Tags » Outcome 2

Common security settings

Most common settings to set up for any device or account would be your password it my not seem like much but it is safest way to protect your data as long as it’s not simple and hard enough for people to figure out. 60 more words

Network Literacy

Common threats and solutions

Common threats of a cyber attack are:

  • Malware
    Malware is a type of software designed to allow criminals to achieve their objectives, and can be categorized as follows:
  • 178 more words
Network Literacy

The importance of cyber security

A cyber attack is usually intended to inflict damage or expropriate information from an individual, organisation or public entity, for the purpose of theft (of payment card data, customer details, company secrets or intellectual property), unauthorized access to networks, compromise of official records or financial and/or reputational damage. 23 more words

Network Literacy

2.6 resolving access and compatibility problems associated with Collaborative Technology

Compatibility issues can arise for a number of reasons. In 2.4 I discussed potential access and compatibility issues with integrating browser software, operating systems and plug-ins with their respective resolutions. 6 more words

Unit 304

2.5 selecting, connecting and configuring combinations that exploit the capabilities and potential of Collaborative Technology

With constant developments in technology, the connection and configuration of new combinations of hardware and software offer endless collaborative capabilities and potential. Without a doubt, one of the most significant examples of this exploitation is the creation of the Internet. 230 more words

Unit 304

2.3 Summarising the integration of different Collaborative Technologies for a range of purposes, tasks and communication media

A tool or device in collaborative technology either falls under hardware or software. Hardware is anything physical which you can touch, for example a mobile phone, a webcam or a computer screen. 323 more words

Unit 304

2.2 Determining IT tools and processes for archiving the outcomes of Collaborative Working

IT tools and processes used for archiving the outcomes of collaborative working can be categorized as either measurable or ephemeral. A measurable outcome is considered as something which abides by a clear predetermined definition of success, which can be used to decide whether the goal has been achieved. 430 more words

Unit 304