Scott+Dawson

//__Ict__// Notes on Viruses/Theory =]

A computer virus is often looked at as a normal virus apart from it spreads from computer to computer and can cause an absoloute paramount of damage to them.

General Overview

Computer viruses were first used as practical jokes and as simple forms of fun. However people began to see virsuses as an exploit. Some are used to find put a persons private information or to simply mess around within a persons computer. However a virus does not physically "harm" a computer. It insetead messes around with the files and programs within it.

Viruses are spread via an E-mail attachment however other ways of virus sending are also possible. Such as Floppy Disks Memory Stick CDROM DVD

Things such as shared networks are also likely to cause problems.

In order to remove the infectious software we have things known as "anti-virus programmes" which are specifically aimed to find and eradicate viruses. They often ask you to either delete, contain or freeze the virus software. Antivirus software needs to be constantly updated as new and more dangerous hardware is being made all the time.

//__Ict And Society!__//

Ict has now become a main stream part of our society. We rely on it for nearly everything. Example of this include
 * Computers
 * Mobile Phones
 * Laptops
 * Satelites
 * Scanners
 * The internet
 * Television
 * General electronics
 * Credit Cards
 * DVD/CD's

ICT has very heavily influenced Video Games and Media Television Things such as massive online video games and sataliete TVsignal have spread everywhere! Music has also evolved, from simple radio broadcasts and record players. We now have CD's and can now download or "stream" songs via the internet. How ever this has ment that copyright infringment and illegal downloading are now very common.

//__Difference between Validation and verification:

Validation:__// is generally used to check if something reaches a certain critera. An example of this woudl be to check if a statement or item is true and correct or if a computer system is secure. This means that in Validating our own work we are sure that the information is correct and it can be used.

//__Verification:__// Is the idea of checking that any information used is related and agrees with their assosiated data and correctly shows the original description and specifications.

//__So what is the difference?:__// So in order to prove the difference validation is when we check and correct the data to ensure it can be used. MeanwhileVerification ia checkign data that has been moved from one area to another.

//__ Encryption  __// Encryption is when the computer will alter you information into something unreadable unless you have “key” which will sort and organise the information into readable text. //__ Why should users back-up data? __// User’s should back up data due to the fact that data can often become corrupt, be accidently deleted or attacked by a virus, along with many other problems and issues. Due to these reasons it is often a sound idea to regularly back up data so that, if any of these problems occur data can be recovered. //__ List the general rules that should be observed when storing back-ups  __// · Regularly check and upkeep the back up archive. · Have your computer perform automatic back ups and/or check ups. · Recycle and re check storage, if information has been in there for a long time · If data is critical (important) than data may be stored “off site” //__ Data Logging  __// Data logging is when a computer gathers a large amount of data through some form of sensor, and then collects, saves and analyses this data. It is often used in scientific investigations as data logging tools can register temperatures, noises, light intensities etc.