who live in a cabled area and is characterised as a shared network service. Internet connection is 'piggybacked' on the television signal received by consumers who have cable television. It
Introduction I am a student starting my second year of A levels at a College of Further and Higher Education and one of these A levels is ICT. The A2 part of the ICT A level consists of three modules, one of which is coursework and it is worth 40% of my overall A2 grade. The coursework requires me to identify and conduct research into an open-ended problem that exists for a real end-user. From results of this preliminary research, I must design an appropriate ICT-based solution for the problem using the skills and knowledge that I have acquired throughout the duration of my course. After designing such a solution, I will develop the actual software to be used to address the problem along with the technical documentation. This software will then undergo extensive testing so that I may identify and correct any bugs that may be present within the system. Plans on how the system will be implemented will then be made, including any training the staff will need and how existing data will be transferred into the new system. Finally, the User Documentation will be produced and I will evaluate the system on a number of various criteria to see if it meets the requirements outlined at the analysis stage. Throughout the whole process, I will be using the skills and experience that I've acquired in the first year of the course (and what I will be learning this year) to incorporate a wide
Examine the key features around the growth, development and policing of cyber crime in the 21st century.
Emma Fields Social Policy and Criminology Examine the key features around the growth, development and policing of cyber crime in the 21st century. The internet was first created in the 1960’s, but it only really started to take off and develop in the last 20 years with big websites such as Google (1998) and YouTube (2005). With the internet developing and people knowing more about it, cybercrime then came about and since then it has grown and gotten more dangerous and more extreme. There are several different types of cybercrime for example one is called cyber violence, this includes stalking and harassment, it can also be bullying people online via social networking sites and chat rooms. Cyber obscenity is another type of cyber crime which is sexual including porn sites. Cyber trespass is the crime of hacking sites and cyber theft is also another cybercrime which is credit card fraud as well as the illegal downloading of movies, music, books etc. Computer hackers are very intelligent, initially they started hacking sites simply because they were able to, and they wanted to explore the sites, at the start it was done just for fun. However it didn’t take long for these hackers to realise their potential and what they could actually be doing, soon it then escalated and they became more educated and more confident in hacking. These hackers could now be described