10. Communication Flashcards
What are constraints?
Rules used while communicating to ensure security of a message that is sent and to prevent people from writing unacceptable things.
List the five constraints that need to followed while communicating through emails.
Laws
Acceptable language
Copyright
Security and password protection
Netiquette
State the seven Email laws.
Companies must have Privacy policy clearly stated
Way to “opt out” must be there
Senders of emails should obtain “opt in” info first in many countries
Option for unsubscription must be present
Companies must provide a valid postal address
Many countries don’t allow “harvesting” of email addresses.
No false or misleading subject lines are allowed
What are examples of unacceptable content used in email, text messages or online forums?
Obscene images
Usage of profane, abusive and blasphemous language
Racist, exploitative and violent messages
Use of illegal material in messages
List methods of increasing the security of emails.
Use a strong password
Change password frequently
Use spam filters to remove suspicious emails to a junk folder
Run an anti- virus and anti- spam software on you computer at all times
What are passive and active email attacks?
Passive- the release of email material to other users without your consent
Active- modification of your messages or denial of service ( i.e., overloading your computer by sending thousands of emails which can make internet access seem impossible).
What is netiquette?
short form for internet etiquette
The need to respect other user’s views and display common courtesy while posting views in online discussion groups or when sending emails
List ten rules of netiquette.
Don’t be abusive
Don’t send spam
Be clear with your messages
Remember that most posts are public and can be read by anyone
Check your spelling and grammer
Respect people’s privacy (don’t publish embarassing info)
Don’t be too compelled to point out errors
Don’t use CAPITAL LETTERS (seen as shouting)
Don’t plagiarize (use quotes if needed)
Don’t use too many emoticons (annoys other users)
What is spam and what are its disdvantages?
Spam is unsolicited email sent over the internet.
Disadvantages:
* uses up people’s time
* annoys people
* uses up valuable bandwidth and slows down the internet
* can have viruses attached or be part of a phishing scam
* clogs up user’s inboxes
What are email groups used for?
Easier to send out multiple emails if all the IDs are grouped under one name
Companies can target specific groups for marketing purposes
Spammers can create email groups (from harvesting email addresses) and send spam email to thousands of people with just one click
Companies can use email groups to set up meetings (so that everyone is invited and no one is forgotten)
What is the internet used for?
sending and receiving emails
chatting online
transferring files
browsing the world wide web
Define internet.
It is a concept that connects many networks and relies on physical infrastructure.
Define intranet.
Intranet is a computer network based on internet technology but designed for the internal needs for sharing info within a single organization or company.
List the advantages of adopting intranets rather than internet.
safer (less chance of hacking or virus)
specific info available
certain external links can be blocked
intranet has better bandwidth
easier to send out sensitive messages
it is possible to create an extranet (outsiders can be given partial access)
What is copyright?
Laws that prevent people without permission from copying, printing and sharing confidential documents, emails and other information.
Differences between internet and intranet.
Internet- International network
Intranet- Internal restricted access network
Internet is public, Intranet is private
Anyone with and ISP account can use internet, intranet can only be used at certain access points and systems.
Intranet gives only relevant info but internet has info on a huge range of topics
It is easier to block certain sites on intranet than internet
Intranet needs pswds and IDs
Intranet is behind a firewall which is safer.
Define HTTP and HTTPS.
Hypertext transfer protocol (secure).
Set of rules that must be obeyed when transferring info and data over the internet. Slower to use https because it has encryption.
Web browser
Software that allows users to view web pages on their screen.
* Have homepage
* Can store favourite sites
* Can store history
* Can go backwards and forwards to websites
URL
Uniform Resource Locator - web browsers use URLs to access websites. Alphanumeric format:
protocol://websiteaddress/path/filename
protocol - HTTPS or HTTP
website address - domain host, name and type
(www) (website name) (.com)
FTP
File transfer protocol- network protocol used when transferring files from one comp to another over the internet.
ISP
Internet service provider- a company that provides users with access to the internet for a monthly fee.
Blogs
weB LOGs - It is a list of entries in reverse chronological order.
* Regularly updated by single blogger
* Usually public
* People can read only
* Can comment
Wikis
Websites that allow users to create and edit web pages using any web browser.
* Anyone can edit info
* Many authors
* Has document history
* Easily edited
* Public
Social networking
Sites that allow users to chat, share pics and connect with each other. Users can create profiles.
How can you evaluate the reliability of info on the internet?
Anyone can set up website
Some websites are biased and advertise their own products
Excess advertising could be unreliable
Websites ending with .ac and .gov are reliable
Compare info with a book
Check if their are links to other unreliable sites
Check testimonials
Check last update since old websites don’t have reliable info
What are Google, Internet & Chrome?
Web Browsers