Skip to main content

Home/ Globaltech/ Group items tagged downloader

Rss Feed Group items tagged

Alex Lenk

BBC NEWS | Technology | Supermarket of the future - 2 views

  •  
    Jean October 10th  Describe the IT system by watching the video Answer here
  •  
    Basically just watch the video... ok lets start 1. The apps used in the supermarket needs to be downloaded by the clients before use. 2. Enter the store and open your apps from your mobile. 3. Pick the goods you want and scan the code off the bar code (using your cell phone) 4. The list of goods you buy will be store into your cell phone. 5. After scanning click the finish shopping button on your apps and the cell phone will generate a big bar-code which mix all the code you scan into one master-code. (like mixing salad after you put vegetables in) 6. Go to the paying counter and insert the master-code into the paying machine. 7. The machine will tell you how much to pay and client pay by cash, credit card and etc, Extra ( you can play stepping on fish in the supermarket for fun) Oh and there is a useless robot roaming around also.
anonymous

Koobface Worm Sharpens Facebook Security - NYTimes.com - 8 views

  •  
    Analysis Read 2 pages March 25 Azman
  •  
    1. Identify the area of impact the scenario relates to. Business 2. Identify all ITGS terminology and phrases (IT and social/ethical). Botnets, worm, malware, 3. Describe one ITGS social/ethical concern in the article. Security is the main issue in this article since it is dealing with worms, which infects and damage computer files. 4. Describe the relationship of the main stakeholders to the IT system. The main stakeholder, Facebook, is combating Koobface worm, which is, a malware (malicious software) to prevent it from infecting its users PC. 5. Explain the relationship between the IT system and the social/ethical issue identified in question 3. Koobface worm is a malware that could infect Facebook's users' computer, which is a security issue. It is estimated that the group earned more than $2 million from June 2009 to June 2010 by delivering the victims of its worm to unscrupulous marketers and makers of fake antivirus software. 6. Discuss at least one problem that relates to the impacts of the social/ethical issue. A Koobface attack starts with an invitation to watch a video and a message about updating the computer's Flash software. Clicking to get the update begins the download of Koobface, which gives criminals control of the computer, while the worm tries to spread itself further through the victim's social network contacts. This is a security breach to Facebook's users computer. When the criminals have control of the computer, they can do anything they want with it like, stealing personal information, etc. 7. Evaluate one solution that addresses the problem identified. Facebook need to step up their security for their users safety. To halt Koobface, Facebook uses algorithms that can detect suspicious posts and hijacked accounts, looking for unusual behavior like log-ins from odd places and a surge in messages sent. Facebook also keeps a blacklist of malicious Web links to prevent them from being shared on the site. When Koobface posts find a
anonymous

Bangkok Post : US names Baidu, PirateBay on copyright piracy list - 2 views

  • list of the world's top marketplaces for pirated and counterfeit goods
  • enabling piracy with "deep linking" searches
  • continue to work closely with brand owners and others to further enhance the level of trust and integrity in our online marketplaces
  • ...1 more annotation...
  • efforts to work with brand owners in protecting their intellectual property rights
  •  
    Identify the issue. Describe the possible solutions. march 11 jenny
  •  
    1.4_intellectual_property 2.5_digital_policing 3.4_internet
  •  
    Identify the issue Intellectual Property Rights - Piracy Describe the possible solutions Solutions that are harsh to the point of shutting down the website that hosts these download links to pirated music, videos, and other intellectual property, etc. Or censoring the pirated files on the website to be inaccessible. However, this isn't a feasible solution since it would cause massive uproar for the users who use the sites on a regular basis, which in this case may be millions of people. Policing IT malls, as well as formulating and enforcing strict laws with hard punishments for violators.
anonymous

Apple named 'least green' tech company | Environment | guardian.co.uk - 0 views

  •  
    Why does apple rank low for being green? Which companies are fairly green? Why don't companies want to disclose their energy consumption? Is cloud computing green? Determine if use of IT often reduces environmental impacts or not. april 28 nat
  •  
    Why does apple rank low for being green? Because of their huge electricity consumption and the increase in their consumption in a new facility, which consumes approximately the same amount of electricity 80,000 US homes. Which companies are fairly green? Yahoo, Google and Amazon. Why don't companies want to disclose their energy consumption? They don't want others to know what they did or what they had to do to reach to the position they are in now. Is cloud computing green? No, it's not green as it already accounts for approximately 2& of the world's electricity consumption, and it is predicted that it will rise. Determine if use of IT often reduces environmental impacts or not. Yes it does, because if something was electronically saved, it can save paper. Moreover, It has been said that there are less carbon emissions produced when music is downloaded of the web, rather than bought in CD stores, because you don't need to use CDs.
anonymous

BBC News - BT given 14 days to block access to Newzbin - 9 views

  •  
    brief all oct 31 cream
  •  
    1. Identify the area of impact the scenario relates to. Business, Home and Leisure 2. Identify the main stakeholders to the IT system. UK Telco BT, NewBinz2 pirate link sharing website and users, MPA (Motion picture association) 3. Identify one ITGS social/ethical concern in the article. Intellectual property 4. Describe ITGS terminology and systems. ISP - Internet Service Provider, is a company that collects monthly or yearly fee in exchange for providing the subscriber with Internet Access. The Terms of Service contract of the ISP will also state rules about hacking, protecting copyrighted materials, denial of service attacks, harassing other people, spam compromising the service, and many other issues. These are as much for the legal protection of the ISP as to let potential subscribers know what the ISP will and will not tolerate. 5. If possible, describe a solution to the concern (issue). NewBinz pirate link sharing website is essential site for various users who wish to download illegally copied materials. However, this action concerns as infringe laws and copyright among policies. Thus, This is why NewBinz would be permanently block by ISP. However, the fact is that online users are very active so the creative industries should maintain about this not just blocking the sites.
‹ Previous 21 - 26 of 26
Showing 20 items per page