Advantages & Disadvantages For Touch Screen Devices.

This blog will be about the advantages and disadvantages for touch scren devices.

What are touch screen devices?

Touch scree devices are getting more popular these days, as the years go by. A touch screen is an electronic visual display that can detect the presence and location of a touch within the display area. Touch screen are genarlly refers to touching the display of the device with a finger or han. A lot of people in the society will have at least one thing that is touch screen.

The advantages of  touch screen devices

  • Big screen – This is ideal for web browsing, pictures and movies.
  • Interfaces – Some touch screen devices usually have simple user interfaces, which are more intuitive (more easy to use and easier to understand) for example the IPhone.
  • Co- ordination – Touch screen devices have easier had eye co-ordination.
  • Fastest – Touch screen devices have fastest pointing devices
  • Volume – Touch screen devices have a high volume usage.

The disadvantages of touch screen devices:

  • Big screen – If your touch screen has a big screen then it leads to a low battery life.
  • Arm reach – Touch screen devices could be at arm reach from the device and might not be able to see anything on it.
  • Alternative devices – Touch screen would cost more than alternative devices.
  • Reduction – In touch screen some reduction in image brightness might not occur.
  • Pain – There might be pain because some screns need to be installed at a lower position and tilted to reduce arm which could cause pain.

Data Security

This blog is about the key terms about Data Security. The Key terms are: Computer Viruses, Trojans, Worms, Phishing, Spyware, Adware, Hacking, Denial of service attacks.

What is Data Security?

Data security is keeping data safe. Many individuals, small businesses and major companies rely on their computer systems. If the data on your computer system is damaged, lost, or stolen can can lead to disaster.

Computer Viruses: A virus is a simple program designed to cause harm to someone else’s computer. A virus spreads by duplicating and attaching to itself to other files. The extent of the damage depends on the virus. There are tens of thousands of viruses. Some virus damage is terrible, putting the computer system out of action by erasing files or corrupting data.

Viruses can:

  • Keeping you system up to date,
  • Using an anti-virus system to keep your computer up to date,
  • Not opening an email attachment,
  • Not allowing your friends to use their memory stick on your system.

Trojans: Trojans horses in this way may require interation with a hacker filled with purpose. though the hacker does not have to be the individual resonsiable for distributing the Trojan horse. Trojans may only use drive by downoloads or install via online games in ordere to reach traget computers. Is is possiable for individuals hackers to scan computers on a network using a port scanner.

Trojan purposes:

  • The use of the machine as part as a botnet,
  • Electronice money theft,
  • Data theft,
  • Downloading or uploading files from the user’s computer system.
  • Crashing the computer

Worms: Worms are a destructive program that replicate itself throughout the single computer or across a network both wireless or wired. But worms always cause atleast some harm to the network. Most worms that have been created are desgined only to spread, and don’t attempt to change the system as they pass through.

Examples of some worms:

  • Morris Worm
  • Mydoom,
  • ExploreZip Worm,

Phishing: Phising is similar to fishing in lake. Phishing is an attempt to gain personal infromation about someone by way of deception. They send out e-mails that appear to come out from legitimate websites. Phishig scams is one of the techniquies that is quite common that criminals use today.

Your Personal Information can come out of:

  • PayPal,
  • Pretending to ask the bank for thier bank number,
  • Or sending an e-mail

Spyware: Spyware is the name that implies, this is the software that spies on your computer. If you don’t like to be spied on then computer won’t either. The Spyware can capture information like Web browsing habits. Sometimes, spyware in included along with genuine softwar, and may come from an offical software vendor.

Adware: Adware is a free software that is supported by advertisements. Common adware programs ae toolbars that sit on your desktop or work in conjunction with your web browser. These adverts can be in the form of a pop up.

Hacking: Hacking is this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someones who gain unauthorized accress to other computers. A hacker can hack his or her way through security leveld of a computer system or network

Denial of service attacks:A denial of service attack is an effort to make one or more computer systems unavailable.