Posts

Inkscape images flags

Image
 -Swedish flag -European flag -Senegal flag I do this three flags with InkscapePortable. To do the Swedish flag i see a video that my teacher do to explain how to do step by step. The European flag i follow a document that explain how to do it. Finally i chose senagal flag to do by my self.

Digital image proporties

Image

Cloud security

Image
Cloud security refers to cybersecurity policies, best practices, controls and technologies used to protect applications infraestructure, and data in cloud environments. Cloud computing  is the availability of on-demand computing resources (such as storage and infrastructure) as services over the Internet. It eliminates the need for people and businesses to manage their own physical resources and pay only for what they use. Here are examples of different types of security for your cloud security: Here is a link that have good information of what cloud security is and also solutions to take for prevent this problems: https://www.exabeam.com/explainers/cloud-security/cloud-security-solutions-8-solution-categories-you-must-know/ By taking some preventions taking to have less cases of people that have hacked and lose their data, you mind be interest on these tips. S ome good tips to prevent are: -Requires Secure Passwords: Use the longest password and mix letters, numbers and symbols....

Phishing attacks

Image
Phishing attacks use fraudulent emails, text messages, phone calls, or websites to trick people into sharing sensitive data, downloading malware, or exposing themselves to cybercrime. This is  a technique used by cybercriminals to obtain personal and banking information from users by impersonating a legitimate entity, such as a bank, a social network, a public entity. Here is a diagram that explains very good: Here is a link with good information about what phishing attacks are and also the solutions taken to prevent this problems: https://www.cloudflare.com/es-es/learning/access-management/phishing-attack/   Although there are prevention measures, there are still several users who are scammed. People are becoming increasingly aware of not falling for these scams and ensuring their safety and protection. Some good tips to avoid or solve the problem: -Phishing simulations with AI:   Teach employees the skills necessary to detect real threats. -Reports assets with 1 click:...

Build your own computer

The components that a computer must have are: -Pack hardware -Processors (CPU) -Case -Motherboards. -Graphics cards. -Sound cards. -RAM memories. -Power supply unit. -Fans. -Output devices -Input devices Here you can find a post that have a explicative video that explains step by step how to build your computer: Final computer

Input devices

Image
WHAT ARE? -Keyboard:   is  an input device used to enter characters and functions into the computer system by pressing buttons, or keys . It is the primary device used to enter text. -Mouse:   is  a small device that a computer user pushes across a desk surface in order to point to a place on a display screen and to select one or more actions to take from that position . Here is a video of all input components:

Output devices

Image
WHAT ARE? -Printer:   A printer is  a device that accepts text and graphic output from a computer and transfers the information to paper , usually to standard-size, 8.5" by 11" sheets of paper. -Speakers:    is  a piece of hardware attached to a computer system used to produce sound . The computer's sound card has the signal used to generate the sound from a computer speaker. -Monitor:   It shows the information on your computer as images and texts, which are generated thanks to a video card located inside the computer tower. Here is a video of all this output components: