Internet Risks and Reliability Issues

(P1) Internet Risks and Reliability Issues (P2) Introduction: This report was produced by undertaking research into several types of business activities on the internet. The report also identifies the risks and reliability issues associated with the type of activity. The report was produced by Haroon Sheikh for the Websters Supermarket. The report was compiled and submitted on 25th FBY 2008. Findings: One of the popular worries about e-commerce is the possible (and probably exaggerated) abuse of credit card numbers. But if you book a holiday over the Internet, shouldn't you also worry about a hacker getting hold of your home address and the dates of your holiday, and connecting it with your recent purchase and insurance of expensive Jewelry. Identity theft is a catch-all term for crimes involving illegal usage of another individual's identity. The most common form of identity theft is credit card fraud (theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account) While the term is relatively new, the practice of stealing money or getting other benefits by pretending to be a different person is thousands of years old. Secure Sockets Layer (SSL) Customers know when this happening because they are warned

  • Ranking:
  • Word count: 1491
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Verbal and Non - verbal Communication

Introduction Communication is the study of the transfer of meaning (Eunson, 2005, p.2). This consists of verbal communication, which is the exchange of ideas through written or spoken words and non - verbal communication, which is conveying a message through cues such as facial expressions (a smile), head movements (shaking left to right), proxemics (closeness in proximity) and eye messages (a stare). It is virtually impossible to not communicate, as further proved by the axiom - "You cannot not communicate". There can also be considerable misunderstanding due to the noise factors that obstruct easy flow of communication, which can be dismissed if the misconceptions are understood and remedied. Verbal cues can be easily controlled; where as the non - verbal cues have little or no control as they are exhibited by the speaker more or less without his or her knowledge. These are more spontaneous and the individual has less control over them, thus making it more genuine and real. Consequently, at times when the verbal cues and the non - verbal cues are contradicting, it is the general practice for the listener to perceive the message displayed by the non - verbal cue. In a face to face conversation or verbal exchange, the words take only 7% of the effectiveness of delivering the proper message, where as the tone of voice and non - verbal communication consists of 38% and 55%

  • Ranking:
  • Word count: 999
  • Level: AS and A Level
  • Subject: ICT
Access this essay

William H. Gates.

William H. Gates Chairman and Chief Executive Officer Microsoft Corporation William (Bill) H. Gates III is co-founder, chairman and chief executive officer of Microsoft Corporation, the world's leading provider of software for personal computers. Bill Gates was born on October 28, 1955. He and his two sisters grew up in Seattle. Their father, William H. Gates II, is a Seattle attorney. Mary Gates, their late mother, was a schoolteacher, University of Washington regent and chairwoman of United Way International. Gates attended public elementary school before moving on to the private Lakeside School in North Seattle. It was at Lakeside that Gates began his career in personal computer software, programming computers at age 13. In 1973, Gates entered Harvard University as a freshman, where he lived down the hall from Steve Ballmer, who is now Microsoft's president. While at Harvard, Gates developed a version of the programming language BASIC for the first microcomputer - the MITS Altair. BASIC was first developed by John Kemeny and Thomas Kurtz at Dartmouth College in the mid-1960s. In his junior year, Gates dropped out of Harvard to devote his energies full-time to Microsoft, a company he had started in 1975 with his boyhood friend Paul Allen. Guided by a belief that the personal computer would be a valuable tool on every office desktop and in every home, they began

  • Ranking:
  • Word count: 728
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The Internet is an important part of our everyday lives however it is not perfect. There are many merits and pitfalls of having easy access to the vast amounts of media and information provided on the Internet.

The Internet has evolved over time. It all began in 1969 as ARPANET. ARPANET was a project of the United States Department of Defense to create a 'nuclear-proof' computer network. This meaning that the network would continue to function even if a part of the network was destroyed. Today, the Internet extends around the globe and includes numerous networks and computers connecting millions of people from all around the world. ( What is the Internet? ;2001) The Internet is a collection of computer networks that use a common software standard to exchange data with each other. Using satellite links and telephone wires, Internet users can share information in different ways. The Internet allows users to easily connect through local computers, exchange e-mails with colleagues, friends and family around the world, post information for others to see, connect with friends and family through social networking sites such as 'Facebook' and 'Myspace', research information and online banking, to name just a few. (What is the Internet?; 2001) The Internet is an important part of our everyday lives however it is not perfect. There are many merits and pitfalls of having easy access to the vast amounts of media and information provided on the Internet. The Internet provides a quick, easy and simple method of searching for information. The Internet has become one large cyber library with

  • Ranking:
  • Word count: 1876
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Mobile phones: a blessing or a hazard?

