Saturday, June 26, 2010

ASSIGNMENT ;)

1. INTERNET HOAX- a deliberate attempt to deceive or to trick people into believing or accepting something which the hoaxer (the person or group creating the hoax) knows is false.
2. SPAM- use of electronic messaging systems (including broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
3. VIRUS- a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another ( in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or usb drive.
4. TROJAN- sometimes referred to as trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from trojan horse story in Greek mythology.
5. SPYWARE- a type of malware that is installed on computer's and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.
6. ADWARE- any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacy-invasive software.

The Ten Commandments of Computer Ethics :D

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute.

1. Thou shalt not use a computer to harm other people .
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around to other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
8. Thou shalt not appropriate other people's intellect output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.

Above is a means to create a set of standards to guide and instruct people in the ethical use of computers.

FOUNDATION DAY :)

Yes! FOUNDATION DAY napd sa psAy-cmc :) hinuon pd nagkaayos ug ngkagwapo na ang mga buildings sa psAy. Excited na q sa mga activities.. labaw na if naay FREE drinks ug snacks! :D I'm xur dghan napd keug mga activities ana sa school. Nice ni xa na celebration kay para mg'give ta ug importance mga psAy scholars sa FOUNDATION DAY sa atung alma mater. :D Hope successful atung foundation day.. ug dghan unta ma green league. :)


psAy-CMC rocKsz!!