Saturday, February 20, 2010

Answering Questions

"People interact directly with computer in many fields in our daily life,ICT helps people in managing several sectors but we have threats to computer such as viruses and natural disasters."

a)Name 4 main sectors that use ICT in their management

i ) Services sector
>The ICT services sector (telecommunications and computer services) plays a smaller role in aggregate productivity growth, but it has also been characterised by rapid progress, owing, in part, to liberalisation of telecommunications markets and the rate of technological change.


Image and video hosting by TinyPic

ii) Health sector
>ICT has the potential to impact upon almost every aspect of the health sector. In public health, information management and communication processes are pivotal, and are facilitated or limited by the available information and communication technology. In addition, beyond the formal health sector, the ability of impoverished communities to access services and engage with and demand a health sector that responds to their priorities and needs, is importantly influenced by wider information and communication processes, mediated by ICT.

Image and video hosting by TinyPic

iii) Education sector
>The school’s capacity to use ICT to extend and differentiate student learning opportunities, and to support students to manage and direct their learning.On the other hand,ICT brings many benefit to the student and teachers in searching for information and knowledge.

iv) Business sector
>The use of ICT in business is to connect online with the customers to purchase or selling products.This method can save time and cost and thus,make the activities faster and more efficient.

b)State 2 difference that can be used between worm and viruses.

What is worm?

Definition: Computer worms are malicious software applications designed to spread via computer networks. Computer worms are one form of malware along with viruses and trojans. A person typically installs worms by inadvertently opening an email attachment or message that contains executable scripts.
Once installed on a computer, worms spontaneously generate additional email messages contaning copies of the worm. They may also open
TCP ports to create networks security holes for other applications, and they may attempt to "flood" the LAN with spurious Denial of Service (DoS) data transmissions.


What is virus?


Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
To help avoid viruses, it's essential that you keep your computer current with the
latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.

Differences between worm and virus:

-The key difference between a virus and worm is the manner in which it reproduces and spreads.

Virus:

viruses Pictures, Images and Photos

  • A virus is dependent upon the host file or boot sector, and the transfer of files between computers to spread.
  • A virus copies itself around the system by gradually attaching the virus code to every common executable program available on the computer.
Worm:
Image and video hosting by TinyPic
  • A worm spread on its own accord through network connections.
  • A Worm is a subset of a virus in that it makes copies of itself but does so without needing to modify a host.
c) There are 6 types of security measures that can be used to protect our computer.What is:
  • CRYPTOGRAPHY
Cryptography can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Cryptography uses two main styles or forms of encrypting data; symmetrical and asymmetrical. Symmetric encryptions, or algorithms, use the same key for encryption as they do for decryption. Other names for this type of encryption are secret-key, shared-key, and private-key. The encryption key can be loosely related to the decryption key; it does not necessarily need to be an exact copy.
  • FIREWALL

Image and video hosting by TinyPic
A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria.
Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

1 comments:

Answering Service said...

Thank you for sharing best information with 4 sectors. We like this blog.

Thank you,
answering service

Post a Comment