assignment 2 shijing xiong. blog blogs are personal websites consisting of regularly updated entries...
Post on 22-Dec-2015
218 views
TRANSCRIPT
![Page 1: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/1.jpg)
Assignment 2Shijing Xiong
![Page 2: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/2.jpg)
Blog Blogs are personal Websites consisting
of regularly updated entries displayed in reverse chronological order. They read like a diary or journal, but with the most recent
entry at the top.
![Page 3: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/3.jpg)
White papers White Papers are statements of
proposed government policy on a particular area of concern and often contain a
statement of policy. Their intention is to spark debate, often inviting comment. They often pave the way for legislation however there is no obligation to act along the lines proposed. White Papers are often produced following the consultation that is initiated
when the Government issues a Green Paper .
![Page 4: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/4.jpg)
Downloads Any data or programs that you transfer
from the Internet to your local PC.To copy a file from a remote computer to
your computer. There are a few methods of doing this on the Internet. HTTP, FTP and e-
mail attachments are the most common.On the Internet, to transfer a file from another computer to your computer by
means of a modem and telephone line (or cable) or network connection.
![Page 5: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/5.jpg)
Reviews ◦ A review is a piece of writing that discusses the author's opinion on a piece of publication, such as
a movie, video game, musical composition, or novel. In addition to the verbalized opinion there
may also be a formalized assessment; for instance, the author may assign the work one to
five stars to indicate its relative merit. More loosely, an author may review current events or items in the news. A compilation of reviews may
itself be called a review.
![Page 6: Assignment 2 Shijing Xiong. Blog Blogs are personal Websites consisting of regularly updated entries displayed in reverse chronological order. They read](https://reader035.vdocuments.mx/reader035/viewer/2022081519/56649d775503460f94a59aac/html5/thumbnails/6.jpg)
Security Security is the effort to create a secure computing
platform, designed so that agents (users or programs) can only perform actions that have been allowed. This involves specifying and implementing
a security policy. The actions in question can be reduced to operations of access, modification and
deletion. Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer
security.