Information Technology


Posted on Updated on

1.Discuss your views on using the Internet to find a mate. What are the advantages and disadvantages? Additionally, how has technology affected the composition of the family? Has the family changed because of technology? Explain?


Temporal data types

Posted on Updated on

77 unread replies.77 replies.

Explain what the different temporal data types are in MySQL and how they differ.

False match rate and False non-match rate,

Posted on Updated on

Define the terms false match rate and false non-match rate, and explain the use of a threshold in relationship to these two rates. Justify your answers. Provide examples to support your response. Specifically, think of and give a real-life scenario portraying the following concepts:

  1. False match rate
  2. False non-match-rate

Social media process,

Posted on Updated on

What are the key factor involves in term of advantages and disadvantanges for social media process,explain with examples

Security issues

Posted on Updated on

Discuss basic security issues

Computer security

Posted on Updated on

Define computer security and explain the difference between passive and active security threat. Provide examples to support your response. Specifically, think of and give a real-life scenario portraying the following concepts:

  1. Passive security threat
  2. Active security threat

Series of data breaches

Posted on Updated on

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings.
You have been asked to provide a summary of information to the entire team about data breaches and suggest proactive and preventative measures for warding off viruses. Your presentation will be sent out to all company employees, so the information must be clear, concise, and informative.
To prepare your presentation, use your personal computer to perform the following tasks:
Identify whether you have an anti-virus software running on your machine and from which company.Identify if a firewall is enabled on your machine and if you need Windows® firewall running in addition, if that anti-virus software is installed on your machine.
Include the following in your summary:
Definition of a data breachWays to determine if your system was infected with a virusAt least three preventive measures against data breaches, both physical or digitalInstructions on locating anti-virus and firewall softwareInstructions on what to do if a virus has infected your computer
Choose one of the following options for your summary:

Infographic or visual diagram delivered as a PowerPoint, PNG or PDF. You may use any Microsoft® Office product or free sites such as Piktochart,, or Canva to create an infographic.Another deliverable approved by your faculty member.