Wednesday, November 27, 2024

Exercices 41 and 42

 41.- Think you want to print out a photograph with a size of DIN A4: 210 × 297 mm maintaining a printing quality of 200 dpi. Which resolution would the image need?

Is  enough with 1654x2338 pixels


42.- Which resolution would the same picture need to have a 300 dpi picture?

This means if an image is 10 inches in width by 10 inches in height at 300 DPI, your pixel dimensions need to be 3000px x 3000px. In other words, you need to multiply the print size by 300 to find the right pixel dimensions (e.g. 3000px x 3000px) to provide 300 DPI.

Wednesday, November 6, 2024

Digital security. Second problem

 PROBLEM

My brother always uses public conections, like public libraries or cultural centers, to do his online works. He has an important job and manage sensible information about clients and business. I think this is not a good idea to use public wi-fi connections. 


PROBLEMS OF USE PUBLIC CONNECTIONS

Unencrypted networks

Many public Wi-Fi hotspots are unencrypted networks that transmit data in plain text, making it vulnerable to cybercriminals with the right tools. Hackers on the same network can intercept your online activities, including banking information, login credentials, and personal messages.

Malicious hotspots

Malicious hotspots, or rogue access points, are deceptive networks that trick users into connecting by mimicking legitimate Wi-Fi names. For instance, if you were staying at the Goodnight Inn and wanted to connect to the hotel’s Wi-Fi, you might mistakenly select “GoodNight Inn” (with a capital N) instead of the correct network. By doing so, you risk connecting to an “evil twin” network set up by cybercriminals to access your internet traffic.

Man-in-the-middle attacks

A man-in-the-middle attack is a cyberattack where an intruder secretly positions themselves between two communicating parties, such as a user and an application. This allows them to intercept, eavesdrop on, or manipulate communications.

On unsecured public Wi-Fi networks, attackers can capture data packets more easily, potentially giving them full access to sensitive information like login credentials, credit card numbers, or personal messages. In the case of session hijacking, they may also alter the data, leading to fraudulent activities or data breaches.


Here you can find more information


TYPES TO PREVENT USE PUBLIC CONNECTIONS


Disable auto Wi-Fi connect. If your phone automatically joins surrounding networks, you can disable this function in your settings. Avoid linking to unknown or unrecognized networks.

Turn off Wi-Fi when done. Your computer or phone can still transmit data even when you are not using it. Be sure to disable your Wi-Fi from the network when you are finished using it.

Avoid financial transactions. If you must use public Wi-Fi, don’t conduct a sensitive transaction such as banking, shopping, or any kind of activity that requires your social security or credit card numbers or password use. Wait until you get to a secured home network to conduct personal business.

Look for the HTTPS. Fake or unsecured websites will not have the HTTPS in their address. Also, look for the little lock icon in the address bar to confirm a secure connection.

Secure your devices. Use a personal VPN as an extra layer of security against hackers and malware.

Clic here to vote the best tip 👇 


Wednesday, October 30, 2024

Digital security. First problem

PROBLEM

 The problem is that my telephone has a type of malicious software that makes me believe that my cell has a virus. Sometimes, it will fool me into believing that my security measures are old. In turn, they offer new updates for my security settings. 


DESCRIPTION OF THE PROBLEM.

Any malicious program or code that damages systems is referred to as malware, or "malicious software," in general.

Malware, which is hostile, invasive, and purposefully unpleasant, aims to infiltrate, harm, or disable computers, computer systems, networks, tablets, and mobile devices. It frequently takes over some or all of a device's functionality. It disrupts regular functioning, just like the human illness does.

The malware has a variety of causes. The infection may be designed to make money off of the user, interfere with their work, express political views, or just be ostentatious. Malware can steal, encrypt, or erase your data, change, or take over a basic computer, but it cannot harm the actual hardware of systems or network equipment may steal, encrypt, or erase their data, change or conceal the computer's fundamental functions, and spy on their information activities without their knowledge or consent.

Here you can find more information.


Link of a video


SOLUTIONS OR POSIBLE SOLUTIONS

In my opinion, the best solution is go to a center of mobile phones and repair

Other solution is restaure the mobile

Also you can put an antivirus to prevent this things 

Maybe you can buy and other mobile if you have money, but it is not the best option

To prevent this you can be more careful in the pages that you enter


Clic here to vote the best tip 👇

Wednesday, October 16, 2024

Conclusion of the total price

Motherboard: 104,18 € 

Case: 79,00 € 

CPU: 184,00 €

Memory RAM: 60,10 €

Storage device: 509,95 €

Power supply: 15,98 €

Monitor: 224,99€

Graphic card: 232,78 €

 

TOTAL PRICE: 1410.98

Build an own computer

 IMPORTANT COMPONENTS OF A COMPUTER

1. Motherboard

The motherboard is the main circuit board that connects all of your hardware components, power supply and graphics cards together. It is the most important component to consider when building a computer.

2. Case 

The computer case is what makes work the motherboard. Itself can be constructed from any material that still allows the internal devices to be supported.

3. Central processing unit (CPU)

The logic circuitry that reacts to and interprets the fundamental commands that power a computer is called a processor (CPU). Since it interprets the majority of computer commands, the CPU is regarded as the primary and most important integrated circuits (IC) chip in a computer.

4.  Memory RAM

RAM memory is the main memory of a device, the one where the data of the programs you are using at the moment is temporarily stored.

5. Storage device 

The storage unit is a part of the computer system that is used to store the information and instructions to be processed. A storage device is an integral part of computer hardware that stores information/data to process the result of any computational work.

6. Power supply

 A power supply is used to convert mains current into a form of energy suitable for the components of an electronic device or system.

7.  Monitor

 The monitor or screen is an output device that allows us to view through an interface both the information entered by the user and the information returned after being processed by the computer.

8. Graphic card

 A graphics card, also known as a video card or graphics processing unit (GPU), is a hardware component responsible for rendering and displaying images, videos, and animations on your computer monitor.


TOTAL PRICE


 


Flags