Data Structures Data Structure: A way of organising data in computer storage to ensure it can be used efficiently (and accurately!). o Primitive: Characters, integers o Composite: Arrays, dictionaries, records, classes Limitations of Computer Data structures: o Word size: The computers preferred size for moving units of information around. It defines the width of your processors registers, which holds data during arithmetic and logical calculations. In the 1980s most computers had a word size of 16 bits. o Total memory storage: How many bits / bytes of storage. In 1980s a typical computer could store. o Processing speed: How many bits can be processed. Malware Malware = Malicious software Tasks: o Suggest characteristics of each. o Write down definitions using the text (p4) or online. o Find a recent example of one of these. Share on Google Classroom. Virus Characteristics o Commonly attached or embedded within apparently legitimate software or files. o Able to execute, duplicate itself and perform its malicious processing. Worms Characteristics o A type of virus which aims to slow down the system o Exploits a security flaw in the OS and then install themselves on the hard drive (often as hidden files). o Begins to replicate itself over and over again, consuming the entire hard disk over time. o Typical symptoms include RAM being completely consumed by the worm. Trojan Horse Characteristics o A malware that enables an outside user (or program) to take control of your computer. o Spyware Characteristics o Aims to obtain your information without your knowledge. o Able to capture your web browsing habits, read your email contacts or even read keystrokes as you enter passwords and credit card details. Ransomware Characteristics o A type of malicious software designed to block access to a computer system until a sum of money is paid Reliance on Software For individuals, our reliance on software and being let down when it does not perform as expected is usually just an inconvenience. What issues could you envision for large companies that rely on software? o $$$
Rights and Responsibilities
Response to Problems When a user identifies a problem within a system, the developers have a responsibility to respond and address the problem in a reasonable time frame, depending on the severity and frequency of the issue. Critical Affecting normal operations Immediate response with no workaround. Causing financial loss Major Affecting normal operations but there is an inconvenient workaround available Normal Affecting normal operations but there is an accessible workaround available. Cosmetic No effect on normal As time allows operations, but an opportunity for enhancement and improvement Ergonomics Ergonomics: The study of the relationship between human workers and their work environments. In software, the issue of ergonomics is considered by: o Considering the users needs from an ergonomic perspective o Designing a user interface that allows users to work naturally, intuitively and efficiently. The design should be consistent and follow design standards, use screen elements (e.g. radio button) correctly, use colour and fonts appropriately, align and group elements, be forgiving (allow users to reverse an action) o Performing usability testing to measure your success in addressing ergonomics issues in your software design. Privacy Flickr What information is collected o Email address o IM names o Real name o Current city o Uploaded photos o Photo data How the information is used analytics, communication, sharing with businesses o Advertisements associated with the photo you are seeing, or the search term you entered. Why they store personal information When the policy applies e.g. to whom o Disclosure of potential future changes o This page describes current Yahoo practices with respect to this particular service. This information may change as Yahoo revises this service by adding or removing features or using different service providers. How the information is managed and kept secured o How to change your information / settings o You can delete individual photos o Visit your Flickr account information to edit your profile, settings and more.
Software Piracy & Copyright
Classification Commercial You are purchasing a license to use the software. o https://www.adobe.com o https://www.office.com o https://www.autodesk.com o Open Source The source code is developed collaboratively and is available to all to modify and redistribute. o https://www.blender.org o http://www.chromium.org o https://www.mozilla.org/en-US/firefox/ o https://www.mozilla.org/en-US/thunderbird/ o http://www.videolan.org/vlc/ o https://handbrake.fr o https://sourceforge.net/projects/audacity/ o https://www.virtualbox.org o https://www.gimp.org o Shareware Covered by copyright. You are required a license to use the product. Purchasers are allowed to make and distribute copies of the software. o https://www.rarlab.com Public Domain o http://www.prongo.com/tictac/index.html