Tuesday, 31 May 2016
Referencing/ Biblography for overall posts
References
Debono, M., 2013. Some Sneaky Ways Hackers Use to Try And Steal Information (and how to counteract them). [Online]
Available at: http://www.reqtest.com/general/some-sneaky-ways-hackers-use-to-try-and-steal-information-and-how-to-counteract-them/
[Accessed 22 May 2016].
Huddleston, C., 2013. 6 Ways You Invite Hackers to Steal Your Personal Information. [Online]
Available at: http://www.m.kiplinger.com/article/credit/T048-C011-S001-6-ways-you-invite-hackers-to-steal-your-personal-i.html
[Accessed 20 May 2016].
Rouse, M., 2016. What is identity theft?. [Online]
Available at: http://www.searchsecurity.techtarget.com/definition/identity-theft
[Accessed 17 May 2016].
Schwartz, M., 2012. 8 ways to Avoid Getting Your Life Hacked. [Online]
Available at: http://www.darkreading.com/attacks-and-breaches/8-ways-to-avoid-getting-your-life-hacked/d/d-id/1105707
[Accessed 23 May 2016].
V, B., 2016. Computer Virus (virus). [Online]
Available at: http://www.webopedia.com/TERM/V/virus.html
[Accessed 17 May 2016].
Weisseman, C., 2015. 7 easy ways to avoid being hacked. [Online]
Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4
[Accessed 22 May 2016].
Digital Security (Question 7)
Q-7
(http://informativontn24.info/noticia/aumenta-la-censura-de-internet-en-todo-el-mundo-por-quinto-ano-consecutivo-74814)
Digital Security
Hackers are able to obtain our private information through the internet.
There are certain ways in which you let hackers obtain your private information.
• The use of fragile passwords- According to (Huddleston, 2013) when you use simple passwords for all your internet related accounts, you’re making it easy for hackers to access your information.
• Using one password for all your accounts- According to (Huddleston, 2013)If a hacker is able to obtain your only password you use for all accounts, they are able to access all your accounts.
• Using numerous credit cards to make online purchases- According to (Huddleston, 2013) the more credit cards you use, the more you increase the chances of hackers getting your personal information and using them.
• Account Phishing Scams- according to (Debono, 2013) are scams created by hackers to trick web users into thinking that they are entering in personal information on a valid website.
• Online Checkouts- according to (Debono, 2013)when shopping online some sites are not entirely secure, they leave out loopholes which enable hackers to access your information.
(http://bl00dyp1r4t3.deviantart.com/art/Hack-the-World-256813528)
How to avoid being hacked
• Do not reply to Spam E-mails- according to (Weisseman, 2015) if you are not sure if an E-mail is spam either click ‘Show original” to find the sources of the E-mail or do not replay to it at all.
• Do not open attachments unless you are entirely sure- according to (Weisseman, 2015) one of the ways businesses get hacked is when a unsuspicious employee downloads mail attachments.
• Use complicated passwords- according to (Weisseman, 2015) a strong password that contains uppercase, numbers, lowercase and number is more secure than an easy password with only lowercase.
• Avoid linking accounts- according to (Schwartz, 2012) avoiding linking accounts reduces the risk of being hacked
• Disengage distant wiping- according to (Schwartz, 2012) remote wiping is an easy way for hackers to access your laptop and wipe your information.
Digital Rights and Responsibilities (Question 5)
https://www.thinglink.com/scene/793759505157455874
https://www.thinglink.com/scene/793762046259757058
Monday, 30 May 2016
The Social economy: UNLOCKIN VALUE THROUGH SOCIAL TECHNOLOGIES (Question 3)
Q-3
Social media plays a huge role in our daily lives. it has the ability not only to create and sculpt our careers and personalities, but to also destroy them.
Advantages of Social technologies
l Makes communication easier no matter the proximity between people.
l You are able to handle bank accounts and purchase goods and services over the Internet.
l It keeps us informed regarding the latest news and happenings.
l Doing market research doesn’t take alot of time (Bullas, 2012).
Disadvantages of Social technologies
l There are many cyberbulling cases originating from social media (Claywell, n.d).
l Having your information stolen or your personal information hacked.
l Being exposed to unreliable information.
l Children being exposed to adult content.
Homo. Naledi Discussion (Question 2)
Q-2
In the analyzing of the findings on homo Naledi. My first step was to ‘Ask’ so I first began with compiling the following questions- Who is homo Naledi?, Where was the fossil found?, Who found it?, Why is it considered important?, How do the findings change history? Then i moved on to the second phase whIch was to ‘Acquire’ information, so I used Google search engine for research. I recieved information from sites such as National Geographic channel website, news24.com, elifesciences.org, dailymail.co.uk etc. After obtaining all the information it has to be sorted out and arranged which gave me the following answers to the previous questions stated In the first step, according to The Guardian (2015) homo naledi is the name given to the bones of a new species of ancient human relative, according to The Telegraph (2015) it was found in a remote cave near Johannesburg. According to National Geographic news (2015) they were discovered by Lee Berger (a paleoanthropologist at University of Witswatersrand) and his team of young scientists he called “cave astronaunts”. According to The Guardian (2015) Lee Berger said that Naledi was a new species of Homo found which he considered as quite remarkable. After analysing all the information it had to be applied, of which turned out to be a success and the last phase which is assess had to be executed, and it was final that the information acquired was worthy, accurate and reliable, the process of information fluency was a success.
Question 1.2
Q-1.2
“On this basis it defines technological revolutionaries, examines
Their structure and the idea that they play in rejuvenating the whole economy through the application of the accompanying” (Porez, 2009).
We are able to develop from this this by slow gradual steps and developing technology that will continue to aid us to the fullest.
Subscribe to:
Comments (Atom)


