Assignment 1 What is Web Server Scripting? Explain the principles of web server scripting: Web server scripting is simply where a script is executed on the web server before a webpage is sent to the user. This means that the files that the user can customised rather the layout or information shown on the webpage once they load it up, an example of this would be, on Facebook once you login you will get a news feed, which is for you alone and no one else. This makes webpages dynamic; they can change depending on circumstances of the user instead of being a simple static page which can’t change rather the layout, information and so forth.
Surveillance and privacy are two terms that don’t match so much. Nowadays our society is made up of people who fond of showing themselves off in any occasion, in a gamut of ways, from social networks such as Facebook, Twitter, and the most recent Instragram, to wearing nothing at all in order to look amazingly cool and “way-to-go people”. I’m not buttoned-down, absolutely, and I don’t want people to bundle up. It’s no use.
Now a days information gets easily hacked because effective secure and private matters are not taken. 1.09 Sexual
This is a process for proper research and it can be further elaborated. Relevance This part of the process is about how pertinent the source is, which depends on the content of the information, the style that it’s written in (e.g. Colloquial or formal), who is the author and whether or not he/she/they come from a trustworthy background (e.g. Job description) and who the information is intended for (Smith & Stein, n.d.). Readily Available There are many forms of sources and different ways to access them.
These search engines constantly records and index pages, this is accomplished by the crawlers that follow different links every time a new page is clicked. This crawling only allows them to collect records from only static pages, not dynamic. Static pages and dynamic pages, as described by a PC help center, are Web pages can be either static or dynamic. "Static" means unchanged or constant, while "dynamic" means changing or lively. Therefore, static Web Pages contain the same prebuilt content each time the page is loaded, while the content of dynamic Web pages can be generated on-the-fly.
Cybercrime is a new type of crime that can occurs in this generation. Recently more cybercrime happen because we use technology everyday. This crime can be categorised in different categories. Internet has become one of the main keys for many people around the world.
The E-world has drastically facilitated our life but still many people are not comfortable with the changes it has introduced in our day-today life. Undoubtedly, the user-friendly and efficient electronic gadgets have enabled the companies to gain a deeper understanding about their customers by collecting, organizing, analyzing and utilizing the information about customers liking, preferences, needs, demands, expectations which has helped to foster the relationship with consumers. People provide all valuable information about themselves, knowingly or unknowingly when sending e-mails, surfing the Internet, making a purchase using credit card, signing up for social networking sites, joining frequent-flyer clubs, calling on Skype etc. with web search engine, you have all the information about a person or a thing at your fingertips…Is giving away one’s private information safe on Internet? What if it gets leaked and someone misuses it?
I believe that people deserve their own privacy, the world wide web isn’t in the power of everyone so to just let schools look at students social media will do absolutely nothing because one are they gonna keep watch of the millions of accounts on social media what about the real things that are actually said and done now this isn’t the way the world works I think the schools should just focus on the task at hand and help kids pass over time students mature and are very aware of the things us as humans say or do. The real question is, is it really worth watching all the activity online instead of taking care of the stuff that can be prevented I mean The stuff we do now is the real do social media isn’t going to stop bullying or cyberbullying it won’t stop until students realise what they are doing I’m talking from personal experience, I’ve been harassed online and outside of the social world it’s just kids trying to show off to their friends. But the privacy issue still stands tall nobody should be able to violate that but it happens anyways because the government spies on us, so what if the government sees everything kids are saying to each other they don’t stop it. It’s not their fight even though they are suppose to know what’s best for us
With unprecedented amount of personally identifying information, Information privacy is considered as critical issues which could effect on ethic, legal, social, and politics The main matter in information privacy is the control of information (Katzan, 2010).). Some studies have viewed various perceptions of information privacy (moral, legal right and the ability to control personal information (((Stone et al., 1983; Bélanger and Crossler, 2011; Clarke 1999).).). While, users see that only users should have the ability to release their information, some organizations also suppose that the organization that collect, create maintain and process the information have right to control of it (Straub and Collins (1990)). In addition, personalization technologies offer powerful tools for enhancing the user experience and it requires to collect and mining of user information such as what user like to read, what user like to buy, how much time he or she spend. However, if Web sites sell users information to other companies, it will effectively violation user
The idea of Identity and privacy plays an important role on everyday life in regards to ICTs. Privacy is a human right, whether this be at home or online. People should be allowed to share only the things they would like to be seen by other people but on the internet this is not the case. Anything that is posted on the internet cannot be removed; it leaves a digital footprint that can be tracked. Tracking can be as simple as looking at an Amazon review you wrote with an account linked to your credit card or matching your internet history with your IP address.
My IP address of default gateway is fe80::1286:8cff:feec:de7a%15. My MAC address is BA-EE-65-33-85-BB. 2) Why does every computer on the internet need to have these four numbers? The IP address is specifically made for each unique user.
This tool was used to see what devices are interconnected between any computer and the user’s computer. It does give information of hardware with the IP Address that is assigned to each one of them. LLDP does not come installed on Windows, it has to be downloaded and installed. Each Windows OS is different and with Windows XP is the following procedure. First Internet Explorer is opened and access the LLDP Responder download page.
So when you put two and two together, information and identity go hand in
If BHE chooses, policyIQ log-ins can be integrated into the internal user directory (such as Active Directory) utilizing LDAPS integration. This requires just a few pieces of information to be exchanged by the BHE IT department and the policyIQ technical team. With this integrated, a user can log into policyIQ using his/her network log-in ID and password, and policyIQ will validate that log-in information to the BHE network. This can be set up for multiple network domains, if users do not exist within a single domain.
It offers a secure fitting together between internet browsers and websites, letting you to communicate secretive data online. Physical Layout • Topologies; topology can be measured as a computer-generated nature or construction of a system. This shape does not agree to the real physical plan of the policies on the computer network. • Ring; basically in a ring system each device (workplace, waiter, and copier) is related to two other devices, this systems a ring for the signs to travel around. Each packet of data on the network trips in one way and each device collects each box in turn until the journey 's end device receives it.