Your SlideShare is downloading. ×
IST
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

IST

271
views

Published on

THIS IS A POWER POINT OF SPAM AND WHAT IT IS AND A SHORT VIDEO ABOUT SPAM AS WELL

THIS IS A POWER POINT OF SPAM AND WHAT IT IS AND A SHORT VIDEO ABOUT SPAM AS WELL


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
271
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. SPAM By Josie, Kate and Taila
  • 2.  
  • 3. 1.Provide a definition of your topic.
    • Spam is generally e-mail advertising for some product sent to a mailing list or newsgroup. In addition to wasting people's time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques.
  • 4. 2.How are databases involved in this topic?
    • Databases are involved in this topic because they are needed in order to be able to send out junk e-mail or Spam to people
  • 5. 3.Describe the type of data stored about individuals in relation to this topic.
    • Name
    • Address
    • E-mail Address
    • Interests
    • Occupation
    • Work address
    • Work number
  • 6. 4.Describe some of the ways in which this data can be misused.
    • This data can be misused in so many different ways for examples
    • Finding out your personal info.
    • Hacking in to your computer
    • Giving you viruses
    • And also Mobile phone spam is directed at the text messaging service of a mobile phone. This can be especially irritating to customers not only for the inconvenience but also because of the fee they may be charged per text message received in some markets. e.g. if you answer one text they keep sending you more and more
    • Mobile phone spam is the main source of spam
  • 7. 5.What are the ethical responsibilities of those maintaining the database?
    • For increasingly more Internet users SPAM is the biggest problem. Not only they are being annoyed, but employers are losing valuable time when staff need to deal with unwanted emails instead of attending to their work. Governments around the world have been trying to stop SPAM by introducing legislation to curb this problem
  • 8. 6.What are the legal responsibilities of those maintaining the database?
    • Identity theft is a crime used to refer to fraud that involves someone pretending to be someone else in order to steal money or get other benefits. The person whose identity is used can suffer various consequences.
  • 9. How many spam letters are you getting on a daily basis
  • 10. Spam
  • 11. SAY NO TO SPAM
  • 12. Video
    • www.wonderhowto.com/how-to/video/how-to-avoid-spam-email-271146/