Communication - Chap 10 Flashcards

1
Q

What are constraints?

A

Rules used while communicating to ensure security of a message that is sent and to prevent people from writing unacceptable things.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the five constraints that need to followed while communicating through emails.

A
  • Laws
  • Acceptable language
  • Copyright
  • Security and password protection
  • Netiquette
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State the seven Email laws.

A
  • Companies must have Privacy policy clearly stated
  • Way to “opt out” must be there
  • Senders of emails should obtain “opt in” info first in many countries
  • Option for unsubscription must be present
  • Companies must provide a valid postal address
  • Many countries don’t allow “harvesting” of email addresses.
  • No false or misleading subject lines are allowed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of unacceptable content used in email, text messages or online forums?

A
  • Obscene images
  • Usage of profane, abusive and blasphemous language
  • Racist, exploitative and violent messages
  • Use of illegal material in messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List methods of increasing the security of emails.

A
  • Use a strong password
  • Change password frequently
  • Use spam filters to remove suspicious emails to a junk folder
  • Run an anti- virus and anti- spam software on you computer at all times
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are passive and active email attacks?

A

Passive- the release of email material to other users without your consent
Active- modification of your messages or denial of service ( i.e., overloading your computer by sending thousands of emails which can make internet access seem impossible).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is netiquette?

A
  • short form for internet etiquette
  • The need to respect other user’s views and display common courtesy while posting views in online discussion groups or when sending emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List ten rules of netiquette.

A
  • Don’t be abusive
  • Don’t send spam
  • Be clear with your messages
  • Remember that most posts are public and can be read by anyone
  • Check your spelling and grammer
  • Respect people’s privacy (don’t publish embarassing info)
  • Don’t be too compelled to point out errors
  • Don’t use CAPITAL LETTERS (seen as shouting)
  • Don’t plagiarize (use quotes if needed)
  • Don’t use too many emoticons (annoys other users)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spam and what are its disdvantages?

A

Spam is unsolicited email sent over the internet.

Disadvantages:
• uses up people’s time
• annoys people
• uses up valuable bandwidth and slows down the internet
• can have viruses attached or be part of a phishing scam
• clogs up user’s inboxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are email groups used for?

A
  • Easier to send out multiple emails if all the IDs are grouped under one name
  • Companies can target specific groups for marketing purposes
  • Spammers can create email groups (from harvesting email addresses) and send spam email to thousands of people with just one click
  • Companies can use email groups to set up meetings (so that everyone is invited and no one is forgotten)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the internet used for?

A
  • sending and receiving emails
  • chatting online
  • transferring files
  • browsing the world wide web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define internet.

A

It is a concept that connects many networks and relies on physical infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define intranet.

A

Intranet is a computer network based on internet technology but designed for the internal needs for sharing info within a single organization or company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List the advantages of adopting intranets rather than internet.

A
  • safer (less chance of hacking or virus)
  • specific info available
  • certain external links can be blocked
  • intranet has better bandwidth
  • easier to send out sensitive messages
  • it is possible to create an extranet (outsiders can be given partial access)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is copyright?

A

Laws that prevent people without permission from copying, printing and sharing confidential documents, emails and other information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Differences between internet and intranet.

A
  • Internet- International network
  • Intranet- Internal restricted access network
  • Internet is public, Intranet is private
  • Anyone with and ISP account can use internet, intranet can only be used at certain access points and systems.
  • Intranet gives only relevant info but internet has info on a huge range of topics
  • It is easier to block certain sites on intranet than internet
  • Intranet needs pswds and IDs
  • Intranet is behind a firewall which is safer.
17
Q

What is cloud storage?

A

It is a method of data storage where data is stored on offsite servers. The physical storage covers hundreds of servers all over the world so data can be accessed anywhere.

18
Q

What is data redundancy?

A

Data in clouds is stored on more than one server so that clients can access data at all times even during maintenance and repair.

19
Q

Types of cloud storage.

A
  • Public cloud- customer and cloud storage provider are different companies
  • Private cloud- Storage provided behind a firewall. Customer and cloud storage provider are one unit
  • Hybrid cloud- Combination of private and public.
20
Q

Advantages of storing data on a cloud instead of other devices.

A
  • Files can be accessed anytime, on any device, anywhere provided the user has internet access
  • No need to carry around storage devices and use only specific devices
  • Provides backing up and recovery of data
  • Offers almost unlimited storage
21
Q

Disadvantages of storing data on a cloud instead of other devices.

A
  • If internet connection is slow, accessing files could be hard
  • Costs can be high if lots of storage is needed
  • Failure of cloud storage can cause permanent loss of even backup data.
22
Q

Define HTTP and HTTPS.

A

Hypertext transfer protocol (secure).
Set of rules that must be obeyed when transferring info and data over the internet. Slower to use https because it has encryption.

23
Q

Web browser

A

Software that allows users to view web pages on their screen.
• Have homepage
• Can store favourite sites
• Can store history
• Can go backwards and forwards to websites

24
Q

URL

A

Uniform Resource Locator - web browsers use URLs to access websites. Alphanumeric format:

protocol://websiteaddress/path/filename
protocol - HTTPS or HTTP
website address - domain host, name and type
(www) (website name) (.com)

25
Q

FTP

A

File transfer protocol- network protocol used when transferring files from one comp to another over the internet.

26
Q

ISP

A

Internet service provider- a company that provides users with access to the internet for a monthly fee.

27
Q

Blogs

A
weB LOGs - It is a list of entries in reverse chronological order. 
• Regularly updated by single blogger
• Usually public
• People can read only
• Can comment
28
Q

Wikis

A
Websites that allow users to create and edit web pages using any web browser.
• Anyone can edit info
• Many authors
• Has document history
• Easily edited
• Public
29
Q

Social networking

A

Sites that allow users to chat, share pics and connect with each other. Users can create profiles.

30
Q

How can you evaluate the reliability of info on the internet?

A
  • Anyone can set up website
  • Some websites are biased and advertise their own products
  • Excess advertising could be unreliable
  • Websites ending with .ac and .gov are reliable
  • Compare info with a book
  • Check if their are links to other unreliable sites
  • Check testimonials
  • Check last update since old websites don’t have reliable info