Activity 3.5
Beat the credit crunch
(Insurance fifty plus)
Report: SEPEMBER 2009 EDITIION
I chose the insurance leaflet because it caught my eye. It is very colourful and graphical which attracts the audience (ME).this leaflet’s target audience is for adults because it’s about insurance but it still attracts youngsters by its colourful presentation. I get this leaflet every month for free so it’s worth it.
This leaflet is all about insurances like :AVIVA ,CHURCHIL ,DIRECT LINE ,SWINTON ,CASTLE COVER ,GREEN BEE,SAGA,LIVERPOOL VICTORIA ,RIAS,AGE CONCERN,MORE THAN.IT EACH PAGE HAS A DIFFERENT INSUARNCE COMPANY EXPLAINING WHATS ITS ABOUT IF THE AUDIENCE DON’T KNOW.BASICALLY ITS PURPOSE IS TO PERSUADE YOU TO CLAIM FOR THOSE INSURANCES.
Advert: would you like to save money on all your household bills? JOIN THE CLUB
I chose this advert because it was very eye catchy and interesting to read .it has a big bold colourful title to attract the audience /has a money bank( pig)to represent the savings /has a website for you to go on www.utilitypro.co.uk. I found it very easy to understand .its little message /comment is
S ingle bill for all your utilities
A ward –winning customer service
V alue that’s unbeatable
E asy to switch
And that is the website you go on if you follow the link .i think this company did their job well, because its very attractive and persuasive .
I DID HAVE A SCREEN SHOT BUT NIT DOESN’T LET ME PUT IT ONTO THE BLOGGER
Wednesday, 30 September 2009
Wednesday, 23 September 2009
Wednesday, 16 September 2009
memo
B.S laptops
Memo
To: MR Robert SMITH
From: LORETA MOTIEJUNAITE
CC:
Date: September 16, 2009
Re: TECHNOLOGY SYSTEMS
Dear Mr. Robert smith,
I’m writing to you today to help keep the technology systems performing reliably. Here are some things that need to be improved or done
1. THE FIRE SUPRESSION SYSTEM IS NOT in place
2. the security around the building is not safe it needs a firewall system
3. we should have more deadlocks to keep systems safe
4. our back ups are not in place so we need them in place to protect data
5. the offices need proper swipe cards because some are now attacked by viruses
Hope you will take my suggestions into actions, because this is very important for our company other wise we will have more and more problems
Memo
To: MR Robert SMITH
From: LORETA MOTIEJUNAITE
CC:
Date: September 16, 2009
Re: TECHNOLOGY SYSTEMS
Dear Mr. Robert smith,
I’m writing to you today to help keep the technology systems performing reliably. Here are some things that need to be improved or done
1. THE FIRE SUPRESSION SYSTEM IS NOT in place
2. the security around the building is not safe it needs a firewall system
3. we should have more deadlocks to keep systems safe
4. our back ups are not in place so we need them in place to protect data
5. the offices need proper swipe cards because some are now attacked by viruses
Hope you will take my suggestions into actions, because this is very important for our company other wise we will have more and more problems
5.9
Activity 5.9
1. list ways physical security can be implemented.
Locking the rooms with good quality locks
Raise it from the floor
2. How could the physical security identified in question 1 be breached?
It can only be breached if you brake the locks (well if its possible) brake down the room raised above the floor
3. Analyze how virus-checking software and firewall can work together to prevent virus infection.
They can both protects different things like virus checker can protect it form hackers and firewall can block unauthorized access while permitting authorized communications.
1. list ways physical security can be implemented.
Locking the rooms with good quality locks
Raise it from the floor
2. How could the physical security identified in question 1 be breached?
It can only be breached if you brake the locks (well if its possible) brake down the room raised above the floor
3. Analyze how virus-checking software and firewall can work together to prevent virus infection.
They can both protects different things like virus checker can protect it form hackers and firewall can block unauthorized access while permitting authorized communications.
5.8
Activity 5.8
What are the advantages and disadvantages of a swipe card, access code or key to secure a room?
The advantage of a swipe card is: that it protects everything from hackers hacking in and other people wrecking your servers e.t.c
Disadvantage is that someone can steal it.
1. The advantages of access code: it protects your system from viruses and other people hacking in
Disadvantage of an access card is that it might have a virus and damage /delete your systems
2. An advantage of a key to secure a room is that it protects other people from coming in and wrecking your computer and your systems
The disadvantage is that someone can find the key and come in or a fire might occur and if you locked the room and forgot were the key is you cant get in or out the room which is a health and safety hazard
2 .WHICH SECURITY SYSTEMS THE MOST SECURE?
THE MOST SECURE IS DEADLOCKS /COMBINATION LOCKS
3. What is needed to keep a system available 24/7
Back up generators
Check system regulary
What are the advantages and disadvantages of a swipe card, access code or key to secure a room?
The advantage of a swipe card is: that it protects everything from hackers hacking in and other people wrecking your servers e.t.c
Disadvantage is that someone can steal it.
