Copyright:
The Copyright, Designs and Patents act (1988) protects the time, money and effort put into a original piece of work, they can protects artists, authors, photographers, creators of games, films and software.
They use it to ensure people are rewarded for their work and give protection to the copyright holder so nobody steals or copies their work. It also protects industries because if people just downloaded music then the music industry would lose money and fail. It is obtained when someone who creates a piece of work, it belongs to them and if someone copies or steals it they can sue that person by taking legal action. For images or paintings you have to get it copyrighted and if someone wants to use it they have to ask your permission. Some times it can be bad because people can get sued for using someone else's work and their business can go under, also some companies may complain and try to sue things they believed are copyrighted by aren't much like their ideas/work.
Data Protection:
The Data Protection Agency (1998) protects peoples personal data
Data collectors, the person who has to ask permission for taking data and they organize what data needs to be collected and what it is used for. They have to follow these eight principles of the Data Protection Agency when dealing with personal data: People have to know what data is being collected and they have to been asked if they company can take it, they have to know what their data is being collected for, and can only use it for that purpose, they can only take relevant information, the data should be accurate and up to date, it can't be held for longer than it is needed, people have the right to inspect the information a company has on them, the data can't be send to countries outside the EU and the data should be protected from hackers. It is used when somebody needs to takes somebody else's information such as medical information or contact information, companies, organisations or employers will need to know this information. It might be available for hackers to get it or people might misuse this information.
Computer misuse:
The computer misuse act (1990) is a legislation to help prosecute hackers
they have these offences: Unauthorized access to computer material, unauthorized access with intent to commit or facilitate a crime, unauthorized modification or computer material, making, supplying or obtaining anything which can be used in computer misuse offences. It helps prevent hacking and people stealing important information such as personal details and bank details. It also protects people from other people deleting important files that may be important to an organisation, it also prevents people making dangerous viruses or Trojans or computer systems. Some times it can be difficult to trace who is actually responsible for the offence, also if there was any intent for the offence, they can also say they weren't aware of what they were doing was illegal and also by the time the hacker is caught the damage to the system is done.
Izzy's blog
Saturday, 25 January 2014
Tuesday, 17 December 2013
Searching the internet

I'll go on the page the hair loss Wikipedia page and the definition of bald website. I selected these because they will be the most useful and have the information wanted for that search. I know it has the information I am searching for because it has a bit of the information under the Website title and name.
Searching bald -hair
On this page i haven't found what I needed because it was mostly about Bald eagles and not bald hair. I wouldn't go on any of these sites as it doesn't have the information needed.
Searching "American Eagle"

I haven't found what I am looking for as it is about american airlines and american eagle outfitters. Again I wouldn't go on any of these websites.
Searching American Bald Eagle
I found the information I am looking for as it is actually about the American bald eagle, most of it shown on the side and a brief bit of information is under the title of the website. It has the Wikipedia page and other information sites about them. I would go on the Wikipedia page and the American bald eagle information website.
Tuesday, 3 December 2013
Safety and security online
5.1 and 5.3 -
Threats to system performance when working online and threats to information security of working online.
system performance - when it breaks computer
information security - personal information be compromised e.g. hackers
All these are risks to computers because virus and other system performances as it can slow down computers and eventually break them. And information security can take your personal information and can steal money or your identity or your broadband.
system performance -
Worms a program that infects computers by creating copies
Spam gets on to your computer usually by email and the user wastes time and money get rid of it
Virus is used to disrupt computer organisation and gather sensitive information
information security -
Trojans pretend to be a useful program but actually contains malicious code that can steal information from your computer and can harm the computer
Hackers break security to access to information from your computer
Some people pretend to be someone else in order to steal information from you or your computer
Phishing is when a website tries to con you into entering sensitive information e.g. passwords, credit card information
Virus is used to disrupt computer organisation and gather sensitive information
Malware Like a virus but does not need to attached to a program and can spread themselves.
5.5 and 5.6 - threats and reducing threats:
Threats like Trojans and Viruses and dangerous to your computer, they can get it in a disrupt the programming as well as steal important information. They can also break your computer or damage it which may lead you spending money you don't have to repair it or replace it. But a good way to avoiding them is installing anti-virus software such as McAfee, which will do automatic and timed scans to keep your computer safe. they should do it once a week. McAfee also has a siteadvisor which tells you which sites are safe, so you can avoid the unsafe ones. Your anti-virus software should update itself but if it doesn't you' ll have to do it manually. There should be information on how to do this on the companies website or elsewhere online.
Hackers can also get into your computer and personal account to steal important/private details from you.They can steal passwords or credit card information even use your WiFi. they may even ruin your account, could get you blocked or even get rid of it.
5.2 and 5.4
Threats to system performance when working online and threats to information security of working online.
system performance - when it breaks computer
information security - personal information be compromised e.g. hackers
All these are risks to computers because virus and other system performances as it can slow down computers and eventually break them. And information security can take your personal information and can steal money or your identity or your broadband.
system performance -
Worms a program that infects computers by creating copies
Spam gets on to your computer usually by email and the user wastes time and money get rid of it
Virus is used to disrupt computer organisation and gather sensitive information
information security -
Trojans pretend to be a useful program but actually contains malicious code that can steal information from your computer and can harm the computer
Hackers break security to access to information from your computer
Some people pretend to be someone else in order to steal information from you or your computer
Phishing is when a website tries to con you into entering sensitive information e.g. passwords, credit card information
Virus is used to disrupt computer organisation and gather sensitive information
Malware Like a virus but does not need to attached to a program and can spread themselves.
5.5 and 5.6 - threats and reducing threats:
Threats like Trojans and Viruses and dangerous to your computer, they can get it in a disrupt the programming as well as steal important information. They can also break your computer or damage it which may lead you spending money you don't have to repair it or replace it. But a good way to avoiding them is installing anti-virus software such as McAfee, which will do automatic and timed scans to keep your computer safe. they should do it once a week. McAfee also has a siteadvisor which tells you which sites are safe, so you can avoid the unsafe ones. Your anti-virus software should update itself but if it doesn't you' ll have to do it manually. There should be information on how to do this on the companies website or elsewhere online.
Hackers can also get into your computer and personal account to steal important/private details from you.They can steal passwords or credit card information even use your WiFi. they may even ruin your account, could get you blocked or even get rid of it.
If you are being Cyber bullied report either to the website or to the police or block the person responsible or even leave the website. If your a Cyber bully.Don't.
Always be careful when meeting stranger online, don't give out personal information to them and if you meet them in person bring someone with you. There is also some shredder options on computer programmes like McAfee which allow to 'shed' date that may have personal information on them so it won't get into the wrong hands.
When online do not give out personal e.g. bank details on anything that isn't a bank website information especially on unsafe websites and don't give out personal information to people, particularly if you don't known them. Try using a strong password, that will help stop people hacking into personal accounts. And you can even change it regularly if you want to.
5.2 and 5.4
the protection on a computer, there are others you can download like McAfee and Norton
how to test your password strength, passwords can be strengthened by using numbers and symbol ,this picture shows the strength of my password.
HTTP is a communication protocol for secure communication over a computer network especially over the internet, it makes the internet more secure as the user knows there on the actual website and not an imposter.
Tuesday, 19 November 2013
Using browsers
Bookmarks
this pictures shows how to add bookmarks which you do by clicking the star on chrome and how to make a and how bookmarks look on chrome
Changing settings
closing the toolbar or having showing all the time. You add it by right clicking on it and click show bookmark bar and you close it by doing the same
full screen, you get it by pressing F1 and exit by clicking it again
how you get adblock on chrome and how it shows when you have it
shows how you get a smaller or bigger text size and zooming in and out for different page size
Adjust browser settings
shows how to disable background programs from running when you go on chrome settings
go on to settings on chrome and then advanced settings and then to the privacy section and then click content settings to change cookie settings and disable them if you want to also there is an option to disable JavaScript at the bottom if you want to
When you Google disable CSS you can add Pendule from chrome web store which can allow you to disable CSS on the website you want.
