Wednesday, June 19, 2019

General computer knowledge Coursework Example | Topics and Well Written Essays - 750 words

General computer knowledge - Coursework ExampleDragging Dragging is an activity of touching icons or images across the display screen mostly by employ a mouse button. In tablets, it butt be done using touch. It can also be used for moving block of text across the display screen while keeping the mouse button pressed. Defragment De atomisation is the ferment of minimizing fragmentation by organizing files into smallest contiguous regions. Defragmentation increases region of free space area by compaction. It tries to compact smaller files together that can be accessed sequentially. Defragmentation also improves accessing files in red-hot times as read/write operations is faster in defragmented files in comparison to system of fragmented files. Podcast Podcast refers to digital media that includes series of multimedia, PDF, ePub files that can be streamlined to mobile or electronic devices through subscription. Podcasts etymology is rooted in the traditional word broadcast and pod of the apple product iPod. The process of Podcast applies the software podcatcher to web feed the series of multimedia, PDF, or ePub files from distributors servers for downloading any files. ... Digital entertainment industry applies Vodcast mostly for short video clips of 2-9 minutes. Vodcast is also used for marketing, blogs, and in combination with traditional medium. Scam (give examples) Scam in cyber world applies manipulation for advanceing access of private information to stealthily deprive gold of potential target. Phone scam is one of the recent tricks in which attackers represent themselves as technical support person of branded organization such as Microsoft or other large companies. They apply technical jargons to confuse the person and maliciously install a program bypassing Antivirus of computer to take advantage of private information or forcing the client to purchase product of particular company. Phishing is another scam that sends mail from branded organizatio n to target unsuspected victim. Phishing Phishing act tries to gain accounting or credit card information masquerading themselves as reliable representative of branded company. Social media, mail, or other websites tries to lure public into their specify and takes the person to website with malware. E-mail spoofing is also one of the ways to trap victim by deceiving them using similar looking logos or website of branded organization. Phishing applies companionable engineering methodologies to exploit technological naive. Urban legend (give examples) Urban legends refer to modern myth that has been created through repetition of false story mostly using the medium of Internet that provides the platform faster broadcast of the story. They increase the believability factor by personalizing the story that it has been happened to one of the friends. The Infamous Modem Tax, Craig

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.