Skip to main content

Home/ IB ITGS/ Group items tagged technical

Rss Feed Group items tagged

shalani mujer

PC Technical Support's Great Contribution - 1 views

Our Daycare Center has computers that are specially made for children's use. Each unit has child-friendly and educational games that will surely be enjoyed by the children. It is a good thing that ...

pc technical support

started by shalani mujer on 12 Oct 11 no follow-up yet
Chalana Perera

(J) What Is a Cyberattack? (WiseGeek) - 1 views

  • without the knowledge or consent of the owner of the equipment
  • main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
  •  
    This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
anonymous

Facebook (Wikipedia) - 1 views

  •  
    Facebook wiki page. Divided into contents such as, history, financials, website (technical details), effects on politics, reception, controversy, and litigation. Website Interface evolution, features: The media often compares Facebook to MySpace, but one significant difference between the two websites is the level of customization.[76] MySpace allows users to decorate their profiles using HTML and Cascading Style Sheets (CSS), while Facebook only allows plain text.[77]
Mahmud Shihab

Advanced Distributed Learning - What Is SCORM - 2 views

  •  
    SCORM is a collection of specifications and standards used as a "reference model" of interrelated technical specifications for Web-based learning content and systems.
Chalana Perera

BBC NEWS | UK | UK Politics | UK surveillance plan to go ahead - 2 views

  • asking firms to retain information on how people use social networks such as Facebook.
  • More communication via computers rather than phones Companies won't always keep all data all the time Anonymity online masks criminal identities More online services provided from abroad Data held in many locations and difficult to find
  • recognition of the role of data in protecting the public
  • ...3 more annotations...
  • Communications data is crucial to the fight against crime and in keeping people safe. It is a highly technical area and one which demands a fine balance between privacy and maintaining the capabilities of the police and security services
  • The Home Office says it wants to change the law to compel communication service providers (CSPs) to collect and retain records of communications from a wider range of internet sources, from social networks through to chatrooms and unorthodox methods, suc
  • ecret security services have legal powers in the UK to intercept communications in the interests of combating crime or threats to national security.
1 - 7 of 7
Showing 20 items per page