Digital Technology Flashcards

1
Q

Keylogging is

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing is

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware is

A

software intended to damage a computing system or to take partial control over its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of encoding a plain text message in some secret way is called

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process that reverses encryption, taking a secret message and reproducing the original plain text, is called

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Caesar Cipher is

A

a technique for encryption that shifts the alphabet in the original message by some number of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A cipher is

A

the generic term for a technique (or algorithm) that performs encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Random Substitution Cipher is

A

a technique for encryption that replaces the letters of the original message with other, completely random, letters of the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Frequency Analysis is

A

the study of the frequency of letters or groups of letters in a ciphertext in order to break a substitution cipher.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is NOT a good strategy when creating a password?

A

Reuse passwords across multiple accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Single-Factor Authentication (SFA) is a type of security protection that might ask a user to provide which of the following forms of verification?

A

Password + Password again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two-Factor Authentication (2FA) is a type of security protection that might ask a user to provide which of the following forms of verification?

A

Password + Code sent to your phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Factor Authentication (MFA) is a type of security protection that might ask a user to provide which of the following forms of verification?

A

Password + Code sent to your phone + Fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you do to protect your data?

A

Install updates to system software, install virus scanning software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The additional information that apps and devices exchange along with content, often without the user’s knowledge is known as

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you effectively manage the privacy settings on your mobile apps, computer software, and online accounts?

A

turn off settings that share information that is unnecessary for the service.

Opt out of companies and services sharing your information with third parties.

Read the privacy policy of each website or app that you use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A statement that explains in simple language how an organisation or agency handles your personal information is called a

A

Privacy Policy

18
Q

All of the information about us that can found on the Internet is known as our

A

Digital Footprint

19
Q

A conclusion drawn about you based on the information you share online is called

20
Q

Which of the following describes a potential consequence of not managing your digital footprint effectively?

A

Negative impact on personal reputation and job opportunities.

21
Q

True or False: Any organisation in Australia that is covered by the Privacy Act 1988 must have a Privacy Policy

22
Q

How might advertisers use information that you intentionally or unintentionally share online?

A

To personalise advertisements based on your interests and behaviour.

23
Q

Two or more computers connected together to allow them to communicate is called a

24
Q

What is the name of the first network that only a few people had access to?

25
Q

What is the term for a set of rules that govern communication?

26
Q

What is the central device that connects a number of computers together in one network, through which all messages will pass?

27
Q

What is the device that forwards messages from one network to another network over a large area?

28
Q

What is the device that provides a service to a network, such as storing files?

29
Q

What is the symbol that must be used in an email address?

30
Q

What is the common prefix for website addresses that indicates a secure connection?

31
Q

How do wired and wireless computer networks differ in terms of data transmission?

A

Wired networks use radio waves for data transmission, while wireless networks send data through cables.

32
Q

What is the term for the amount of data that can be moved from one point to another in a given time?

33
Q

What is the smallest unit of data?

34
Q

What is the name of the protocol that splits and assembles the messages sent across the internet?

35
Q

What is the name of the protocol that assigns a unique address to each device on the Internet?

36
Q

What is the unit for measuring bandwidth?

A

Bits per second

37
Q

What is the name of the wireless technology that has the highest bandwidth?

38
Q

What is the technical name of the phenomenon when data arrives at your device slower than it is processed?

39
Q

What is the name of the network that connects millions of devices across the world?

40
Q

What is the name of the small piece of data that is sent across the internet?

41
Q

True or False: Increasing the bandwidth increases the speed of data transfer.

42
Q

True or False: Upload speeds are usually much slower than download speeds.