Tuesday, October 6, 2009

TEST TWO...

QUESTION 2
the process of developing new system will have to follow a strict order of cycle.
First of all, the developer should identify the idea to build new system. This system should be more advanced than the other system.
Secondly, the research should be carry out in order to build new system. The research can find the best system to be build, how to be build it and the weakness and the strengthness of the system.
Thirdly, the developer should have make the repairment to the system. It is to make sure the system perfect and more systematic.
Next, they should install the new system and make the observation to ensure the system can work out effectively.
Finally, the final evaluation have to be made to the system. It is important to produce good new system.

QUESTION 2
Nowadays, there are many culprits that conduct illegal behavior. The security breached and identities are stolen by this culprits. This is serious issues and can led to the harassment, cyber-stalking, and loses.
Usually, the culprits use the way to access personal information by sending spyware to the user. Spyware is the unwause the tacticnted programme that can exposing our private information to the sender i.e the culprits when we use the programme.
Next, the culprits also often the tactic of cheating the user. the tactic is like the culprit pretending as any organization that organize any competition or online shopping. This kind of cheating tactic make the user have to give their private information.
To avoid this problem, we need to relize that we have to apply lack of anonymit. we should not share our information like address, phone number, account number and real name. we should also restricted our personal information from the public.
Then, we also have to make or build a new software that can reveal the identity of user especially the new user. This software also need to be able detect any spyware and suspicious program.
As the conclusion, the culprit need to be banish to avoid any unsafe circumstance. this is also to ensure technology remain safe and can help us, not corrupt us,

No comments:

Post a Comment