Communication - Chap 10 Flashcards
What are constraints?
Rules used while communicating to ensure security of a message that is sent and to prevent people from writing unacceptable things.
List the five constraints that need to followed while communicating through emails.
- Laws
- Acceptable language
- Copyright
- Security and password protection
- Netiquette
State the seven Email laws.
- Companies must have Privacy policy clearly stated
- Way to “opt out” must be there
- Senders of emails should obtain “opt in” info first in many countries
- Option for unsubscription must be present
- Companies must provide a valid postal address
- Many countries don’t allow “harvesting” of email addresses.
- No false or misleading subject lines are allowed
What are examples of unacceptable content used in email, text messages or online forums?
- Obscene images
- Usage of profane, abusive and blasphemous language
- Racist, exploitative and violent messages
- Use of illegal material in messages
List methods of increasing the security of emails.
- Use a strong password
- Change password frequently
- Use spam filters to remove suspicious emails to a junk folder
- Run an anti- virus and anti- spam software on you computer at all times
What are passive and active email attacks?
Passive- the release of email material to other users without your consent
Active- modification of your messages or denial of service ( i.e., overloading your computer by sending thousands of emails which can make internet access seem impossible).
What is netiquette?
- short form for internet etiquette
- The need to respect other user’s views and display common courtesy while posting views in online discussion groups or when sending emails
List ten rules of netiquette.
- Don’t be abusive
- Don’t send spam
- Be clear with your messages
- Remember that most posts are public and can be read by anyone
- Check your spelling and grammer
- Respect people’s privacy (don’t publish embarassing info)
- Don’t be too compelled to point out errors
- Don’t use CAPITAL LETTERS (seen as shouting)
- Don’t plagiarize (use quotes if needed)
- Don’t use too many emoticons (annoys other users)
What is spam and what are its disdvantages?
Spam is unsolicited email sent over the internet.
Disadvantages:
• uses up people’s time
• annoys people
• uses up valuable bandwidth and slows down the internet
• can have viruses attached or be part of a phishing scam
• clogs up user’s inboxes
What are email groups used for?
- Easier to send out multiple emails if all the IDs are grouped under one name
- Companies can target specific groups for marketing purposes
- Spammers can create email groups (from harvesting email addresses) and send spam email to thousands of people with just one click
- Companies can use email groups to set up meetings (so that everyone is invited and no one is forgotten)
What is the internet used for?
- sending and receiving emails
- chatting online
- transferring files
- browsing the world wide web
Define internet.
It is a concept that connects many networks and relies on physical infrastructure.
Define intranet.
Intranet is a computer network based on internet technology but designed for the internal needs for sharing info within a single organization or company.
List the advantages of adopting intranets rather than internet.
- safer (less chance of hacking or virus)
- specific info available
- certain external links can be blocked
- intranet has better bandwidth
- easier to send out sensitive messages
- it is possible to create an extranet (outsiders can be given partial access)
What is copyright?
Laws that prevent people without permission from copying, printing and sharing confidential documents, emails and other information.
Differences between internet and intranet.
- Internet- International network
- Intranet- Internal restricted access network
- Internet is public, Intranet is private
- Anyone with and ISP account can use internet, intranet can only be used at certain access points and systems.
- Intranet gives only relevant info but internet has info on a huge range of topics
- It is easier to block certain sites on intranet than internet
- Intranet needs pswds and IDs
- Intranet is behind a firewall which is safer.
What is cloud storage?
It is a method of data storage where data is stored on offsite servers. The physical storage covers hundreds of servers all over the world so data can be accessed anywhere.
What is data redundancy?
Data in clouds is stored on more than one server so that clients can access data at all times even during maintenance and repair.
Types of cloud storage.
- Public cloud- customer and cloud storage provider are different companies
- Private cloud- Storage provided behind a firewall. Customer and cloud storage provider are one unit
- Hybrid cloud- Combination of private and public.
Advantages of storing data on a cloud instead of other devices.
- Files can be accessed anytime, on any device, anywhere provided the user has internet access
- No need to carry around storage devices and use only specific devices
- Provides backing up and recovery of data
- Offers almost unlimited storage
Disadvantages of storing data on a cloud instead of other devices.
- If internet connection is slow, accessing files could be hard
- Costs can be high if lots of storage is needed
- Failure of cloud storage can cause permanent loss of even backup data.
Define HTTP and HTTPS.
Hypertext transfer protocol (secure).
Set of rules that must be obeyed when transferring info and data over the internet. Slower to use https because it has encryption.
Web browser
Software that allows users to view web pages on their screen.
• Have homepage
• Can store favourite sites
• Can store history
• Can go backwards and forwards to websites
URL
Uniform Resource Locator - web browsers use URLs to access websites. Alphanumeric format:
protocol://websiteaddress/path/filename
protocol - HTTPS or HTTP
website address - domain host, name and type
(www) (website name) (.com)
FTP
File transfer protocol- network protocol used when transferring files from one comp to another over the internet.
ISP
Internet service provider- a company that provides users with access to the internet for a monthly fee.
Blogs
weB LOGs - It is a list of entries in reverse chronological order. • Regularly updated by single blogger • Usually public • People can read only • Can comment
Wikis
Websites that allow users to create and edit web pages using any web browser. • Anyone can edit info • Many authors • Has document history • Easily edited • Public
Social networking
Sites that allow users to chat, share pics and connect with each other. Users can create profiles.
How can you evaluate the reliability of info on the internet?
- Anyone can set up website
- Some websites are biased and advertise their own products
- Excess advertising could be unreliable
- Websites ending with .ac and .gov are reliable
- Compare info with a book
- Check if their are links to other unreliable sites
- Check testimonials
- Check last update since old websites don’t have reliable info