1. The advantages of access code: it protects your system from viruses and other people hacking in
Disadvantage of an access card is that it might have a virus and damage /delete your systems
2. An advantage of a key to secure a room is that it protects other people from coming in and wrecking your computer and your systems
The disadvantage is that someone can find the key and come in or a fire might occur and if you locked the room and forgot were the key is you cant get in or out the room which is a health and safety hazard
2 .WHICH SECURITY SYSTEMS THE MOST SECURE?
THE MOST SECURE IS DEADLOCKS /COMBINATION LOCKS
3. What is needed to keep a system available 24/7
Back up generators
Check system regulary
viruses
· Klez is a computer worm that propagates via e-mail. It first appeared in the end of 2001. A number of variants of the worm exist.
· Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.
· The e-mail through which the worm spreads always includes a text portion and one or more attachments.
· The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm).
· The first attachment is always the worm, whose internals vary.
· Once the worm is executed, either automatically by the buggy HTML engine or manually by a naive user, it searches for addresses to send itself to.
· When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.
· Later variants of the worm would use a false from address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.
What happens if you open the virus?
If you open the virus and your computer gets infected, it not only looks in your address book for additional email address, it also checks files such as temporary internet files for addresses.
What else?
….Your computer starts sending the virus out to those people. It does this WITHOUT your knowledge.
This is the HTML I used:
http://en.wikipedia.org/wiki/Klez_(computer worm)
http://www.dianestreasures.com/virus.html
Comparing Klez to Macro
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
The difference between Klez and Macro is that Klez is a worm which attacks internet stuff but unlike macro attacks programs like Microsoft word in its own language.
HTML: http://en.wikipedia.org/wiki/Macro_virus_(computing)
VIRUS CHECKING SOFTWARE McAfee
The company was founded in 1987 as McAfee Associates, named for its founder John McAfee. McAfee was incorporated in the state of Delaware in 1992. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. In 2004, a major restructuring occurred. In the spring, the company sold its Magic Solutions business to Remedy, a subsidiary of BMC Software. In the summer of 2004, the company sold the Sniffer Technologies business to a venture capital backed firm named 'Network General' - the same name as the original owner of Sniffer Technologies. Also, the company changed its name back to McAfee to reflect its focus on security-related technologies.
Among other companies bought and sold by McAfee (formerly known as Network Associates) is Trusted Information Systems, which developed the Firewall Toolkit, which was the free software foundation for the commercial Gauntlet Firewall, which was later sold by McAfee to Secure Computing Corporation. Network Associates, as a result of brief ownership of TIS Labs/NAI Labs/Network Associates Laboratories/McAfee Research, was highly influential in the world of Open Source software, as that organization produced portions of the Linux, FreeBSD, and Darwin operating systems, and developed portions of the BIND name server software and SNMP version 3.
The 2009 version costs $23.49
· Klez infects Microsoft Windows systems, exploiting vulnerability in Internet Explorer's Trident layout engine, used by both Microsoft Outlook and Outlook Express to render HTML mail.
· The e-mail through which the worm spreads always includes a text portion and one or more attachments.
· The text portion consists of either an HTML internal frame tag which causes buggy e-mail clients to automatically execute the worm, or a few lines of text that attempt to induce the recipient to execute the worm by opening the attachment (sometimes by claiming that the attachment is a patch from Microsoft; sometimes by claiming that the attachment is an antidote for the Klez worm).
· The first attachment is always the worm, whose internals vary.
· Once the worm is executed, either automatically by the buggy HTML engine or manually by a naive user, it searches for addresses to send itself to.
· When it sends itself out, it may attach a file from the infected machine, leading to possible privacy breaches.
· Later variants of the worm would use a false from address, picking an e-mail address at random from the infected machine's Outlook or Outlook Express address book, making it impossible for casual observers to determine which machine is infected, and making it difficult for experts to determine anything more than the infected machine's Internet Service Provider.
What happens if you open the virus?
If you open the virus and your computer gets infected, it not only looks in your address book for additional email address, it also checks files such as temporary internet files for addresses.
What else?
….Your computer starts sending the virus out to those people. It does this WITHOUT your knowledge.
This is the HTML I used:
http://en.wikipedia.org/wiki/Klez_(computer worm)
http://www.dianestreasures.com/virus.html
Comparing Klez to Macro
In computing terminology, a macro virus is a virus that is written in a macro language: that is to say, a language built into a software application such as a word processor. Since some applications (notably, but not exclusively, the parts of Microsoft Office) allow macro programs to be embedded in documents, so that the programs may be run automatically when the document is opened, this provides a distinct mechanism by which viruses can be spread. This is why it may be dangerous to open unexpected attachments in e-mails. Modern antivirus software detects macro viruses as well as other types.
The difference between Klez and Macro is that Klez is a worm which attacks internet stuff but unlike macro attacks programs like Microsoft word in its own language.
