VoiceThread


 * VoiceThread Assignment:**
 * 1) **View each VoiceThread**
 * 2) **Click on the Discussion Tab, click on the appropriate topic link and post your full name in the subject window**
 * 3) **Name 2 new facts that you learned from each VoiceThread.**

Ricky Keeler and Paul Fallon [] Network Security Michael Collins & Lindsay Conrad [] Proxy Servers Urata Blakaj, Lia Carlson [] Environmental Issues and Technology Kevin Driscoll and Jillian Christy [] Computer Surveillance Casey Kirton, Mitchell Lovell [] Disabled People and the Web Tobias Laforest & Jessica Joseph [] IT Health Products Miguel Orea & Alyssa Johnson [] Encryption Sara Calcagno Rebecca Jones [] Network Data Transmission Myles Thomas and Christina DelPinto [] Digital in the Age of Saving Information Anchana Murugathasan & Asia Gaddy [] Software Piracy & Copyright Infringement


 * __Voice Thread Topics__**


 * 1) **Multimedia**: Discuss types of images movies and text. How are they stored, advantages, disadvantages of transferring these files over a network and editing them.
 * 2) **Encryption, HTTPS and SSL**: What is it? How is it done: provide a detailed example. Where is it used? Advantages, disadvantages. Name some types of encryption software that a user could use to protect data transferred over the network.
 * 3) **Network data transmissions**. Explain how data is transferred over the Internet. Talk about different protocols, packets and give a detailed example of how data is transferred over the Internet (HTTP). Discuss vulnerabilities.
 * 4) **Network Security**. Define, LAN, WAN, WLAN, VPN and wireless networks. Discuss what an administrator would do toprotect a network. Discuss the vulnerabilities of a wireless network. Can you take measure to secure your data on a wireless network? Is you data ever safe on a wireless network?
 * 5)  **Software piracy and copyright infringement on text, images and other on the web.** Define piracy, shareware, freeware, commercial digital products give examples and state issues. Define “site license”. When is it legal to take digital data when is it not? How do we decipher the difference? What are the copyright laws on the web?
 * 6) **Environmental issues and technology. **Name a number of our modern-day electronics? List the environmental issues relating to manufacturing and improperly disposing of these products. Where do they go? How can they be recyled? How can they be manufactured to be more environmentally friendly? What is build-in obsolescence? Any suggested solutions? Standards?
 * 7) **The disabled and the Web.** Define disabled, the W3C and GUI. What standards has the W3C set for web developers? State the different disabilities and discuss the technology(ies) that are available for them to use the web and computers. What technologies are available or being developed for quadriplegics? Discuss the cost or these interfaces and software requirements.
 * 8) **IT products and Health Issues.** State the modern day electronic and the potential health issues that have been linked to that product. What are the treatments? Discuss the environmental pollutes related to manufacturing these products as well. State solutions. Can we change our habits to minimize the potential health risks?
 * 9) [|Computer, network & email monitoring/surveillance or spying software –][|Define and explain] 'intrusion detection system' (IDS), net-petrol. Why is it needed? Give examples of software products (ex. Keylogger, cookies, etc.) that spy on your operations. Discuss how cookies work. Discuss parental control, the web and products available.
 * 10) ** Saving history in the //Age of Inf// //ormation// using digital data** – Define and discuss issues and concerns relating to saving history with digital media. Is it fragile? Does it have a shelf-life? Will it become obsolete? Discuss upward incompatibility, data storage, data obsolescence, potential data loss, etc. What are the solutions, if any?
 * 11) **Proxy Servers** – Define a proxy server. Discuss the many types and functions of the proxy server. Are they any risks in using a proxy server?