Computers Answer 1 It can be seen that there are 3 methods related to wired medium and wireless medium. a.)3 methods of wired medium 1.)Dial up access: this is one of the famous wired connection through which it can be easy to gather the information and also data can be transmitted in a proper manner. 2.)Digital subscriber line: it is a technology for maintaining high bandwidth information to the houses and also it helps the small companies over ordinary copper telephone lines. 3.)Cable connections: it is also one of the wired connection in which the channels can be shown easily with the help of cable connections. Like there are many companies who are offering cable connections like Airtel and Dish TV (Peyton and Kelly 2016). 3 medium of wireless medium 1.)Satellite: it is one of the wireless connection through which it can be easy to connect the internet without any wireless connections. 2.)Mobile methods: This is also the wireless connection through which it can be easy to connect the internet through mobile network. 3.)Bluetooth and Wi-Fi: It is also one of the connections which can help to connect with the data and information can be transferred easily (Neal, Woodard, and Striegel 2015). b.)Eight types of internet services are 1.)Online social network: to access the online social network it has been seen that internet services are necessary. 2.)Streaming services: internet services are related to Netflix, Hulu and Amazon instant. 3.)Email: Internet is necessary to access email which also helps to transmit the data. 4.)E-commerce: Through internet it can be easy to access the ecommerce sites. Products can be sold and purchased easily. 5.)Search engine: Through internet it can be easy to search the products and to access the data easily. 6.)Instant messenger: It is also one of the platform through which the messages can be transferred and in this the use of internet is necessary. 1
Computers 7.)Online forum: through internet it has been seen that it can be easy to focus on the discussion forum (Kang et al. 2015). 8.)World Wide Web: is considered as the web in which it can be easy to search about the data in an easy manner. c.)Pros and cons of social media and social networking 3 Pros are 1.)Helps to connect with the people on the global platform 2.)Wide scope for the business owners 3.)Proper and instant communication Cons 1.)Issues related to privacy 2.)Information overwhelm 3.)Cyber bullying (Perrin 2015) So, these are the factors related to the pros and cons of social media marketing. Answer 2 loT devices are considered as one of the popular devices. a.)Five example of lOT devices 1.)Smart phones: It is also one of the Lot devices in which there are range of mobile phones of different companies like Samsung and Apple. 2.)Door access: Through lOT it can be easy to access the doors. 3.)Switch: One of the best examples of lOT is switches. 4.)FordPass smart- link: it is a subscription based dongle that can help in plugging into the cars. Through this it can be easy to track the cars. 5.)Nano leaf light panels: it is the owned application for Android and iOS devices. b.)LoT devices works in an effective manner. It has been seen that it can help to maintain the amounts of the internet traffic and it also consist of the data that can be considered to make the device useful. This technology also helps to maintain the real information and in the homes it can be easy to maintain safety. In the workplace it can be to enhance the level of productivity. In the homes it can be seen that loT is related with the switches that can help to keep the homes safe. It also helps in accessing the doors. There is a new 2
Computers system which is given to manage the doors and switches of the homes. In ford cars the system is available through which it can be easy to track the cars. Nano leaf light panels are considered as the Lot devices through which it can be easy to manage the activities in the android devices (Mandula et al. 2015) c.)There are various challenges related to security related to smart phones. It has been seen that challenge relates with ensuring the data privacy and integrity and also with the secure communication. With the smart phones the issue can be related to the managing the device updates. FordPass smart- link the issue can take place related to the detecting of vulnerabilities and incidents. The lOT related to device states that the security is one of the issue or challenge. So, these are the devices that are related to lOT. Answer 3 a)FIVE (5) common cybercrimes in Malaysia are: 1.)Cyber-attacks: It is one of the attacks which are attempted by the hackers to damage or destroy the computer network or system. 2.)Cyber harassment: It is one of the cybercrimes in which people annoy each other. 3.)Intrusion attempt: It is related with the unauthorized access to a system or the network. 4.)Malicious codes: it is the code that is used to elaborate the code in the software system. 5.)Spam: Spam is related with unsolicited emails and also sent by the multiple mailing lists. It is send to the third party and it affects the other mails of the person (Rahman 2015). b) Type of cybercrime for each of the common cybercrimes identified in (a) are: CybercrimeType Cyber attacksSocial media platform Cyber harassmentGroup chat and religious harassment Intrusion attemptinstallation of malicious programs Malicious codesWorms, Trojan horses 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Computers Spamunsolicited e-mail Answer 4 a.)Cyber law is important as it focuses on the factors related to transactions and activities on and related to internet, World Wide Web and Cyberspace. Also, it can be stated that Cyber laws helps to reduce the threat which exist and it also enhance the nationโs security and financial health. Cyber law also helps to secure the transactions which are related with Internet and Cyberspace. By having proper cyber laws it has been seen that security of the people can be enhanced and also it helps in maintaining the internet crimes. It has been seen that if proper cyber laws are there then it can be easy to maintain the security in the workplace and also in the homes. It will boost the confidence level of the people to do transactions by considering various e commerce sites. In the present scenario, there are many people who are not doing transaction just because of the loss of information but by having proper cyber laws it can be easy for the ecommerce sites to enhance the overall sales of the company in the competitive market. So, it can be seen that in the present scenario it is important to have proper cyber laws so that it can be simple for the individual to survive in the market. It will also secure the data of the people through which they can secure their personal information and also can maintain their personal life (Eichensehr 2014). b.)FIVE (5) Cyberlaw Acts in Malaysia are 1.)Communication and multimedia act 1998: This is one of the major pillars related to the cyber laws in Malaysia. It helps to focus on the roles and responsibilities of the internet service providers. It also focuses on the concept that no filtering will be done in accessing the internet in Malaysia. 2.)Computer crimes act 1997: this act helps to ensure that misuse of the computer can be overcome. 3.)Copyright act 1997: in this focus is given on protecting the copyright works from the unauthorized copying. 4
Computers 4.)Digital signature act 1997: This act enforced to assist in preventing on line transaction frauds. It also offers both licensing and regulation of certification authorities (Alwi, Ismail, and Ahmad 2016). 5.)Electronic commerce act 2006: This act will offer a legal recognition of the electronic messages related to the commercial transactions. It also helps to offer proper legal requirement that will help to fulfill the use of electronic messages. 5
Computers References Alwi, Najwa HM, Habibah B. Ismail, and Fatin Ahmad. (2016). "Mobile Learning- Cyberlaw Course, the Application Development and Students Perceptions." Eichensehr, Kristen E. "The cyber-law of nations. (2014). "Geo. LJ103, 317. Kang, Ruogu, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015."my data just goes everywhere:โ user mental models of the internet and implications for privacy and security." InSymposium on Usable Privacy and Security (SOUPS), pp. 39-52. Berkeley, CA: USENIX Association. Mandula, Kumar, Ramu Parupalli, CH AS Murty, E. Magesh, and Rutul Lunagariya. 2015. "Mobile based home automation using Internet of Things (IoT)." InControl, Instrumentation, Communication and Computational Technologies (ICCICCT), 2015 International Conference on, pp. 340-343. IEEE. Neal, Tempestt J., Damon L. Woodard, and Aaron D. Striegel. 2015. "Mobile device application, bluetooth, and wi-fi usage data as behavioral biometric traits." InBiometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th International Conference on, pp. 1-6. IEEE. Perrin, Andrew. "Social media usage. 2015: "Pew research center.52-68. Peyton, Anthony, and John Kelly. 2016. "Signal processing apparatuses and methods for identifying cable connections between ports." U.S. Patent 9,395,399, issued July 19. Rahman, Rizal. 2017. "The Need for More Legal Materials for Better Understanding of Malware and Badware Threats in Malaysia."Mediterranean Journal of Social Sciences8, no. 1, 134-138. 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.