Report on Installing Hardware day 1

Posted in Uncategorized on December 22, 2011 by stephenmcguire91

I have started my report on installing computer hardware.

I have wrote the terms of refrence .

Also found all the parts/components and function.

Found parts and got prices for them .

Next time will look at more parts and get more prices



Block2 Week 3

Posted in Uncategorized on December 1, 2011 by stephenmcguire91

1. Name three diffrent laptop with screen size between 12 and 14 inches–10101359/12-inch-laptop/zzukzB1z5–brand-html

2. What is meant by High Street Store?it is a town or city where lots of stores are

3. Name three High Street stores?   pc world , currys. game

4. What is a DSLR camera?

SLR is an abbreviation: it stands for Single Lens Reflex.

Now you know what SLR stands for but that doesn’t really help answer the question, does it? Let’s define further:

  • With an SLR camera, you see exactly what the lens sees
  • You can change the lens on a digital SLR
  • Digital SLRs have large image sensors that produce high-quality photos
  • An SLR has a near-zero lag time, and is ideal for action photography

5.What is meant by DSLR with and exchangeable lens?

so you can change the lens to suit yourself

6. What is the diffrence between a DSLR and an SLR camera

DSLR is used for pictures ans an SLR is usesd for films.

Block 2 Week 2

Posted in Uncategorized on December 1, 2011 by stephenmcguire91

What is hardware?  Computer hardware is anything that can be physically handeld  such as the CPU, monitor, hard drives, keyborad and so forth

What is software?  software is anything that can not be physically handeld. Software typically refers to programs which need to be installed into a computer  in order to perform certain applications or functions


Where software is usally kept?  when the computer is turned off it is stored to the hard drive but when the computer is on part of it is stored on the RAM

What is the most common type of computers? desktop

What the outside part of the computer is called?  System unit Picture of a desktop computer system

What the inside part of youre computer is called?  it is called the CPU

What are the peripheral that are connected to your computer?  Keyboard, mouse, Speaker

What is a CPU and what does do? The CPU  is just what the name suggests. It is the”brain” of your  computer

What is meant by the dual core processing? A dual core processor is a CPU with two separate cores on the same die, each with its own cache. It’s the equivalent of getting two microprocessors in one.

What are the connections at the back of your computer are called?  

ethernet cable and USB

week 10 Lo4

Posted in Uncategorized on November 11, 2011 by stephenmcguire91

Perfomance Criterion (a)  

  1. A firewall is used to keep your computer more safe. A firewall   restricts information that enters your computer from other computers and   lets you have  more control over the data on your computer. Additionally, a firewall   provides a line of defense against people or programs, including viruses and   worms, that try to connect to your computer without invitation.

Click on the control panel from the start button, then click on the security center link so the security center will appear. if the firewall header says that it is on then you will be running Windows Firewall.
2. An internet security suite  gives us easy to use protection against viruses, spyware, spam, inappropriate content, lost files, and data corruption.
To install an internet security suite Make sure your computer meets the minimum security requirements for installing CA Internet Security Suite 2010.

  • Uninstall security software like Firewall, AntiSpyware, or AntiVirus from other vendors currently installed on your computer.
  • Ensure your computer is restarted after uninstalling the  software.
  • Save all data and close  programs that are currently running on your computer.
  • Log off all users.
  • Log into your computer as Administrator .
  • Double click the downloaded setup file.
  • The welcome screen will automatically be brought up
  • press get staarted , then next until the install button comes up then press that.

3. Anti- virus software is software that is used to stop that detects, prevents, and takes action to remove malicious software programs, like viruses and worms.
To install anti virus software once it is downloaded click on the icon that that hold the antivirus file, follow the steps that the anti virus asks you  to do such as clicking next, then click i agree when you read the terms and conditions of the anti-virus. Click on the restart after anti-virus is downloaded then finish. Once you do this the anti-virus will begin to installTo install anti- spyware you click the run button once the file download dialogue button appears. Then follow then steps in within the installer to complete the installation of Spywareby clicking next and agreeing to the terms. Finally then clicking the last finish button for it to begin downloading.
5.Spam filters are programs that are used to detect unwanted e-mails and they are used to prevent the e-mails from getting to a users  inbox.
to install spyware once downloaded click o the anti-spyware file on the desktop, this brings up a new window which you will then click on the next button. next a license agreement will turn up, you should click agree to that. Then click next, now the installation folder shall show. You will click next then finally install.

