Sunday, 28 September 2014

Homework

Homework


In the 1950's two devices would be invented that would improve the computer field and set in motion the beginning of the computer revolution. The first of these two devices was the transistor, invented in 1947.
Over the years social media has been a main development in communication. People from all over the world are able to contact others using social media sites such as twitter and tumblr. From old computers there are now many ways to get on the Internet, to communicate with others, on devices such as laptops, ipads, phones and more. Internet connections can be free in some places and very easy to access which is a big development from when computers were first made.
In the future there will be more social sites used for global communication and more devices, which can also be used for Internet connection. They will develop devices making it easier for communication and access to the Internet.

Friday, 26 September 2014

Data Protection Act

Data Protection Act

The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great Britain and Northern Ireland which defines UK law on the processing of data on identifiable living people.


Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless- at least one of the conditions in Schedule 2 is met, and in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
About the rights of individuals e.g. personal data shall be processed in accordance with the rights of data subjects (individuals).
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

Three rights to data subjects

The data subject (the person whose data is stored) has consented ("given their permission") to the processing
Processing is necessary for the performance of, or commencing, a contract
Processing is required under a legal obligation (other than one stated in the contract)

What does a organisation have to do to ensure that it abides by the law?


The personal data should be relevant to the reason the data has been kept in the first place. It should be accurate and only used and kept if it is necessary. Also, when needed the information needs to be updated so the data is correct. To keep the data safe and used only for business, the rooms need to be locked, devices need to have a safe password and employees need to be kept under restraint from using and finding the data in any way it could be used in the wrong circumstances. Once the data is used, it needs to be deleted so the company or device doesn't have the personal information any more. It should only be kept for the certain amount of time it is needed for and shall not be kept longer than necessary. 



















Thursday, 25 September 2014

Legality

Legality


Hacking

Hacking is where an unauthorised person uses a network, Internet or modem connection to gain access past security passwords or other security to see data stored on another computer. Hackers sometimes use software hacking tools and often target, for example, particular sites on the Internet.

Data misuse and unauthorised transfer or copying

Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disksmemory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.

Copying and distributing copyrighted software, music and film

This includes copying music and movies with computer equipment and distributing it on the Internet without the copyright holder's permission. This is a widespread misuse of both computers and the Internet that breaks copyright regulations

The Data Protection Act

This was introduced to regulate personal data. This helps to provide protection against the abuse of personal information. Find out more about the Data Protection Act.

Copyright law

This provides protection to the owners of the copyright and covers the copying of written, musical, or film works using computers. FAST is the industry body which is against software theft. You can find out more about it in the copyright section.
There have been cases where laws such as Copyright have been used to crack down on file sharing websites or individuals who store and illegally distribute copyrighted material, e.g music. There is a massive problem with many people around the world obtaining copyrighted material illegally.

Close down chat rooms

Some chat rooms have been closed down due to abuses, especially where children are vulnerable. Some have moderators who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arrange meetings without extreme caution.

Monday, 15 September 2014

Definitions

Definitions 

Computer System: A computer system is one that is able to take a set of inputs, process them and create a set of outputs. This is done by a combination of hardware and software.

Hardware: Hardware is a generic term for any part of the computer that you can physically touch, pick up, hold, move around the room etc. In other words, hardware are the physical parts that make up the computer.

Software: Software are the applications and programming instructions that tell your computer what to do and enable you to use it for things

Input: A place where, or a device through which, energy or information enters a system or put data into a computer.

Output: An output device is a piece of hardware that is used to output data that has been previously entered into a computer or processing device.

Processing: Processing is the stage where the input data is manipulated in order to produce meaningful information. Processing can include a number of stages such as sorting, searching, calculations, graphing.

Storage: In computing a storage device, such as a hard drive or memory stick, is used to store data or information for future use.

Friday, 12 September 2014

Intro

Hello, my name is Jess and this is my GCSE Computer Science blog. On the first week of Computer Science we have learnt Binary Code. My name in Binary Code is:

01001010 01100101 01110011 01110011