25 Nisan 2019 Perşembe

RESUBMİSSİON D1 - Explain How to Ensure Safe and Secure Use of Specialist Communication Channel


 security

personal information

 Unlike paper documents, electronic documents can be steal, change hand or t can be use for diffrent goals. So be careful while sharing your personal informations. In the internet there are innocent people and pedophile person. These people use the internet for get the password and user name of some people.

  • So many person use their before wedding surname for the user name. These informations can be in your accounts.
  • Be careful while giving your phone number and adress. Think twice.
  Digital content
 
In the internet everyone is not your friend.they can use thing for bad.

  • The videos and photos that you loaded can seen by anybody and it can be loaded by anybody.Don't load videos and photos that you will be regret .
  • The employer can look to your facebook account to understand your personality.
  • The thing that you view before can be seen from the internet.
      respect to others

  • If you cant say a thing to the person dont sat it in the internet.Things that you write and say had seen by millions of people.
     data secururity

  •  encyrption  
    • Hard disk encyrption and wifi encyrption
  • Firewalls
    • Firewall is a software that controls the datas. It protects the computer rom viruses.Be sure that thisis in your computer
  • backup
    • To make the data dont disappear the best way is take backup.Especially cloud sistems can be use for data backuping.
  • safe sites
    • While loading the Credit card informations, passwords be sure that your sites are safety.If the site starts with "https" the site is safety.

24 Nisan 2019 Çarşamba

RESUBMISSION M1 - Justify why specialist communication channel is effective for a given purpose

Blogging is easy to do and update even though it has all features of the website. There are no cost like getting a exact name like blogger.

Since they are online people can access the blog where and what time they want.

Blog pages are like online daily and this makes the blog to read easy.

It allows advertising revenue to be generated.

16 Ocak 2019 Çarşamba

how to ensure safe and secure use of specialist communication channel

sosyal medya güveliği

  • You can obtain full authorization from your account by taking advantage of your absent or out of your mind via an application with questions such as taken. Which celebrity should you be your brother “. They can use this method to see or change your account password, even if they can change or comment from your account. The removal process can usually be done in the section ”My applications İzin in the” settings İzin section. For those who are wondering how dir Social Media Security is Provided “, this is an important measure to be taken.

    • Instead of sharing posts you share, you should only share them with the people you want to see. You should not accept requests from followers, follow-up requests.
    •  You should not transfer your private information to social media in order to prevent any hackers from obtaining your personal information.
    • Password managers such as LastPass allow you to manage your login information on the internet, eliminating the need to use the same password for each account and creating secure passwords





    sosyal medya güvenliği ile ilgili görsel sonucu

    Communicating In IT

    wordde nasıl yazım denetimi yapılır.

    Yazarken yazımı denetle seçeneği

    Click File> Options> Provisioning, clear the Check spelling as you type box, and  click OK.


    Yazım veya Dilbilgisi Denetimi Yap komutu
    To re-open the spelling check, repeat the process and check the Check spelling as you type check box.
    
    To check the spelling yourself, click Review> Spelling and Grammar.





























    https://support.office.com/tr-tr/article/yaz%C4%B1m-denetimini-a%C3%A7ma-veya-kapatma-e2805461-77d4-4832-b006-061163c8d01a

    https://nuruysun.weebly.com/sayfa-yap305s305.html