- •Give definition to information and communication technologies
- •2. Describe computer systems
- •3. Give definition to Operating system.
- •4. Give definition to Software
- •5.Describe Multimediacontents
- •6. Describe Archivingofdata
- •7.Givedefinitionto Userinterface
- •8.Describe Databases systems
- •Examples of Database Applications
- •9. Givedefinitionto Computernetworks
- •10.DescribeBrowsersandsearchengines, domains
- •11)Describe ip addressing
- •12) Givedefinition to information security
- •13. Give definition to Computer viruses
- •14. Describe Webtechnologies
- •15) Describe Cloudcomputing
- •16. Give definition to Main terms of Smart of technology
- •17. Givedefinitionto e-learning
- •18. Describe a freesoftware
- •19. Givedefinitionto Maintermsof mobiletechnologies
12) Givedefinition to information security
Information security, information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction is the prevention of experience.
Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are sometimes referred to as the CIA Triad of information security. This triad has evolved into what is commonly termed the Parkerianhexad, which includes confidentiality, possession (or control), integrity, authenticity, availability and utility.
Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.
Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).
13. Give definition to Computer viruses
A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless.
Through the course of using the Internet and your computer, you may have come in to contact with computer viruses. Many computer viruses are stopped before they can start, but there is still an ever growing concern as to what do computer viruses do and the list of common computer virus symptoms. A computer virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk.
Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, run your computer as a standard user (not as administrator), and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