Performance criteria b

Network security starts with  the user, commonly with a username and a password. Since this requires just one detail authenticating the user name i.e. the password, which is something the user knows  this is sometimes termed one-factor authentication. Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.

Performance Criteria c
1.  Download the software, once finished install the software then the user can change the content restrictions on the computer.
Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available on a particular machine or network;

You can configure Microsoft Internet Explorer to use a proxy server to connect to the Internet. A proxy server acts as a security barrier between your internal network and the Internet, keeping others on the Internet from being able to obtain access to information that is located on your internal network.
3. Acceptable use policies are

  • A description of the instructional philosophies, strategies and goals to be
    supported by Internet access in schools
  • An explanation of the availability of computer networks to students and
    staff members in your school or district
  • A statement about the educational uses and advantages of the
  • A description of what constitutes acceptable and unacceptable use of the
  • A form for teachers, parents and students to sign, indicating that they
    agree to abide by the AUP.

4.Techniques for withholding personal information are to wipe the hard drive of the computers your getting rid of. you shouldn’t give out any personal information to any one on the Internet like passwords or
numbers. if you go to buy something online you make sure that the website is a
secure one.
5.The difference between real and spoofed phishing e-mails are these emails will  contain a web link that you click on. This link thentakes you to a login page and asked to enter your details. Most of these scammers go a long way to try and get your details, most spoof emails contain links to identical websites and users are tricked into entering their personal information. If you submit your information to  these made up websites then the fraudster has all of your details and can commit crimes using your identity.

Performance criterion d
The copyright restrictions when downloading music/video from legal sites
it is legal to be able to download music from sites authorized by copyright  holders.

It is also acceptable to copy music onto analog cassettes and specially  designated audio CD-R’s, mini-discs and digital tapes, because royalties have  been paid on those items. None of these copies can be used for commercial  purposes.

week 7

Posted in Uncategorized on October 14, 2011 by stephenmcguire91

What is Spyware? Spyware is a computer software that is installed on a computer in order to gain information about the computer user without his/her consent. It is installed with an intention of monitoring user behavior and collecting information such as personal details, Internet surfing habits and browser activity.

What is the usual virus embedded in Microsoft Word?  it is a macro virus

Stealing someone identity is called? identity theft

Phishing is? a way for people to get your details they claim to be someone they are not they may have a legitimate site too fool you

What is rouge dialling? is a type of computer software used by unscrupulous vendors of adult material on the Internet.

they can then change the internet service provider to a different one which will be a higher bill.

What is a strong password? a1b2c34c$ something with words numbers and symbols

What is an internet security suite? it protects against spyware and different viruses

What do you do if you see a bugbear virus?  Scan with your anti-virus software.

What does the firewall do?  it protects stuff from coming into your system and infecting it

What signs does a secure website show? it may show a padlock sign

Making you e-mail address looks as if it coming from another website is called? spoofing

Who do you inform about rouge dialer? The independent committee of supervision and standards

What are these symbols? emotion smileys

What is a netiquette ? the behaviour that you should have while been on the internet

What is the name of the person monitoring postings on a newsgroup? administrator

What is a hotlinking? Link to an image which is on another website

Grooming? is type of threat is aimed mainly at young people.  Typically, an older person will use the Internet and its services to communicate with younger people.  The groomer will not give accurate information about themselves and in many cases will pretend to be a younger person.

Phishing? stealing personal details through fake advertisement on e-mails.

File Sharing? distributing or providing access to digitally stored information.

Bandwidth? a rate of data transfer.

week 5 What is acceptable policy?

Posted in Uncategorized on September 30, 2011 by stephenmcguire91

Many of the places where you can access the Internet, such as schools, colleges or libraries, operate an Acceptable Use Policy (AUP) covering access computer equipment and the Internet. Each local authority will probably have an individual AUP policy reflecting the local circumstances. Each person using computers may have to sign a form saying that they accept the policy.

