1 / 6

TRIO GROUP ONLINE education

TRIO GROUP ONLINE education. Group members: NORUL SYAZAWINI BINTI ZULKIFLI (UK26781) NABIHAH BINTI ARSHAD (UK26251) MUHAMMAD AZWA AMRIE BIN MOHD AMIN (UK26193) Lecturer: DR. NORAIDA BINTI HAJI ALI. Security:

palila
Download Presentation

TRIO GROUP ONLINE education

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TRIO GROUPONLINE education Group members: NORUL SYAZAWINI BINTI ZULKIFLI (UK26781) NABIHAH BINTI ARSHAD (UK26251) MUHAMMAD AZWA AMRIE BIN MOHD AMIN (UK26193) Lecturer: DR. NORAIDA BINTI HAJI ALI

  2. Security: Student should be login before enter the MyLinePortal.The Username for this site was very unique for example, UMTUKxxxxx. This site require IC number as a password. Unethical Might Be Happen: Student might use others login to access the others information. Student can copy others work as the admin of myline allows the text to be viewed.

  3. This page can be access only by UMT student. The username are fixed by admin but the password is user determined. Unethical might happen: Student submit assignment that is plagiarized by others.

  4. Rules : Additional code is require to access and take the training process. Unethical that might happen: Student may cheat during the test. For example, student may use online search engine such google, google scholar to find the answer.

  5. Rule: New user should be registered to login. Unethical might happen: Untrusted health information. Personal information can be compromised.

  6. Rule: User need to use email address to enter the site. Unethical: Personal information are being read out by intruder.

More Related