Thursday, 9 May 2013

M2 UNIT 1


M2
          The risk of using a computer

Computers are fixtures in people's personal and professional lives, providing essential productivity and communication services. Networking capabilities and Internet access are invaluable resources, but they also expose computer users to threats from other users connected to these networks, requiring people to take precautions to protect the data stored on their computers. Risk awareness and responsible behavior oftenminimizes the risk. But you must remember the many aspects and be prepared to face many threats.
 The first is a better example, Microsoft Internet Explorer - the most widely used browser in Europe. In many of its versions, there were errors so large that it was a gate for hackers and spyware. Therefore, do not always believe the software, even manufactured in the large corporations.

-When we use computer viruses can be up to the parties whether you're viewing with some games.
-Children on the Internet forget a grammar and spelling.
-Someone can sneak in to our example, some computer hacker, and then all our data and materials are at risk of your own computer.
-Sometimes the use of social networks and give anyone have any information anyone can use them against us.
-As long as we use the computer away from him, we can make.
-The Internet to the greatest danger faced by children because they may have contact with content in whose violence is.
-The internet is also a lot of cheats.
-Now, rather than read books, play with or go outside kids are playing computer games and this is very bad.
-Financial implications (the use of dialers, or computer programs linking to the Internet through 0-700 numbers).
-Unconscious sharing of information (credit card numbers, addresses, passwords).


-Instead of homework yourself looking for every finished work on the Internet
-Another thing we must remember is that many Internet applications to facilitate movement within the network, containscountless mass of minor errors.




1 comment:

  1. www: M2 is achieved above to have discussed the potential threats which the use of IT has introduced.

    ReplyDelete