TASK 1
print ("Buyer : What do you offer?")
reply = input("Zoo keeper :")
animalOne = "cow"
animalTwo ="snail"
if reply == animalOne:
print ("I take it.")
elif reply== animalTwo:
print ("I hate those.")
else:
print ("Not interested.")
Tuesday, 24 March 2015
Tuesday, 10 March 2015
PERSONAL CHECKLIST OF OS AND MAINTENANCE
Considering the importance of operating system and its maintenance in this
era of prevalent security in the networked world, the following are the
step wise procedures i will prefer to follow when making decisions
of the PC or other gadgets, Software and Networks to use:
1. Memory of the PC
2. Type of the OS and the compatibility with the hardware.
3. checking if the OS meet the following goal as defined by Tanenbaum
for security purpose:
data confidentiality
data integrity
system availability
exclusion of outsiders
authenticity (https://beta.wikiversity.org)
4. Vulnerability of the the OS to
malware(e.g Viruses, Trojans etc) as some OS are more vulnerable than others
for example the case MS window and LINUX compared(https://en.wikipedia.org/wiki/Operating_system).
5.Functionality of the OS is also important in order to know what could be
done or not with the OS, e.g distributed OS, Multi users OS and othe
varieties compared.
6. I will also be conscious of what the gadget is needed for in order to
know the copatible OS to look out for.
In summary, i am still an advocate of education and training as mentioned
in my previous blogs.
Monday, 2 March 2015
What can be done in legislation to reduce the file effect of internet and its impacts.
File effect of internet i today's world is enormous imagine Google searching ones name and all the personal information are seen by all who cares to see
them, example of the effect of file of internet is seen in identity theft.
This
is rampant in this internet era due to the fact that some companies even governments gather their customers and or citizens data and pile them up
somewhere tagged database, before data storage was a big issue but nowadays the
challenge is in the past as technology
has grown and widespread and law is crawling behind to catch up( A mission
impossible)
„ The link https://www.privacyrights.org/ar/id_theft.htm revealed that “Another reason
identity theft is skyrocketing is that it does not yet get the attention of law
enforcement that more violent crimes receive - like breaking and entering,
mugging, robbery by gunpoint, and bank thefts. Many violent criminals and
organized crime rings are moving to identity theft because they know that law
enforcement resources are not yet sufficient to investigate the majority of
such crimes. Identity thieves are rarely apprehended and sentenced. If they
are, penalties are minimal and rarely include jail time. Community service and
parole are the usual sentences“.
For instance in US the
Internet is becoming a more popular resource for identity thieves. Yes, there
are web sites that sell individuals' Social Security numbers. Social Security
numbers can be purchased for as little as $20. At this time, there are no restrictions on the
sale of credit headers to information brokers. Consumers have no way to
"opt-out" of the sale of their credit header data. The information
broker industry adopted a voluntary privacy policy in 1997, but it has been
ineffective in restricting the sale of sensitive personal information to the
general public.
It is not surprising to know
that social media and search engines have more than necessary information that
can sell anybody out today. Here i recommend strong international legislation
to protect the data and privacy of individuals most especially on the internet in
such a way that informed consent
principle in law will be applied for all, meaning that for any information
to be accessed by a third party as regards individuals, the consent of the
individual or permission of the individual
should be requested and verified before the information is released by
the responsible institutions either governments or companies. If there will be
exception, the line should be clearly stated.
But to me, the question is how do we draw a line
between secrecy and privacy so that we do not jeopardize transparency?
I will suggest internationalization of EU
directives on data protection and
privacy. In the same vein, mandate it for all internet technology provider to
delete info that are up to a period of Three years in their database without usage.
Legislation alone cannot reduce the negative
effect of file effect s of internet users. Education of the users to know what
to be able to draw a line between what they make public online or not is also
essential.
Subscribe to:
Comments (Atom)