Add ons
you can add add ons by going on the chrome web store which you can google or theres a link on this page and this is where all the extension/utilities show up
Tuesday, 15 October 2013
connecting to the internet
Different connections to the internet
Phone connections – They have software so they can get on the internet easily
Dial up connections – email and reading web pages
Computer will dial a phone number using a telephone line,
and you have to pay each time.
They are really slow and you can’t watch videos or make video
or voice calls.
Advantages - only pay for what you use, so if you don't use it much you don't have to pay too much.
Disadvantages - only used for simple websites that doesn't have much data, so you can't watch videos.
Advantages - only pay for what you use, so if you don't use it much you don't have to pay too much.
Disadvantages - only used for simple websites that doesn't have much data, so you can't watch videos.
Broadband connections – is high speed, the phone and the
computer isn't tied so you can make a call and be on the internet at the
same time.
You can watch live news and download and share files and
shop and bank online easily and quickly, it stops working sometimes and sometimes has to be at an optimum place in a house.
advantages - you can use phone and internet at same time, can download and use complicated.
disadvantages - WiFi connection isn't always strong
advantages - you can use phone and internet at same time, can download and use complicated.
disadvantages - WiFi connection isn't always strong
Fixed broadband connections – is a permanent connection
to the internet
Can be wireless so good for more than one person wanting
be on the internet at the same time. You can use them anywhere in the house and
sometimes outside
You can get an internet phone called Voice over Internet
Protocol (VoIP).
disadvantages - People can easily hack into it and steal it.
Advantages - connection is good, can be used anywhere in a house and multiple people can be on it.
disadvantages - People can easily hack into it and steal it.
Advantages - connection is good, can be used anywhere in a house and multiple people can be on it.
Phone connections – They have software so they can get on the internet easily
If you’re out you will have to connect to a wireless hot
spot which means you can get free access to their broadband, you might need the
password for it. It can be hard to find a wireless hot spot and it costs extra to have internet on your phone.
disadvantages - may have to pay extra to have internet connection on phone
advantages - can get on the internet when out.
On your phone or iPod, you can connect to the internet by going on settings and turning on WiFi and then choosing a suitable one to connect to, you main need the password for some, but some are free. Wireless computer will automatically connect to the WiFi and for locked broadband you have to put in the code, this is for fixed broadband and ordinary broadband connections. To connect to dial up connections you need to go on the control panel, then on network and internet connections than click create a connection.
disadvantages - may have to pay extra to have internet connection on phone
advantages - can get on the internet when out.
On your phone or iPod, you can connect to the internet by going on settings and turning on WiFi and then choosing a suitable one to connect to, you main need the password for some, but some are free. Wireless computer will automatically connect to the WiFi and for locked broadband you have to put in the code, this is for fixed broadband and ordinary broadband connections. To connect to dial up connections you need to go on the control panel, then on network and internet connections than click create a connection.
this picture is about being able to connect to the internet and troubleshooting internet connection
Troubleshooters find problems with the computer like a faulty internet connection, and then it fixes it so you can use the internet. You would need to use this if your internet connection stops working so it can find the problem and reconnect it.

To connect to the internet on phones and similar devices, you click on settings, then on Wi-Fi as shown, then you click it on and you choose the one you want to connect too. For most of them you may need a Password and you can choose it to connect automatically.

To connect to the internet on phones and similar devices, you click on settings, then on Wi-Fi as shown, then you click it on and you choose the one you want to connect too. For most of them you may need a Password and you can choose it to connect automatically.
Subscribe to:
Comments (Atom)


















