Skip to main content

Home/ IB ITGS/ Group items tagged Criterion B

Rss Feed Group items tagged

YooJin Jung

Subscription Models - 0 views

  •  
    criterion B explains how online subscription works
YooJin Jung

LEARN THE NET: How Hyperlinks Work - 0 views

  •  
    Criterion B describe how hyperlink works
Maliha Rahman

Young 'cyber-mentors' step up (BBC) Criterion B - 1 views

  •  
    this article talks about cyber mentors or in other words people who help out others, are stepping up in the technological world of the internet and mentoring people or users who are being bullied or bugged through online sources
Maliha Rahman

Prevention from sexting (all business) Criterion B - 0 views

  •  
    This article briefly discusses the idea of Sexting and solutions that many people are trying to come up with to prevent it from happening. It talks about how they have to come up with a solution but also consider the importance of technology that plays in teenagers lives.
Elvira Russ

Training programs for use of assistive technology - 0 views

  •  
    This article discusses a great solution to make assistive technology become more effective and not just a waste of money. Training programs.
Elvira Russ

Easy Explanation of Assistive technology and possibilities - 0 views

  •  
    This article is written for people using easy vocabulary and showing how not just big things like huge machines etc are assistive technology devices that will help people, but small small things as well, that people might not think are significant, but that help disabled people a lot with their everyday life.
Chalana Perera

Experts work to untangle cyber attacks (MSNBC) - 0 views

  • zombie’ computers
  • hackers may have simply used zombie computers
  • digital battlefield
  • ...7 more annotations...
  • 100,000 zombie computers linked together in a network known as a "botnet."
  • basic hack job
  • blizzard of digital requests
  • federal government is still very vulnerable in terms of its cyber security and that agencies have miles to go to plug the holes.
  • intrusion problem."
  • fast-spreading e-mail worm from 2004 called "MyDoom
  • malware also appears to contain a destructive Trojan designed
  •  
    This article discusses the US ad South Korean research into suspected cyber attacks from North Korea on private and govt websites in the two countries. It discusses the programs used, the impacts and effects and how the attack takes place from one computer, creates a network through botnets and installs malware into thousands of computers which then send repeated requests, simultaneously to the same website, attacking it.
1 - 10 of 10
Showing 20 items per page