What are the five rules? 

  • Rule 1  always be suspicious when you are using the internet
  • Rule 2 never give you’re password out unless it is someone you completely trust
  • Rule 3 don’t go online without having an antivirus software
  • Rule 4 make sure you know about the latest virus threats so you can avoid anti virus attack
  • Rule 5 keep you’re operating system up to date by regularly updating it


     List some of the precautions that you might take in order to avoid online threats?  you can always carry out a security online virus check

What an internet security suite consists of? anti-virus, anti-adware,anti-spam and prehaps firewall  or protection phishing

Why a password is an important security defence? it is important because you can keep you’re files safe so that no one else can accsess them if you’re password is weak such as you’re name then it will be easy for peole to accsess you’re stuff.

What is a dictionary attack?  is when people go through  every word in the dictionary  entering it as a password to try and hack into you’re computer.

What is a brute force attack? What is a brute forece attack? brute-force attack may have a dictionary of all words or a listing of commonly used passwords. To gain access to the account using a brute-force attack, the program would try all the available words it has to gain access to the account. Another brute-force attack is a program that runs through all letters or letters and numbers until it gets a match.

What a recommend minimum password should be? it should contain a minuimum of 8 characters and have numbers letters and symbols.

What is a strong password? */*Nobody*/*Knows*/*

What is a firewall?  is a form of internet defence Just as it is recommended that a user should keep up-to-date anti-virus and anti-spyware software running on their system, it is also critical to maintain a strong firewall.

How to activate firewall on you’re machine? click start and then control pannel then system and security and then widows firewall

Is firewall a software or hardware? it can be both

Free available firewall software? Zone alram Windows firewall

Whait is a proxy server? A proxy server is one that acts on behalf of another server, usually for Web related purposes.

Draw a diagram  of a proxy server? 



List some available proxy server software?  anoymizer, the cloak, the free country.

What is the content filtering? Content filtering software works by checking the information, eg: URL, typed in by a user against an exclusion list.  This list could also contain words that would be blocked if the user tries to enter them.

What is a backup function and what types of backup functions are available?  a backup function is to help the user retrevie a file if it has been deleted  one option is to use a poratble harddrive.

What is a restore function and what types of restore functions are available? a restore function can be use to transfer critical files between systems.

what is phishing

Posted in Uncategorized on September 16, 2011 by stephenmcguire91

How does Phishing work?  Phishing works  by someone who sets up a fake website that is similar or may look identical to the real one to scam people to lose their money.

three steps in detecting a phishing threat? 

  • e-mails that warn of great dangers
  • beware of e-mails that ask for confidential information
  • beware of e-mails that are not personalised

What to do if you are suspicious?  don’t click on any of the links or look for a number and call it.

What is  scrambling information called? scrambling information is called encryption .

Where to look for encryption? you could move you’re cursor over the address bar and if it says https then it will be fake. or look at the bottom right hand side to see if there is a padlock that means its a secure site.

an e-mail program that uses anti-spam?  spamihilator

How many unwanted e-mails does Microsoft receive a day?  3.5 billion

What are the four tips to protect you from online theft? 

1. do not ask for personal information by e-mail.

2. phishing scams generally are not personalized and use urgent wording in their email messages.

3.the links URL does not match the name in the email.

4. download anti phishing software.

Who to report to for identity theft? you can report to the fedaral trade commission

What is SMiShing?  it phishing only diffrence is its on a mobile phone.

How does Phishing work? Phishing works  by someone who sets up a fake website that is similar or may look identical to the real one to scam people to lose their money.

Give summary of

  • Phishing examples: Egg  the anonymous greeting Dear Customer, in a different font from the rest of the messageand the number of minor errors.
  • Phishing examples: Nationwide  if you let your mouse pointer linger over the hyperlink it shows that the page it links to looks nothing like a genuine Nationwide address.
  • Phishing examples: Barclays they have ezaclty everthing the same on the webpage so you will be fooled into givin details.
  • Phishing examples: PayPal the anonymous greeting,and the careless display of the an HTML control (&nbsp) character near the bottom of the page