- •Royal International Language School
- •Chapter six queries
- •Create a new query without a wizard
- •Total Queries:
- •Questions
- •Explain briefly the following queries?
- •What is the difference between the select Query and the action Query?
- •Chapter Seven Forms
- •Questions
- •Exercises
- •Chapter Eight Reports
- •In the previous figure, we noticed the following:
- •Exercises:
- •Part Two Data and Information security
- •Intended Hacking :
- •Information Ethics
- •International agreements
- •Information negative sides:
- •Examples to show the negative sides of information The World Wide Web:
- •Viruses
- •Information filter
- •Filters:
- •Remember
- •Information:
- •Information properties:
- •Information filter:
- •Questions
- •Data and information Security
- •Keeping Data and Information
- •Implmenting the penalty:
- •Remember
- •Questions
- •Viruses
- •Viruses
- •Virus concept
- •Viruses Properties:
- •Virus Symptoms:
- •Virus and ways of protection:
- •Virus protection:
- •Remember
- •Virus properties:
- •Virus Symptoms:
- •Viruses and ways of protection:
- •Virus detecting programmes:
- •Question
- •84Mr.Khaled Anwar 01003340348
Information negative sides:
Information has a vital role to play in all the sectors especially at the
sites of decision-making. The power of the information sector became the
main criterion for the comprehensive economic power in the society. It is
the feedback that helps to achieve the stability of the international system.
Information has a positive and important effect on the national security,
education, health, economy, the state's policy and on our life in general.
We see and hear about satellites for spying that know no limits or
privacies for any country. These satellites can hack on the sovereignty of
any country. Foreign mass media transmit whatever they like of false
information about other countries. The main aim here is economy. We
notice that information technology has a great effect on our life and can
control our culture and knowledge.
The danger of the information technology lies in the fact that it robs the
people their identity. This is clear in the book of Cross Roads by Dr.
Hussein Kamel Bahaa El-Deen; the Ex-Minister of Education in Chapter
Three entitled "The Retreat of the Morals and the Sovereignty of their
Material Values"
Examples to show the negative sides of information The World Wide Web:
The marvellous progress in the fields of communication and internet
usage of computer is a great leap in sharing data and information. This helps
employees, individuals, institutions and states work smoothly. This is known
as the (World Wide Web) or the internet.
The international network is called the (World Wide Web) for
information. It links many "Wans" (Wide Area Networks) in most countries
of the world. Anyone can browse the internet and can also go through the
information or even add to it. Individuals who use the internet should have
morals because they will find information that deals with the correct social
habits and religious values. It is possible also to find immoral data that
penetrate into the country.
The internet helps us transmit information in an easy and quick way ,
not only among individuals but also among institutioins and states. The
world has become a small village because we can see and know each other
inspite of the far distance. For this reason, a new type of computer users
who look for information for different reasons have appeared. They try to
reach information in all the possible means to erase knowledge or attempt to
alter it , using different means through the computer and the internet. These
people are called hackers. But how can we protect our data from such
hackers ?
The security dangers that personal computers are exposed to
when connected to the internet:
Security dangers
The internet includes many security dangers that may harm your
computer. These dangers can cause problems. These problems result in
losing data and information. These types of dangers are considered the
common security dangers.
Viruses
Viruses are transmitted to computers in many ways for example, when we
use infected CDs. Now, after the breakthrough of using the internet, the (email)
became the most wide spread cause for viruses spreading into
computers. These viruses may cause harms. The least harm is a damaging a
certain programme.
- Lack of experience in dealing with some programmes:
The wide spread usage of the internet by the non-specialists in this field,
leads to updating programmes to make them easier to deal with. It became
very easy for anybody to log into the internet and reach the information; this
makes the connector exposed to different harms.
The inaccuracy and carelessness in using the internet:
In choosing your passwords, they should not be known to others or
written on papers and they should not be easy to guess.
The technical ways followed in limiting security dangers on the systems
and computer nets, occasionally limit the use of some applications and
internet services. For example, more security may affect the use of chat or
communication through the internet. Therefore, security level is left for the
user.