Mobile phones: a blessing or a hazard? by Rafika Saidani A necessity of life For every one to have a telephone is a necessity. It is helpful and useful. Having a simple telephone keeps you in touch with other people you know. It is a more convenient mean of communication, much faster than sending a letter that take days to reach their destination. The mobile phone is even a better invention. The mobile phone is the fastest growing technology ever. Mobile phones are being more attractive, addictive and an obsession especially for the younger people. Teenagers are the biggest market for mobile phones. They spend so much on pre-paid credit. Having a mobile phone gives them a sense of independence and makes them feel they are part of this trend of the "fast" way of life. Also businesses are already taking full advantage from the invention. It helps them keep in touch with potential customers and business partners. It means for them being in touch all the time with a moving and competitive environment. A painful experience Mobile phones may offer security and may even save your life. A personal experience I had was when I was travelling from Coventry to Heathrow airport with my husband to catch a flight. On the way the car suddenly broke down on the motorway. We spent a lot of time waiting on hard shoulder for help. My husband then decided to walk till he reached a house on

  • Ranking:
  • Word count: 737
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Testing Database

Testing Testing strategy The basic objective of testing the system is to ensure that everything is working as expected. During the testing we should look out for the following: * Macros should work as expected * Queries should run and return accurate outputs (and store required information property where appropriate) * Forms should display fields correctly * Command buttons should run actions as expected * Report should be printed correctly * Input should be validated correctly where appropriate * Required fields should not be empty. System should detect required fields that are empty The testing of the system will be divided into 3 parts: * Functional - the testing of individual components of the database. This is done when the component is created and will be documented in the implementation * System testing - the testing of the full system from beginning to end. This is done using the test plan below and will be done and documented once the whole system in complete. * End-use testing - getting the end user to test the system for a day. Done by the end user to detect any errors/problems and to establish whether the system meets the user requirements Testing plan Test Number What to test How to test it Expected Outcome Test switchboard and switchboard options Manually click all the buttons on the switchboard Switch board should load on database startup.

  • Ranking:
  • Word count: 780
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Science Info-Age & Ethics

Computer Science Info-Age & Ethics New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud. Now we've got computers . . .. To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more people are becoming computer literate, and networks are becoming more readily accessible. The rise in computer crime can easily be blamed upon the increasing number of users. The Internet is widely deemed as a new community. Either way you look at it, the Internet offers cover for con artists and plenty of places where larceny can lurk. The most common crimes committed via technology media are the same basic variations of the four main time-tested, real-world crimes: . Forgery (of E-mail) 2. Assault (on your Web site, E-mail box, or computer system) 3. Fraud (cyber scams) and 4. Robbery (theft of valuable information) Various types of people commit computer crimes. The two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities. A cracker is one who breaks

  • Ranking:
  • Word count: 1175
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Ecommerce (M) BETC IT

Potential risks to organisations of committing to an e-commerce system Organisation means a group of people work together with a common goal or objective in an organisation, there are many types of organizations, and in my presentation I would use businesses as a type of organization to develop my ideas and explanations. E-commerce offers competitive advantages such as improved customers service, reduced costs and entry to the global market, which attracted a lot of organizations to committing their businesses to an e-commerce system. However this typical system is not as perfect, there are also tons of potential risks of using e-commerce system. Especially for a new to e-commerce organisation, their site always not been fully protected or functioned, it would cause series of issues which need to be solved, and in order to solve these issues, organizations have to pay huge amount of money and time to investigate and maintain their systems. A website never born perfectly, the site like Amazon and eBay, years of changes and development has to be made. For example an business have their own management way, policy and security protection etc and it works very well before they committed to an e-commerce system, they set their tasks and they finished it perfectly without anything to do with ICT, but after they committed to an e-commerce system, it's a completely different story.

  • Ranking:
  • Word count: 956
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Investigating a Transactional Website (www.latestdvd9.com)

By Kamran Adnan Transactional Websites A transactional website is one that allows visitors to buy goods or services online and also pay for them online. The most common type of transactional websites offer goods such as books, electronics, and food. However there are also websites that offer other type of goods and services such as travelling tickets, downloadable games/software or online movies. In most cases these websites were created by large companies and supermarket chains, whereas there are also some where the general public can sell their own goods. Examples for this are Play.com and Amazon.com. My Transactional Website (LatestDVD9) The transactional website that I have chosen to investigate is LatestDVD9.com. This is a website that sells a variety of movies on DVDs. The website sells only movies on DVDs including mainly Hollywood and also a few Bollywood movies. It is a very popular DVD selling website because customers can find almost every Hollywood movie they are looking for, no matter how old it is. There are even movies available that came out more than 65 years ago. Purpose As the name of the website tells it, its purpose is mainly to sell DVDs. The website is to sell the latest films that have just come out in cinemas on DVDs and sell these mainly in the United States. However in the FAQs it is written that the website also sells across the world to

  • Ranking:
  • Word count: 7231
  • Level: AS and A Level
  • Subject: ICT
Access this essay