Graduate Diploma Reading & Writing Spring Term Session 9 Data Commentary Writing Practice Mini-tutorials.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Data commentary. Data commentary Why do data commentary? Highlight the results. Assess standard theory, common beliefs, or general practice in the.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
The Internet = A World of Opportunities
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
1 Computer Security: Protect your PC and Protect Yourself.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
What is it, how does it work, and why is it important?
Viruses and their Cures Catherine Agnew CEDu 581 – Oconomowoc.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Data Security.
Viruses.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Made by: Sambit Pulak XI-IB. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Types of Electronic Infection
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
1 Pertemuan 10 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Safety and Security issues of using ICT Alys brooks.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Don’t let them catch your computer!!!!!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Cybersecurity Awareness
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Graduate Diploma Reading & Writing Spring Term Session 9 Data Commentary Writing Practice Mini-tutorials

Probability Can you continue these sentences so that they are true? It is certain that… It is almost certain that… It is very probable / highly likely that… It is possible that… It is unlikely that… It is very / highly unlikely that… There is a definite possibility that… There is a strong possibility that… There is a good possibility that… There is a slight possibility that… There is little possibility that…

Distance Grade these claims from strongest (1) to weakest (5): a)The factory seems to have benefited from the recent technology upgrade. b)It seems that the factory has benefited from the recent technology upgrade. c)It has been said that the factory seems to have benefited from the recent technology upgrade. d)The factory has benefited from the recent technology upgrade. e)The factory appears to have benefited from the recent technology upgrade.

You can also create distance with expressions like these: Based on the limited data available… In the view of some experts… According to this preliminary study… Based on an informal survey of nine departmental managers…

You can also employ generalization. Underline the generalizations in the following statements: Children living in poverty tend to have a history of health problems. Many children living in poverty have a history of health problems. The majority of children living in poverty have a history of health problems. In most parts of the world children living in poverty have a history of health problems.

You can also employ generalization. Underline the generalizations in the following statements: Children living in poverty tend to have a history of health problems. Many children living in poverty have a history of health problems. The majority of children living in poverty have a history of health problems. In most parts of the world children living in poverty have a history of health problems.

Source of VirusPercentage attachments Disks from home Disks (other) Unknown Download (from internal or external sources) Distribution CD Disk (sales demo) Automated software distribution Disk (shrink-wrapped) Disk (from manager) Malicious person Browsing WWWD Disk (from repair person) Total survey respondents 87% 4% 2% 1% <1% 0% 299 Source: Data from ICSA Labs Computer Virus Prevalence Study. Note: Because respondents to the survey have indicated more than one means of infection, the totals exceed 100% What’s the title of this table?

Source of VirusPercentage attachments Disks from home Disks (other) Unknown Download (from internal or external sources) Distribution CD Disk (sales demo) Automated software distribution Disk (shrink-wrapped) Disk (from manager) Malicious person Browsing WWWD Disk (from repair person) Total survey respondents 87% 4% 2% 1% <1% 0% 299 Source: Data from ICSA Labs Computer Virus Prevalence Study. Note: Because respondents to the survey have indicated more than one means of infection, the totals exceed 100% Table 5 Source of Computer Virus Infections

Now read this commentary on the data: A computer virus is a program that is specifically and maliciously designed to attack a computer system, destroying data. 2. As businesses have become increasingly dependent on computers, , and the Internet, concern over the potential destructiveness of such viruses has also grown. 3. Table 5 shows the most common sources of infection for US businesses. 4. As can be seen, in a great majority of cases, the entry point of the virus infection can be detected, with attachments being responsible for nearly 9 out of 10 viruses. 5. This very high percentage is increasingly alarming, especially since with a certain amount of caution such infections are largely preventable. 6. In consequence, users should be wary of all attachments, even those from a trusted colleague or a known sender. 7. In addition, all computers used for need to have a current version of a good antivirus program whose virus definitions are updated regularly. 8. While it may be possible to lessen the likelihood of downloading an infected file, businesses are still vulnerable to computer virus problems because of human error and the threat of new, quickly spreading viruses that cannot be identified by antivirus software.

a)Where does the data commentary actually start? b)What are the purposes of sentences 1 and 2? c)What features of this text make it look like academic English? d)Which sentence contains the author’s key point? e)The author has chosen to comment only on attachments. Why? Do you think this is enough? If not, what else should be discussed? f) attachments constitutes 87% of the total. In sentence 4, this is expressed as “nearly 9 out of 10”. What do you think about this and about the following alternatives? about 90% just under 90% as much as 87% of all nearly all