HTML: http://en.wikipedia.org/wiki/Macro_virus_(computing)
VIRUS CHECKING SOFTWARE McAfee
The company was founded in 1987 as McAfee Associates, named for its founder John McAfee. McAfee was incorporated in the state of Delaware in 1992. Network Associates was formed in 1997 as a merger of McAfee Associates and Network General. In 2004, a major restructuring occurred. In the spring, the company sold its Magic Solutions business to Remedy, a subsidiary of BMC Software. In the summer of 2004, the company sold the Sniffer Technologies business to a venture capital backed firm named 'Network General' - the same name as the original owner of Sniffer Technologies. Also, the company changed its name back to McAfee to reflect its focus on security-related technologies.
Among other companies bought and sold by McAfee (formerly known as Network Associates) is Trusted Information Systems, which developed the Firewall Toolkit, which was the free software foundation for the commercial Gauntlet Firewall, which was later sold by McAfee to Secure Computing Corporation. Network Associates, as a result of brief ownership of TIS Labs/NAI Labs/Network Associates Laboratories/McAfee Research, was highly influential in the world of Open Source software, as that organization produced portions of the Linux, FreeBSD, and Darwin operating systems, and developed portions of the BIND name server software and SNMP version 3.
The 2009 version costs $23.49
Wednesday, 9 September 2009
ACTIVITY 5.3
Activity 5.3
What is meant by business-relevant technology?
A business –relevant technology system has a definite purpose such as networking several computers together so folders on their hard drives can be shared allowing a team to work together
Identify advantages an estate agency might gain from using a network.
A small business, such as a local estate agency could network their computers into a business –relevant system. such a system would allow staff to show customers up-to-date property details from any of the computers agency .a great strength of this system is that a new property is added ,every computer would be able to view the details almost immediately.
Find out why people say that ADSL is a type of DSL?
THIS is because Asymmetric digital subscriber line (ADSL) is the popular of all the DSL types. Several homes and small businesses find ADSL easy to use. ADSL provides high speed transmission of information at a high bandwidth over regular phone lines. Unlike dialup phone, ADSL gives consumers permanent internet connectivity.
What is meant by business-relevant technology?
A business –relevant technology system has a definite purpose such as networking several computers together so folders on their hard drives can be shared allowing a team to work together
Identify advantages an estate agency might gain from using a network.
A small business, such as a local estate agency could network their computers into a business –relevant system. such a system would allow staff to show customers up-to-date property details from any of the computers agency .a great strength of this system is that a new property is added ,every computer would be able to view the details almost immediately.
Find out why people say that ADSL is a type of DSL?
THIS is because Asymmetric digital subscriber line (ADSL) is the popular of all the DSL types. Several homes and small businesses find ADSL easy to use. ADSL provides high speed transmission of information at a high bandwidth over regular phone lines. Unlike dialup phone, ADSL gives consumers permanent internet connectivity.
activity 5.1
Activity 5.1
identify the components used in a network that you know of
The components used in a network are: network cards, hubs switches, Ethernet, file server,, wifi
Describe the roles of the components you identified in question 1.
Network card :,( NIC), network interface card, or LAN adapter is a computer hardware component designed to allow computers to communicate over a computer network or to make it easier its role is to connect the network cable to a pc
Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment
Switch: is a computer network device that connects network segments. Both of their roles are to transfer file email e.t.c
Ethernet: Ethernet is a network standard for data transmission using either coaxial or twisted pair cable
File server: its role is to take all the information that needed and pass it to all the networks so whenever you need to work on another computer your work is on there
Wifi: its role is the same as Ethernet its just wire less
research and analyze reasons why switches are better than hubs
switches are better than hubs because they are much more ‘intelligent’ easier to use, not messy everything is ordered where its meant to go .unlike hubs have long cables which look like a tree trunk its much harder to use them because the cables are all over the place .(switches are more expensive than hubs)
identify the components used in a network that you know of
The components used in a network are: network cards, hubs switches, Ethernet, file server,, wifi
Describe the roles of the components you identified in question 1.
Network card :,( NIC), network interface card, or LAN adapter is a computer hardware component designed to allow computers to communicate over a computer network or to make it easier its role is to connect the network cable to a pc
Hub: is a device for connecting multiple twisted pair or fiber optic Ethernet devices together and thus making them act as a single network segment
Switch: is a computer network device that connects network segments. Both of their roles are to transfer file email e.t.c
Ethernet: Ethernet is a network standard for data transmission using either coaxial or twisted pair cable
File server: its role is to take all the information that needed and pass it to all the networks so whenever you need to work on another computer your work is on there
Wifi: its role is the same as Ethernet its just wire less
research and analyze reasons why switches are better than hubs
switches are better than hubs because they are much more ‘intelligent’ easier to use, not messy everything is ordered where its meant to go .unlike hubs have long cables which look like a tree trunk its much harder to use them because the cables are all over the place .(switches are more expensive than hubs)
my new blog
Hello ,
I have just created my new blog it was easy peasy lemon sqeezy ....
LOL LOL LOL LOL LOL LOL
: ) : ) : ) : )
: 0 : 0 : 0
I have just created my new blog it was easy peasy lemon sqeezy ....
LOL LOL LOL LOL LOL LOL
: ) : ) : ) : )
: 0 : 0 : 0
Subscribe to:
Comments (Atom)
