1- Explain, justifying your examples, in which circumstances you would use:
A) Biometric access systems.
B) Cryptography.
C) A Wide Area Network (WAN)
2- Explain how a teacher can use technology and the Internet to enhance his teaching. What are the drawbacks or risks involved?
3- Describe in as much detail as you can how a hacker gains access to a computer. How can users protect themselves against a hacking attack?
4- Explain how a search engine works. How can the owner of a web site secure a high ranking in Google?
5- Using the example that we observed in a video of a robotic arm that sorts out chocolates and inserts them in their correct wrappings, explain how a robot works and what its essential elements are.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment