Você está na página 1de 29

1.

EDUCATION
It plays a major role in guiding the children the children to make use of the best computer technology and guide them so that the possible negative sides of the technology are limited.

Computers and Internet can help in making lessons customized and student centered.

With abundance of knowledge, teachers can act as

motivators and facilitators of learning rather than transmitters of information.

Computer security implies as being able to sleep at night knowing that your important data are safe. 1. Protection that is, putting enough protection in your system as well as following preventive measures such as creating passwords. 2. Detection making your system effective in detecting unauthorized access as well as extraordinary activities in the system. 3. Reaction being able to react to possibilities intrusions.

COMPUTER SECURITY ISSUES


Bugs or misconfiguration problems that allow unauthorized remote users to: steal confidential documents execute commands on the host machine, allowing them to modify the system gain information about the host machine, allowing them to break into the system

Aspects of Computer Security

1. Physical Security
First and perhaps the easiest rule of computer security. secure you computers attended, watched or locked.

2. Viruses
Is one of those programs you dont want that usually gets sent to you by people or through email.

Your computers anti biotic shots form of ANTIVIRUS

3. Malicious Logic
Usually

effects your computer system while you are on the net. Commands are frequently present in web pages we visit while surfing the net. Symtoms may include slow response time, system crashes, or uncooperative programs.

4. Hacking
Hackers used to viewed as people who work in front of a computer, locked up in a room. Early 1980s - LEGION OF DOOM infamous hacker groups based in the USA and the CHAOS COMPUTER CLUB - were the most widely recognized and respected hackers group ever founded.

5. Internal Misuse
Some

people use your computer and some files are intentionally or unintentionally deleted.

When permanently deleted from system, this mean that you will redo the work. System crashes will occur when files needed.

6. Spoofing
Network Spoofing is an ingenious way for intruder to gain access. The intruder sets up a program that impersonates the sign on routine for another system. When you attempt to log in to the system, the intruders program collects the PASSWORD, then returns a message that the SYSTEM is UNAVAILABLE.

Web Technology Internet


refers to a collection of computers and cables forming a communications network carries a various data, including e-mail, videoconferences, instant messages and contents of Web pages

Web
is an abstract space of information. On the Net, you find computers - on the Web, you find documents, sounds, videos, and information. On the Net, the connections are cables between computers; on the Web, connections are hypertext links.

Internet is a communications system. Web is an interlinked collection of information that flows over that communication system.

Web browser an application software allowing users to access and view web pages Web page a page consisting of HTML documents stored on a web server Web site collection of connected web pages stored on a web server

Hypertext a computer system that could store literary documents, link them according to logical relationships, and permit readers to comment and annotate what they read

HTML ( Hypertext Markup Language) document refers to plain text, or ASCII, document with embedded HTML tags

Other Internet Services Electronic Mail Newsgroup and Message Boards Mailing Lists Chat Rooms Instant Messaging Internet Telephony

Types of Web Sites


Portal News Informational Business/Marketing Educational Entertainment Advocacy Blog (weB Log) Personal

Search Engines
program that finds web sites and pages helps the user find particular information about certain topics or locate particular web pages for which they do not know the exact web address A search text box is available where you will enter your topic or subject to research

Popular Search Engine Google the largest search engine in the web whose purpose is to organize the worlds information and make it universally accessible and useful Yahoo! the first navigational portal to the web by Jerry Yang and David Filo

Commerce is the exchange goods and services, usually for money.

Three Different Roles are played with Commerce: 1. The buyers. Those people with money who wants to purchased goods or services. 2. The sellers. Those people who offers goods and services to the buyers. 3. The producers. Those people who create the products and services that sellers offer to buyers.

Electronic Commerce e-commerce can be defined as any business transactions in which the parties interact electronically rather than by physical exchanges.

ETHICS refers to the rules and standards governing the conduct of an individual with others. COPYRIGHT Copyright is a form of protection provided by the law to authors of original works, otherwise known as their intellectual property.

A copyright owner has a sole right to: Reproduce the material Prepare derivative works based on the material Distribute copies of the material to the public Perform the work publicly (if applicable) Display the work publicly

PRIVACY refers to the right of people not to reveal information about themselves A cookie is a piece of data that the web site collects about you while you visit. Such data may include names, address, sex or age. If you have ever checked a box saying Remember My Password, you have sent a cookie.

CENSORSHIP There are things on the net that are fairly universally considered inappropriate or obscene. One reaction of this is that we should censor them.

Business Ethics Code of morals of a particular profession The standards of conduct of a given Profession Information Ethics Defined as agreement among information systems professionals to do right and to avoid wrong in their work

2. Artificial Intelligence the science and engineering of making


intelligent machines, especially intelligent computer programs
ALAN TURING is English mathematician who first does the research on AI. He also may have been the first to decide that AI was the best researched by programming computers rather than by building machines.

Turing Test
was designed to satisfactorily identify if the machine is intelligent. To pass the test, the machine should possess the following:

natural language processing to enable it to communicate successfully knowledge representation to store information provided before or during the interrogation machine learning to adapt to new circumstances and to detect and extrapolate patterns computer vision to perceive objects robotics to move about

Specific Applications: game playing


speech recognition understanding natural language computer vision expert systems heuristic classification

Você também pode gostar