Monday, April 21, 2014

Section 2.2 to 3.7

I've spent another two and a half hours watching and taking notes on the IT tutorials. Chapter 2.2 discussed different security threats to a computer. Common threats include malware, viruses, rootkits, phishing sites, and worms. Malware can perform many malicious functions, like tracing your keystrokes to look for passwords and pin numbers, or force your computer to participate in Distributed Denial of Service attacks. Viruses are a form of malware that can self-replicate; like a real virus. All of chapter 3 was content on mobile devices and laptops. Section 3.2 focused on mobile device networking, and how Android and Apple phones can be configured to network with your other devices. Chapter 3.4 discussed the differences between tablets and laptops- both in their available services and their hardware. Section 3.7 fully distinguished the differences between the Google Android operating system and Apple's iOS. It also talked about the technology behind device displays, touch screens, accelerometers, and gyroscopes. Including the content today, I now have 12 and a half hours of my Capstone project finished.

No comments:

Post a Comment