My Friend
Friday, August 9, 2019
suggestion to improved the course
There are nothing that can be improve in this particular course , i have learn so much about this course and apply it to my presentation and other stuff. It helps me to understand how to use microsoft word , excel and power point. I am able to fully used the skills.
The importance of privacy, security, legal and green computing awareness for society.
Privacy is important because it is about respecting
individuals. If a person has a reasonable desire to keep something private, it
is disrespectful to ignore that person’s wishes without a compelling reason to
do so. Of course, the desire for privacy can conflict with important values, so
privacy may not always win out in the balance. Sometimes people’s desires for
privacy are just brushed aside because of a view that the harm in doing so is
trivial. Even if this doesn’t cause major injury, it demonstrates a lack of
respect for that person. In a sense it is saying: “I care about my interests,
but I don’t care about yours.”In this modern and fast paced world, security is more important than
ever. It is one of the fastest growing industries in the world today.Almost everyday one hears about damage or loss occurring
due to security lapses or a lack of security on the news.Even the term security
is not just limited to physical security nowadays. It includes things that are
unseen but extremely valuable things such as electronic data or e-data for
example credit card details or government documents. Law governs much of what everyone does,
day in and day out. It tell us what our rights and duties are. It allows
us to assert rights that we have. It lets us know the consequences of not
doing what we are supposed to do. Without law, we do not have civilization; we
have chaos. Law is meant to protect people and property from harm. It is
designed to either remove people from society who have harmed people and property
or to make them monetarily responsible for the harm. If we had no law,
people could steal from us, hurt us, damage our property, or do any number of
other acts that society has agreed it does not find acceptable. Conversely, we
could steal from others or harm them without laws to discourage us from doing
so. There is no reason to think that, without law, people would all
behave nicely and reasonably. With law, we clearly know what we are responsible
for doing and what will happen to us if we violate a law. Without law, people
could and would do whatever they wished. Green computing refers to environmentally sustainable
computing. It minimize the use of electricity as well as energy and reduce the
environmental dissipate when we are using a computer. The green computing has
the same goals with green chemistry, which is longer the life time of the
product and makes the product more efficiency of energy, advance the discarded
product and factory waste to be more easily recycled and biodegradable, use of the
less-hazardous materials.
The evolution of web authorization
Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.Authentication is the process of verifying the identity or authenticity of a person or an entity. Let's go back to the time that the world was not yet introduced to computers and the internet. If a customer of a bank had to withdraw some money from the branch, how would it take place? The teller at the branch would ask the customer for a proof to confirm that he/she is the valid customer. The customer would then sign on a piece of paper, which would be compared with the signature provided by the customer at the time of opening the account. With the advent of computers, the signature was replaced by the password. The user would set a password value during registration and then provide it each time to access the account.However, as the internet has been evolving, authentication schemes have also been evolving.
The evolution of the internet
The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research network dubbed Arpanet in 1969. Since then, the Internet has undergone more than just a name change. The number of computers connected to the Internet has grown exponentially, while the number of users has risen from a handful of computer scientists to 1.5 billion consumers. The network's reach has expanded beyond the United States to every corner of the globe. But its popularity has a dark side, as it has evolved from a friendly research network to a hotbed of criminal activity including fraud and identity theft.The world's largest network of computer networks got its original name from the U.S. military arm that funded it: Arpanet was for the Advanced Research Projects Agency. Back in 1969 when Arpanet was created, it connected five sites: UCLA, Stanford, UC Santa Barbara, the University of Utah and BBN. In 1983, the U.S. Defense Department spun-off MILNET*, which was the part of Arpanet that carried unclassified military communications. Arpanet was renamed the Internet in 1984, when it linked 1,000 hosts at university and corporate labs.
*MILNET was later re-named the Defense Data Network and finally NIPRNET, for Non-classified IP Router Network.The number of computers connected to the Internet has grown dramatically from the network's humble beginnings, when it connected four computers at university research labs. Today, the Internet links more than 440 million computers directly, and millions more have Internet access through private addressing schemes.
Subscribe to:
Posts (Atom)