- •Royal International Language School
- •Chapter six queries
- •Create a new query without a wizard
- •Total Queries:
- •Questions
- •Explain briefly the following queries?
- •What is the difference between the select Query and the action Query?
- •Chapter Seven Forms
- •Questions
- •Exercises
- •Chapter Eight Reports
- •In the previous figure, we noticed the following:
- •Exercises:
- •Part Two Data and Information security
- •Intended Hacking :
- •Information Ethics
- •International agreements
- •Information negative sides:
- •Examples to show the negative sides of information The World Wide Web:
- •Viruses
- •Information filter
- •Filters:
- •Remember
- •Information:
- •Information properties:
- •Information filter:
- •Questions
- •Data and information Security
- •Keeping Data and Information
- •Implmenting the penalty:
- •Remember
- •Questions
- •Viruses
- •Viruses
- •Virus concept
- •Viruses Properties:
- •Virus Symptoms:
- •Virus and ways of protection:
- •Virus protection:
- •Remember
- •Virus properties:
- •Virus Symptoms:
- •Viruses and ways of protection:
- •Virus detecting programmes:
- •Question
- •84Mr.Khaled Anwar 01003340348
Keeping Data and Information
There should be a complete awareness of the following --
Data Processing concept.
The concept of the computer crimes.
- How to protect (The operating systems, the application programmes and
the Databases.
* We should be careful when we choose the people who will deal with the
computer data and information
The importance of Data and Information
To achieve a technological rise and development, we must consider Data
and information security as a must. So we have to define the concept of
Secuirty.
Using Original Programmes
To keep Data and processing them in a correct way in order to be
valuable information, we must deal only with original programme copies .
This is considered one of the elements that help us keep Data and
information Security. This gives the user the ability to deal with the
advanced facilities of the programme. You as a user, has the right to get
another copy if there is a problem in the original one. In this case, you will
avoid viruses and you will be away from being questioned by law.
These programmes will help the users achieve their important tasks.
These programmes are designed by computer experts who have the ability
of innovation. There should also be some restrictions in using these
programmes so as not to attack the Rights of designers . Hence , it is
important to know the extent of the danger in using the programmes that
are not orignal and are not authorized to copy.
Protecting the rights of the original programme designers
To gurantee a protection for the Rights of the programme designers ,we have
to issue a law for protecting the Copyrights of the mental property. Penalty
should be defined and implemented.
-The law of protecting the rights of the programme designers.
Now, there is a law to protect the rights of the programme designers from
illegal users. The law puts conditions for dealing with the programmes for
example:
1- Defining an expiry date for the programme-
2- Preventing total or partial copying for the prtogramme without a written
permission from the programme designer.
3- Preventing the total or partial quoting without an official license from the
programme designer.
4- The personal user has the right to make a copy for home use only.
Deciding the penalty:
-If the data or the programmes are copied for the first time without an offical
permission, there will be a prison or a fine for those who are responsible for
Copyrights protection.
- If Data and information are copied many times without a permission there
will be prison and a fine.
Implmenting the penalty:
The Police for the artistic works will follow up all the sides to make sure
that the programmes used are the original and they carry out the penalty.
Remember
Data and Information Security :
The security primary aim is to keep the secrets of data , Information, the
used sets, the working individuals in an organization or an institution.
The elements to be protected:
1- The sets and accessories .
2- The data and information
3- The programmes
4- The users
Maintaining Data and Information:
-The concept of Data processing
- Computer Crimes.
The importance of Data and Information Security:
Information and Data Security is considered a must. To achieve a
technological rise, we must define the concept of security.
The Rights of the programme designers should be protected through
the following:
* There should be a law to protect the Copyrights for the mental
property.
* Penalty should be defined.
* Penalty should be implemented.
