B061 2.0 Exchanging information Flashcards

1
Q

Name the most common Communication methods?

A
Email 
SMS 
Instant messaging 
Internet telephone 
Video or teleconferencing
Fax 
Internet forums 
Chat rooms 
Bulletin Boards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SMS?

A

Short message service commonly known as texting. This enables short messages to be sent from device to device these often have a character limit of 160. One advantage of this that it is quicker than phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is instant Messaging?

A

This is where a group of people involved in text based internet conversation. IM software can be used on most devices that are capable of connecting to the internet. More advanced versions of the software enable live voice chat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Fax?

A

Two fax machines or computers to send documents via telephone lines. Fax operates by scanning and digitising a document or a diagram and transmitting it via telephone lines. The receiver of the fax can then print the document or the image.
One advantage of faxing is it allows for written instructions to be easily transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Email?

A

Email is common and widely used the advantages of email is that it can be sent and quickly received in comparison to conventional mail and electronic documents can easily be attached.One disadvantage is that email address is not always easy to learn also emails are not always found easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are chat rooms?

A

Chat rooms are where people can communicate online using a chat room where conversations happens in the real time using keyboard entry. These can pose dangers due to the fact that unknown people are able to communicate with others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are internet Forums?

A

These are online discussions they are used by interest groups to post and respond to messages
they are used to post questions and to gain answers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Bulletin Boards?

A

Is an internet-based software applications that allows members to log on to it. They commonly used to upload and download software read news articles and exchange messages with other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Internet Telephone?

A

Where voice communication can be transmitted over the internet. The main advantage of VoIP are cheaper than using conventional telephone networks.
Due to the fact this relatively new technology therefore no services available no power is available also the sound reproduction is often poor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Video Conferencing?

A

This is an example of collaborative working that is based on two or more locations being able to interact with others via multi-way video and audio transmissions simultaneously. The arrival of broadband internet and affordable webcams has had major influence in popularising video conferencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is file sharing and how it is done

A

Files can be uploaded on the internet and then this can be downloaded but often this is a breach of copyright laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to keep files secure when file sharing

A

To set up limited access to files such as read only files permission systems that require password entry due the fact data can be transferred onto other mediums therefore correct protection is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Email Flaming and spamming

A

Flaming is sending hostile or insulting messages to other users.
Spamming means sending bulk messages to other users via email and is normally used for advertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of internet intentional theft

A

Industrial espionage which is the process of coping data then selling it to another rival company this is illegal under the data protection act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are web browsers

A

A web browser are things such as search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Web addresses and what are they more commonly know as

A

URL and are used to access websites the URL is written in HTML

17
Q

How can databases be used in Communication

A

Databases are commonly used to store data therefore can be used to store contact information therefore uses such as virtual address books

18
Q

What is file transfer protocol

A

File transfer protocol is the standard method for transfer from the one host to another via the internet. Typical use is copy large files in zipped format to a virtual learning environment or for a user to update their website by transferring files.

19
Q

What is E-commerce

A

This is the common term for online shopping

20
Q

The advantages of using the internet

A

Large Quantity of information access

Online shopping

Downloading files

Online communication

Easy navigation

21
Q

Disadvantages of the internet

A

Unreliable sources

Closing of the traditional high street

Inappropriate material

Spam

Internet crimes of personal information being stolen

22
Q

How do remote controls work

A

They issue commands from pre-printed buttons also used to enter

23
Q

What is Remote Access Software

A

It can be used by engineer to fix problems but requires remote access software

24
Q

How is Mobile Phone tracking used

A

The phone produces a signal that can be detected by triangulating that signal then this allows for location to be discovered

25
Q

What are cookies

A

Cookies are small text files that monitor use of the internet and contain information such as user ID and site visited history

26
Q

What is Keylogging

A

Keystroke logging is where keys that are pressed on a computer keyboard are recorded to monitor the actions of a computer user. This is normally carried out without the users knowledge and can be used as a hacking tool