Digital Technology Flashcards
Keylogging is
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Phishing is
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Malware is
software intended to damage a computing system or to take partial control over its operation.
The process of encoding a plain text message in some secret way is called
Encryption
The process that reverses encryption, taking a secret message and reproducing the original plain text, is called
Decryption
A Caesar Cipher is
a technique for encryption that shifts the alphabet in the original message by some number of characters.
A cipher is
the generic term for a technique (or algorithm) that performs encryption.
A Random Substitution Cipher is
a technique for encryption that replaces the letters of the original message with other, completely random, letters of the alphabet.
Frequency Analysis is
the study of the frequency of letters or groups of letters in a ciphertext in order to break a substitution cipher.
Which of the following is NOT a good strategy when creating a password?
Reuse passwords across multiple accounts.
Single-Factor Authentication (SFA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Password again
Two-Factor Authentication (2FA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Code sent to your phone
Multi-Factor Authentication (MFA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Code sent to your phone + Fingerprint
What can you do to protect your data?
Install updates to system software, install virus scanning software
The additional information that apps and devices exchange along with content, often without the user’s knowledge is known as
Metadata
How can you effectively manage the privacy settings on your mobile apps, computer software, and online accounts?
turn off settings that share information that is unnecessary for the service.
Opt out of companies and services sharing your information with third parties.
Read the privacy policy of each website or app that you use.
A statement that explains in simple language how an organisation or agency handles your personal information is called a
Privacy Policy
All of the information about us that can found on the Internet is known as our
Digital Footprint
A conclusion drawn about you based on the information you share online is called
Inference
Which of the following describes a potential consequence of not managing your digital footprint effectively?
Negative impact on personal reputation and job opportunities.
True or False: Any organisation in Australia that is covered by the Privacy Act 1988 must have a Privacy Policy
True
How might advertisers use information that you intentionally or unintentionally share online?
To personalise advertisements based on your interests and behaviour.
Two or more computers connected together to allow them to communicate is called a
network
What is the name of the first network that only a few people had access to?
ARPANET
What is the term for a set of rules that govern communication?
Protocols
What is the central device that connects a number of computers together in one network, through which all messages will pass?
Hub
What is the device that forwards messages from one network to another network over a large area?
Router
What is the device that provides a service to a network, such as storing files?
Server
What is the symbol that must be used in an email address?
@
What is the common prefix for website addresses that indicates a secure connection?
https://
How do wired and wireless computer networks differ in terms of data transmission?
Wired networks use radio waves for data transmission, while wireless networks send data through cables.
What is the term for the amount of data that can be moved from one point to another in a given time?
Bandwidth
What is the smallest unit of data?
Bit
What is the name of the protocol that splits and assembles the messages sent across the internet?
TCP
What is the name of the protocol that assigns a unique address to each device on the Internet?
IP
What is the unit for measuring bandwidth?
Bits per second
What is the name of the wireless technology that has the highest bandwidth?
5G
What is the technical name of the phenomenon when data arrives at your device slower than it is processed?
Buffering
What is the name of the network that connects millions of devices across the world?
Internet
What is the name of the small piece of data that is sent across the internet?
Packet
True or False: Increasing the bandwidth increases the speed of data transfer.
FALSE
True or False: Upload speeds are usually much slower than download speeds.
True