This presentation is prepared for teaching in "Information Technology for Tourism" course. This is the chapter 3: Introduction for Computer network and Internet, which concern in tourism and hotel business.
This presentation is prepared for teaching in "Information Technology for Tourism" course. This is the chapter 3: Introduction for Computer network and Internet, which concern in tourism and hotel business.
เราสามารถเข้าสู่ internet ได้อย่างไรถ้าเราอยู่ที่บ้านหรือห้อพักของเรา
ต้องใช้อุปกรณ์อะไรบ้าง
หลังการทำงานของอุปกรณ์และคอมพิวเตอร์ในการเชื่อมต่อ internet
ประเภทของอุปกรณ์
เทคโนโลยีการส่งข้อมูล
The document discusses system development and maintenance policies and procedures. It covers topics such as strategic planning, information system organization structures, personnel policies, and disaster recovery. Key models for strategic planning include McFarlan's strategic grid model and Sullivan's infusion-diffusion model. Common information system structures include the traditional centralized organization and federated organization. The document also discusses standards for system development and maintenance including methods, performance, documentation, and project control standards.
The document outlines five core values that define an ethical life: honesty and integrity, the greater good, fairness and justice, responsibility and accountability, and compassion. Each value is described in terms of its meaning and importance. The document concludes by listing the social media and website for an organization called Growinggood that works to promote ethical values.
This document discusses database management systems and different types of databases. It covers the components of a DBMS including the master file, transaction log file, and work file. It also describes the different types of database models like hierarchical, network, and relational databases. The document discusses the SQL language and its uses. Finally, it briefly covers database recovery techniques like full, differential, incremental, and copy backups.
This document provides an overview of different cybersecurity tools and techniques used for reconnaissance, scanning, exploitation, and attacks. It discusses tools for footprinting and reconnaissance like nslookup and web spiders. It also covers port scanning, vulnerabilities in SQL injection and scripting languages, and intrusion detection system evasion. Finally, it mentions sniffing tools, denial of service attacks, vulnerability scanners, and wireless hacking tools.
The document discusses the ASEAN Economic Community (AEC) and the role of technology within it. The AEC aims to create a single market and production base through several measures including eliminating tariffs and non-tariff barriers. It also seeks to develop infrastructure projects like economic corridors to facilitate the flow of goods, services, and skilled labor. Technology and e-commerce will be important for the AEC by helping small businesses engage in cross-border trade and allowing for the digital delivery of services between countries. ASEAN members need to prepare their workforce and business sectors for the new digital opportunities and regulations presented by the AEC.
This document discusses computer-assisted audit tools and techniques (CAATTs) such as generalized audit software (GAS) and specialized audit software. It describes several types of GAS including Nessus, GFI LANguard, Retina, ISS Internet Scanner, X-Scan, SARA, QualysGuard, SAINT, and MBSA. These tools are used for tasks like penetration testing, vulnerability scanning, security auditing, and network mapping. The document also covers manual techniques for network enumeration, including identifying open ports and services, mapping the network structure, and discovering connected devices.
The document discusses the software development life cycle (SDLC) which includes planning, analysis, design, implementation, testing, deployment and maintenance. It describes the different types of testing including unit, integration, acceptance and performance testing. It also covers maintenance activities like repair, adaptive and perfective maintenance. Finally, it discusses cloud computing concepts like infrastructure as a service (IaaS), platform as a service (PaaS) and database as a service (DaaS) and considerations for cloud security.
This document discusses the components of an information and communication technology system, including hardware, software, data, procedures, people, and networks. It also covers information security threats from hackers, crackers, script kiddies and employees. The document outlines four types of asset safeguarding - confidentiality, integrity, availability, and accountability. It proposes a three-tiered approach to information security involving prevention, detection, and correction of threats. Finally, it identifies seven types of information security risks related to management issues and a time-based model of system reliability.