Recent Changes

Thursday, March 12

  1. page Privacy edited ... Gabriela-Privacy Identification tools Facebook_policy.xps {testing technologies.docx} …
    ...
    Gabriela-Privacy
    Identification tools
    Facebook_policy.xps
    {testing technologies.docx}
    (view changes)
    3:55 pm

Thursday, March 5

  1. page Tess-Privacy edited Name: Tess Unami Tueros Hofstede Title of Article: ... get mobile fingersprint fingerprint …
    Name: Tess Unami Tueros Hofstede
    Title of Article:
    ...
    get mobile fingersprintfingerprint scanners."
    Date published: 27th of February, 2009
    Brief description of the ideas in the article:
    (view changes)
    6:54 am
  2. page Tess-Privacy edited Name: Tess Unami Tueros Hofstede ... of Article: "NSW "NSW Police get Date publi…
    Name: Tess Unami Tueros Hofstede
    ...
    of Article: "NSW
    "NSW
    Police get
    Date published: 27th of February, 2009
    Brief description of the ideas in the article:
    ...
    the community.
    Technology:
    The fingerprint scanner is the most common type of biometric used for security. It provides an identification of a person based on the acquisition and recognition of the individual and unique patterns and ridges in a fingerprint.
    (view changes)
    6:48 am
  3. page Tess_Q_P edited Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informat…
    Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
    ...
    IT support.
    Q3:

    Q3:
    Biometrics: What
    ...
    be prevented.
    Q4:

    Q4:
    Determine what
    ...
    was conducted.) Answer the following questions

    (view changes)
    6:38 am
  4. page Nitza_Q_P edited Answer the following questions Remember to mention IT in your answers and support it with your kn…
    Answer the following questions
    Remember to mention IT in your answers and support it with your knowledge.

    Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
    ...
    IT support.
    Q3:

    Q3:
    Biometrics: What
    ...
    be prevented.
    Q4:

    Q4:
    Determine what
    ...
    was conducted.)

    (view changes)
    6:38 am
  5. page Vocabulary and investigation task edited ... (pages 203-207) Key terms: Privacy ... Marketing databases Government surveillance…
    ...
    (pages 203-207)
    Key terms:
    Privacy
    ...
    Marketing databases
    Government surveillance
    Remember to mention ITDefine 4 terms in your answers and support it with your knowledge. the table above (that do not have a definition yet)
    Nitza_Q_P
    Tess_Q_P
    (view changes)
    6:37 am
  6. page Gabriela_Q_P edited Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
    Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
    Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
    Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
    Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)

    (view changes)
    6:36 am
  7. page Tess_Q_P edited Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
    Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
    Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
    Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
    Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)

    (view changes)
    6:35 am
  8. page Nitza_Q_P edited Q1: Surveillance cameras: Describe their uses, give examples of their different sources of informa…
    Q1: Surveillance cameras: Describe their uses, give examples of their different sources of information, explain the implications of unauthorized access to data obtained and how can it be protected.
    Q2: “The computer is a great humanizing factor because it makes the individual more important. The more information we have on each individual, the more each individual counts.” Do you agree with this statement by science fiction writer Isaac Asimov? Explain your answer giving reasons, facts and IT support.
    Q3: Biometrics: What is Biometrics. Describe three situations where biometrics is used. Explain when these uses maybe an invasion to privacy and how can this be prevented.
    Q4: Determine what information about you is stored in your school computers. What information are you allowed to see? What information are others allowed to see? Exactly who may access your files? Can you find out who sees your files? How long is the information retained after you leave school? (Mention how this investigation was conducted.)

    (view changes)
    6:35 am

More