Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

IT for communication revision notes

Rating
-
Sold
-
Pages
14
Uploaded on
15-04-2022
Written in
2013/2014

IT for communication revision notes is about the legal framework for fighting cyber security, risks associated with sending credit card information over the internet, four examples of common productivity software used by businesspersons, advantages and disadvantages of physical topology of a network, half duplex and full duplex mode of communication, guided media, radiated media, FTP, PSTN, circuit switching and packet switching, malicious and non-malicious threats, hacking or damaging a computer system, definition of worms, reducing the chances of infection from viruses, function of a firewall, data and information, six components of an Information system, innovative technologies improving the educational sector in Mauritius, different elements contributing to the competitive advantage of a company when implementing E-Commerce, goals of a Management Information System (MIS), ten known symptoms that indicate that a computer might have been infected with a computer virus, advantages and disadvantages associated with expert systems, different types of barcode readers, people suffering from the digital divide disadvantaged socially, in education and in employment, system software and application software, characteristics of open source software, preemptive multitasking and cooperative multitasking, five components of a data communications system, unicast and broadcast transmission, disadvantages and advantages of topologies and meta and specialised search engine, use of a modem within a computer system and three types of computer viruses. differences between open source software and proprietary software, functions and features of modern Internet browsers.

Show more Read less
Institution
Course

Content preview

An English businessman is planning a trip to Mauritius for a meeting with his business partners. He wishes to
book a hotel room on-line and his favourite hotel chain is called the Interlinks Group. The group owns hundreds
of hotels throughout the world including seven hotels in Mauritius. Each hotel has different facilities.

(a) He uses an Internet search engine to find an Interlinks hotel with a meeting room, anywhere in Mauritius
except in Port Louis. Provide an overview of the mechanisms employed by Internet search engines to
produce the correct search results.
 Googlebot, a web crawler that finds and fetches web pages.
 The indexer that sorts every word on every page and stores the resulting index of words in a huge
database.
 The query processor, which compares your search query to the index and recommends the documents
that it considers most relevant.

Let’s see how Google processes a query.




(b) When he makes his reservation with the hotel his personal details and credit card information are stored
in a database and he receives a booking reference number.

(i) Describe the principles of the Mauritian legislation that protects information stored in this way?

Developed law on Computer Misuse and Cybercrime Act (2203) to provide for repression of criminal activities
committed through internet/ computer systems.

, ii. To strengthen the legal framework for fighting cyber security, the following Acts were also developed;

a. Data Protection Act

b. ICT Act 2001

c. Electronic Transaction Act 200

d. Copyright Act 1997

e. Policy Framework for ISPs

f. Fair Trading Act

iii. The Information and Communication Technologies Authority (ICTA) was established to regulate the ICT
sector in areas like telecommunications, usage of the internet and data protection.

iv. The Computer Emergency Response Team for Mauritius (CERT-MU) was established with the following
main goals;

a. Handle security incidents and monitor security problems occurring within public and private sectors.

b. Provide guidance to providers of critical information infrastructure to adopt best practices in information
security.

c. Warn and educate systems administrators and users about latest information security threats and suggest
countermeasures by means of information dissemination.

(ii) What are the risks associated with sending credit card information over the internet? How can the risks be
minimised?
1. Someone who is watching Internet traffic may see your account number as it goes by and use it to buy
stuff for themselves.
2. You don't really know who you're sending your account number to.
3. Someone might break into our computer and steal your credit card number.

Providing your credit card details over the internet through a secure site is usually safer because you know that
it is going to the organisation intended. However, to minimise any risks, remember the following:

* When providing your credit card details online, ALWAYS use secure and reputable sites. You can tell if a site
is secure by the small padlock icon at the bottom of your screen which indicates encryption technology is being
used

* Check your statements. Report any discrepancies to your bank immediately

The golden rule is to use as much common sense as you would with face to face or telephone transactions. Only
deal with online companies that you know are reputable.

(c) What are productivity software? List four examples of common productivity software used by
businesspersons.

Written for

Course

Document information

Uploaded on
April 15, 2022
Number of pages
14
Written in
2013/2014
Type
OTHER
Person
Unknown

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
zeenoche

Also available in package deal

Get to know the seller

Seller avatar
zeenoche Self
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
4 year
Number of followers
1
Documents
282
Last sold
3 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions