THE DEVELOPMENT OF CRITICAL THINKING
You are in charge of managing customers orders, usually in the web page of the Company but sometimes by e-mail. You receive the e-mail copied below. What to do? Write a short operating protocol.
The case is cheating, in fact, you have to be extremely careful with these messages that can introduce a malicious program (malware) into your computer that can act by stealing essential company information, or damaging or causing a malfunction in your computer equipment.
The first attitude is to stay alert, suspicious. The indications requested in this case could be organized into several groups
1.- What things should never be done, against a message like this?
2.- How would you distinguish if it is a malicious message or a real customer order?
3.- What security measures would you suggest the company have that would prevent an oversight from bringing malicious software into a computer?
You can search for information on the net with the words “malicious email messages“ or “malicious software” for example, you will find several pages where they clearly explain the above points.
SPECIFIC CONTENTS. PROPOSALS OF THE CENTERS THAT WILL RECEIVE VET STUDENTS
Polymers for 3D printing filaments. How looks the molecular structure of ABS, PLA, PETG?. Why they soften in the die of the printing extruder?
Search in the web for the structure of amorphous and semicrystalline polymers. Are ABS, PLA and PETG amorphous or semicrystalline?
Search in the web for the concepts of glass transition of amorphous polymers and melting in semicrystalline polymers.