Presentation is loading. Please wait.

Presentation is loading. Please wait.

Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read.

Similar presentations


Presentation on theme: "Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read."— Presentation transcript:

1 Assignment 2 Shijing Xiong

2 Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read like a diary or journal, but with the most recent entry at the top.

3  White Papers are statements of proposed government policy on a particular area of concern and often contain a statement of policy. Their intention is to spark debate, often inviting comment. They often pave the way for legislation however there is no obligation to act along the lines proposed. White Papers are often produced following the consultation that is initiated when the Government issues a Green Paper.

4  Any data or programs that you transfer from the Internet to your local PC. To copy a file from a remote computer to your computer. There are a few methods of doing this on the Internet. HTTP, FTP and e- mail attachments are the most common. On the Internet, to transfer a file from another computer to your computer by means of a modem and telephone line (or cable) or network connection.

5 ◦ A review is a piece of writing that discusses the author's opinion on a piece of publication, such as a movie, video game, musical composition, or novel. In addition to the verbalized opinion there may also be a formalized assessment; for instance, the author may assign the work one to five stars to indicate its relative merit. More loosely, an author may review current events or items in the news. A compilation of reviews may itself be called a review.

6  Security is the effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing a security policy. The actions in question can be reduced to operations of access, modification and deletion. Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security.


Download ppt "Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read."

Similar presentations


Ads by Google