? ??????????????????? ????Easy Install Instructions:???1. Copy the Code??2. Log in to your Blogger account
and go to "Manage Layout" from the Blogger Dashboard??3. Click on the "Edit HTML" tab.??4. Delete the code already in the "Edit Template" box and paste the new code in.??5. Click "S BLOGGER TEMPLATES AND TWITTER BACKGROUNDS ?

Wednesday, February 3, 2010

ASSIGNMENT 2

People interact directly with computers in many fields in our daily life.ICT help people in managing several sectors.But we have threats to computer such as viruses and natural disasters.


a.Name 4 main sectors that used in ICT in their management.


~ Education
~ Banking system
~ Industry
~ E-Commerce

b.State two differences between worms and viruses.

Worm ~Operates through the network
~Spread copies of itself as a stand alone program

Virus ~Spreads through any medium
~Spread copies of itself as a program that attaches to other program

c.There are six types of security measures that can be used to protect our computer.Explain what is

a.Cryptography

* Cryptography is a process of hiding information by altering the actual information into different representation, for example, an APA can be written as I? X.

Almost all cryptosystems depend on a key such as a password like the numbers or a phrase that
can be used to encrypt or decrypt a message.

The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.

b.Firewall

*
Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the security policy.Firewall implement is a security policy.It might permit limited access from in or outside the network perimeters or from certain user or for certain activities.




0 comments: