MSc-IT Study Material
June 2010 Edition

Computer Science Department, University of Cape Town

Answers and Discussions

Discussions on Activity 4

This probably seemed like an easy question, until you tried to write something down. It is important to realize that this type of task is difficult to carry out. To carry it out in a fair manner, we have to be extremely aware of our own prejudices and be self-critical. It would be very difficult to carry out this type of task without careful consideration of the users' requirements.

Discussions on Activity 5

You might have concluded that there is a wealth of information about Web activities. This information is quite easy to access and it is also quite easy to destroy. We have the ability to control some of the information left on our machines but awareness of how we can do this is required.

These data trails are not always intended to allow activity tracking. History lists allow you to return to a Web page that you forgot to bookmark. Recent document lists allow you to return to tasks that you have been recently engaged in. These facilities are intended to assist us.

Discussions on Activity 6

The difference between the two types of system is in the strategy used to allocate IP addresses. In many company networks IP addresses are allocated either statically, with one machine being given a well-known address which it keeps for its functional lifetime, or dynamically, where a machine may be supplied with a new IP address every time that it boots. If a DHCP server is used, it is possible to keep records as to which machine is allocated which address.

An ISP must use a DHCP server to supply dynamic IP addresses in order to have more clients than available IP addresses. This means that each time somebody logs into their ISP, their IP address is different, making it very difficult to track Web activity.

It is possible to use software that can disconnect and reconnect to the ISP so that our IP address changes even within what could be considered a single Internet session.

If somebody had access to the ISP server, then it might be possible for them to track changes in the IP address as they occur. This has been used by police to catch criminals.

In Windows you can run software to identify the IP address. Whilst you are connected to the Internet, select the Start button, then run and type winipcfg. This will give you your current IP address.

Discussions on Activity 7

  1. Tall, dark, handsome, blonde, pretty, honest, cheerful, short, fun, intelligent, average, nice eyes ? (the list goes on ....!)

  2. You can be all of these: nobody can tell unless you are using a Web cam (as part of video conferencing), or you tell them.

  3. Glasses, big feet, spots, green hair!

  4. You cannot tell if the sender of an e-mail message is wearing glasses!

The time to think about your response. In contrast, this is something that is not always possible when we are talking to a friend. It also can be difficult in a chat room to take time.

Discussions on Activity 8

  1. There are no clear answers. Those who are aware of e-mail systems know that no e-mail can be totally secure. It is possible for somebody who has access to an Internet server to intercept and pass on e-mail. When the system is Web based the risks are greater, as the mail sits on a Web server until it is collected.

    Security could be terrible but still acceptable if the users were aware of the risks and made sure that any sensitive messages were encrypted.

  2. This is your decision. A decision to be cautious is probably a good one.

  3. In many countries there are standards set for advertising. This could be extremely useful for consumers as well as advertisers, who would possibly gain credibility if they had registered their advertisement. In the case study, the claim regarding 'privacy' could be removed.

Solutions to Review Questions

These may not be the ultimate answers to the review questions. You should also check with other resources including your textbooks and the Internet.

  1. By using a strong encryption method.

  2. Platform for Internet Content Selection.

  3. The website can be rated by an independent ratings organisation or the author of the site.

  4. We could inform our Internet Service provider and inform some of the search engines...Etc.

  5. To prevent employees wasting company time accessing material irrelevant to their tasks and to prevent the downloading of material that could compromise the company.

  6. Blocking software contains lists of "objectionable" sites, and prevents them from being accessed.