Two years is another residential solutions in popular media. At present, two pasamarot are used, there are several benefits of แกิด, such as video sharing, as a teaching medium, and as long as they can learn in two manual. Using two pami and penalty at the same time. The consequence of the Internet There are a variety of styles, both as a source of information that is damaged, bad data is not valid, published source trading.Of administrators, including sexual services for sale and distribution of computer viruses.The Internet is a free system. There is no owner makes action difficult to control.Contains information which has lose plenty of published.There are no good data management system enables to search for one is not as good as expected.Growing too fast.Some information may not actually need to look before you might be deceived-refined to persecute from friends.If an Internet players too might lose to learn.Some of the information, it is not suitable for children.While the Internet phone is not available (that is, only the Internet Dial-up.But in today's high speed Internet access will be able to use the telephone to the Internet.)Is used to communicate to terrorist plotters, such as bombings or tempted others to action, to rape?Consumer health. The time it takes for a long time, as the Internet without moving the motion.Impact of Internet usage. An Internet-based service being developed, with a wide variety of applications. Users can access the Internet easily and comfortable at the same time and quickly. Can be used as a tool in the pursuit of knowledge and self education. Professional entertainment, or to meet other needs can help reduce gaps and opportunities to learn, to those who live in the wilderness far. Disabled elderly help achieve academic progress Social changes occurred from the original society arising from the integration of a group of people that are close to each other in geography, a village. Cities in the same country or region to create a new social relationships, also called cyber society, which is a virtual community that was born from the Union of individuals that are interested in. There is a correlation in a. Regardless of the distance, and at different times. Because members of the cyber world can create a new identity that may have personality. The habit of the appearance, or even a different age from the true self, which can use the Internet in a way that is wrong. Cause problems in areas such as 1. health problems and family relations Internet users contact each other for a long time too may cause problems with Internet addiction disorder, which is a kind of mental symptoms. Suspected symptoms, such as a demand for a continuous Internet access even edgy feel depressed for a very long time to fidget when they use the Internet less or stop using thought to have used the Internet to make it feel better, but the reality has been using the Internet for a long time, causing deterioration, such as body aches, according to the. Wrist and tired eyes. It also makes the relationship with the person in the family. Friends or meet people in societies less 2. electronic crime issues. With Internet users through a variety of ways, such as crimes. Security system penetration, can access the computer system to perform any action on the computer system, software or data that is not like the might cause damage business the distorted facts. Stealing personal information by using the Internet or communication channels such as chat. A phone call. In the acquisition of the personal data of individuals by counterfeiting as administrator or administrator is someone close or create a virtual state of emergency to trick the victim happened to trust or fall and reveal personal information unwittingly. How to trick to intent to steal personal information, Alternatively, send e-mail to the recipient with a message, such as a password. The financial information used to access that information without love or to sell to other crimes. Users might be tricked, reply to e-mail spoofing personal information, click on the year r l in pop-up window or e-mail that links to a Web page that was created to look like a real Web-based tool of the organizational or personal information Bank and without realizing it. Know Phishing filtering programs will help screening any suspected Web pages to users, users can choose to use pop-up Windows to display protector in a Web browser or a user adding caution to any personal information by checking the source, it's e ‑ mail before data. Publish all submissions To publish all submissions using a variety of methods, such as through an online game through creating a virus file into the computer system. When a user opens an Internet virus file will show all, or through a search engine by a wide variety of keywords to all. When a user searches for a keyword that matches that have been set, they will all appear in the result of search data. 3. the problem of abuse in the society. From one user on the Internet some people. Create a new identity in contact with others by providing information that is false, such as gender, age, profession, photographs and discussion partners interested in luring a new identity, and the dangerous actions meetings until a serious problem against property or against ourselves. Safety precautions in use in the network. 1. set a password that is difficult to guess, for example, avoid using the nickname the day, month, year, phone. 2. change your password regularly. 3. install and update anti-malware programs from time to time. 4. study of knowledge about security for files. Download from the Internet, such as e-mail or Web pages. So living in a cyber-world creative Benefit to society. There is security in life. The user should select the pursuit of knowledge and the Internet, you know.
การแปล กรุณารอสักครู่..
