Author: Neftaly Malatjie

  • 114055 LG 1.1 ACCEPTABLE AND UNACCEPTABLE PROFESSIONAL PRACTICES FOUND IN THE COMPUTER INDUSTRY.

    • Show how one can de

      What is Professional Ethics?

      Professional Ethics concerns one’s conduct of behaviour and practice when carrying out professional work. Such work may include consulting, researching, teaching and writing. The institutionalisation of Codes of Conduct and Codes of Practice is common with many professional bodies for their members to observe.

      Any code may be considered to be a formalisation of experience into a set of rules. A code is adopted by a community because its members accept the adherence to these rules, including the restrictions that apply.

      It must be noted that there is a distinction between a profession such as Information Systems, and controlled professions such as Medicine and Law, where the loss of membership may also imply the loss of the right to practice.

      Apart from codes of ethics, professional ethics also concerns matters such as professional indemnity. Furthermore, as will readily be appreciated, no two codes of ethics are identical. They vary by cultural group, by profession and by discipline. The former of these three variations is one of the most interesting, as well as controversial, since it challenges the assumption that universal ethical principles exist. In some cultures, certain behaviours are certainly frowned upon, but in other cultures the opposite may be true. Software piracy is a good case in point, in that attitudes towards software piracy vary from strong opposition to strong support – attitudes that are supportable within a particular culture. At the end of these pages is a section called Cultural Perspectives, where we hope to point you to alternative perspectives of ethical standards, attitudes and behaviours..

      liver presentations?

  • 114046 LG 1.53 Malware

    Malware is the term used the describe malicious programs and techniques that are not viruses but still pose a threat to your system.

    Worm: A worm is an independent program that copies itself across a network. Unlike a virus (which needs the infected file to be copied in order to replicate itself), the worm spreads actively by sending copies of itself via LAN or Internet, email communication, or through operating system security bugs.

    They can also bring with them additional malware (such as installing backdoor programs–see below), though this behavior is not strictly limited to worms. Worms can cause a great deal of damage–often they are used to “jam” communication channels by means of a DoS attack. A worm is capable of spreading worldwide, via the Internet, in minutes.

    Trojan: A Trojan is a malware program that, unlike viruses or worms, cannot copy itself and infect files. It is usually found in the form of an executable file (.exe, .com) and does not contain anything aside from the Trojan code itself. For this reason, the only solution is to delete it.

    Trojans have various functions, from keylogging (they log and transmit every keystroke), to deleting files or disc formatting. Some contain a special feature that installs a backdoor program, (a client-server application that grants the developer remote access to your computer). Unlike common (legitimate) software with similar functions, it installs itself without the consent of the client computer.

    Adware: Adware is short for advertising-supported software, which is software dedicated to displaying advertisements. Adware works by displaying pop-up windows during Internet browsing, by setting various websites as your homepage or by opening a special program interface window.

    Adware is often bundled with free-to-download programs, and the client is usually informed of this in the End User License Agreement. Adware advertisements allow freeware developers to earn revenue by offering program features available only with the paid version. In most cases, installation of adware falls within legal guidelines–there are many legitimate advertising-supported programs. However, issues such as the assertiveness of advertisements as well as their content can make the legality of some adware questionable.

    Spyware: Spyware is software that uses the Internet for collecting various pieces of sensitive information about the user without his/her awareness. Some Spyware programs search for information such as currently installed applications and a history of visited websites. Other Spyware programs are created with a far more dangerous aim: the collection of financial or personal data for the purpose of Identity Theft.
     

    Riskware: This type of malware includes all applications that increase the user’s security risk when running. As with spyware and adware installation, riskware installation may be confirmed by license agreement. “Dialers” are a common example of Riskware–programs that divert connection to a preset paid number. Such programs can be legally used for Internet service payments, but they are often misused and the diverting occurs without the user’s awareness.

    Dangerous applications: A dangerous application is the term used for legal programs that, though installed by the user, may subject him/her to security risks. Examples include commercial keylogging or screen capture, remote access tools, password-cracking and security testing programs.

    Hoaxes: A hoax is deliberate misinformation sent by email and spread with the help of an unsuspecting or uninformed public. Hoaxes are typically designed to get a user to do something they should not do. Malicious hoaxes often advise users to delete valid operating system files, claiming that the file is a dangerous virus.

    In many cases, hoaxes refer to a credible institution/company in order to gain the reader’s attention. For example, “Microsoft warns that…” or “CNN announced”. These messages often warn of disastrous or even catastrophic consequences. The warnings have one thing in common – they urge users to send the messages to everyone they know, which perpetuates the life-cycle of the hoax. 99.9% of these types of messages are hoaxes.

    Hoaxes cannot spread by themselves, the only way to protect yourself is to verify the authenticity of an email message’s claims before taking any action.

  • 114046 LG 1.52 TYPES OF VIRUSES AFFECTING LAN

    A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet). There are several types of viruses:
     

    File viruses: File-infecting viruses attack executable programs, such as all files with “.exe” and “.com” extensions.

    Script viruses: Script viruses are a subset of file viruses, written in a variety of script languages (VBS, JavaScript, BAT, PHP, etc.). They either infect other scripts (for example, Windows or Linux command and service files), or form a part of multi-component viruses. Script viruses are able to infect other file formats, such as HTML, if the file format allows the execution of scripts.

    Boot viruses: Boot viruses attack boot sectors (removable media boot sector or hard disk master boot sector) and set their own loading routines at start-up

    Macro viruses: Macro viruses attack documents where other commands (macros) can be inserted. These viruses are often embedded within word processing or spreadsheet applications, since macros are easily inserted into these types of files.

    Viruses can also be classified according to the way they perform their action. While direct action viruses perform an action immediately after the infected object is activated, resident viruses stay and work in the computer’s memory.

  • 114046 LG 1.51 SESSION 4: TYPICAL VIRUSES ON LAN NETWORKS

    On completion of this section you will be able to explain typical viruses on local area computer networks. 

    1. The explanation outlines the symptoms and transmission of viruses. 
    2. The explanation allows the selection of a method for the prevention, detection, and eradication of viruses for a situation. 
  • 114046 LG 1.50 USER EXPECTATIONS OF A RANGE OF SUPPORT

    Achieving user expectations that search service technical support is the goal to be pursued by industry professionals. Several factors hinder a quality service in the IT field. Among them are:

     – Lack of confidence of the customer in relation to the company;

    – Need to resolve repeated problems for not offering permanent solution;

    – Lack of information available to management;

    – Lack of effective mechanism for customer support;

    – Unclear resources and costs.

    But in addition to awareness the existence of these problems that hinder the services, those who work with technical support needs to know that there is a difference between need and expectation of the user. Understanding these concepts is critical to ensure customer satisfaction. Solving user needs does not mean reaching your expectations. The first, in this case, is easier to achieve.

    For example: if a customer says he needs availability and capacity of storing messages in your email, just comply with these requirements will not be sufficient for the user to feel satisfied. He also expects the speed of access and an efficient technical support.

     After all, what is the customer expects when ​​technical support is resorted?

     1) Services and functional products;

    2) Reliability and accuracy – ensuring a competent service;

    3) Skilled care team;

    4) Quick, cheap and effective support processes;

    5) Empathy – be heard and respected, feel that the attendant is concerned to solve your problem.