- •Royal International Language School
- •Chapter six queries
- •Create a new query without a wizard
- •Total Queries:
- •Questions
- •Explain briefly the following queries?
- •What is the difference between the select Query and the action Query?
- •Chapter Seven Forms
- •Questions
- •Exercises
- •Chapter Eight Reports
- •In the previous figure, we noticed the following:
- •Exercises:
- •Part Two Data and Information security
- •Intended Hacking :
- •Information Ethics
- •International agreements
- •Information negative sides:
- •Examples to show the negative sides of information The World Wide Web:
- •Viruses
- •Information filter
- •Filters:
- •Remember
- •Information:
- •Information properties:
- •Information filter:
- •Questions
- •Data and information Security
- •Keeping Data and Information
- •Implmenting the penalty:
- •Remember
- •Questions
- •Viruses
- •Viruses
- •Virus concept
- •Viruses Properties:
- •Virus Symptoms:
- •Virus and ways of protection:
- •Virus protection:
- •Remember
- •Virus properties:
- •Virus Symptoms:
- •Viruses and ways of protection:
- •Virus detecting programmes:
- •Question
- •84Mr.Khaled Anwar 01003340348
Information filter:
It is a procedure taken to prevent the net users from reaching the nonsecured
sites. Any person can decide what type of information he wants to
hide.
The importance of information filter :
It protects the net users from the harmful and useless sites.
Protection should be available on the personal computers, school computers
and the software in the computers connected to the internet in school
laboartories
Questions
a- Choose the correct word:
- Data are the raw materials for………….
( information - processing - data )
- Information is the output of…………..
(Information - processing - data )
- The mental property is the ………….of the thought that carried out the -
programme.
(Protection- information- processing )
b- Fill in the spaces to complete the sentences
The mental property is…………..of the programme that carried it out.
On buying any programme, there are licence agreements for the programme as
paper print outs , …………….. and as a web page for the programme itself.
- Information has a great positive effect on the life as a whole represented
in…………..
- Information has dangerous negative effects, for example, satellites are used
in…………………….
c- Fill in the spaces using words from the list:
false- plentiful- World Wide Web- clarity – modernization- link- realismlogging-
data and information- entry- intended.
- Information transmitted by the foreign Mass Media may be ………..
- Information are distinguished by…………, precisness,
development,…………..,………….. and……………
- The internet is called the World Wide Web as it ………..between many
information nets and databases in most of the countries.
d: Answer the following questions -
In dealing with the internet, there are many dangers that threaten your computer.
Mention the ways that help you avoid these dangers?
- Mention some of the security dangres that you may face when you are connected
to the internet ?
e: Complete the following sentences -
Filtering information has a great importance for computer users as it ……..the
users from the harmful sites.
- Protection for computers should be available on……………., the school
computers and ……………………………
- Filtering information programmes are called…………………..
Data and information Security
Security means keeping the secrets of ( information, Data,
computers and the individuals who work in an organization or an institution.
The elements that should be protected
( Hardware )
The computer is
exposed to many
threats such as:
* Misuse
* Disorders
* Intended Corruption
Information Security is interested in the material components of the
computer so, we should do the following:
- We should devote a separate room for the computer with safety tools such
as fire extinguisher and a stabilizer for the electric current. We should select
the individuals who will deal with computers. The places chosen for
computers should have fresh air stream.
Data and information:
In using the computer, we should control the following:
* Data Entry
* The flow of Data
* Coding and encoding data
* The nature of the data available for each user.
(Software):
They are groups of orders that help us use the computer -
with the purpose of solving a problem or carrying out a task.
These programmes help the user in his work. They are the
(Operating System and application programmes).
Data and Information Security aims at keeping the programmes as they help
to:
……make sure that the programmes used are original.
…… control the areas of using the programme.
…….keep the secrets of data within the programmes.
(Computer Users)
The user is one of the primary elements we have to consider in the issue of
Data Security especially after the breakthrough in the scope of computer and
the wide spread of the internet and the nets. Data Security requires the
following:
- Defining the people who will scan data and deal with them.
- The nature of the data for each user.
