ICT Flashcards
What is the definition of cloud computing?
Cloud computing is storing and using services online, rather than storing them locally on a device such as a hard drive.
What is email encryption?
A sender can use email encryption to disguise what is inside the email and to protect the information
Advantages of Cloud Computing
- backing up
- independence
- cost
- compatibility
- reliable software
What is an email?
An electronic message sent from one computer to another
Disadvantages of Cloud Computing
- connection
- copyright
- security
- software
- storage
Advantages of email
- messages can be delivered instantly
- easier to send the same message to multiple people
- you can add attachments rather than posting them
What is phishing?
Trying to trick someone into giving out information to a hacker via email
What is ransomeware?
An email attempting to blackmail a user into giving money to a hacker
Advantages of broadband
- fast connection
- allows a phone to be used at the same time
Disadvantages of broadband
- Isn’t available in remote places
- Some companies limit speeds during budy periods
Advantages of fibre broadband
- Fastest possible speed
- Allows a phone to be used at the same time
Disadvantages of fibre broadband
- Isn’t available in remote places
- Some companies limit speeds during busy periods
Wi-Fi advantages
- Internet can be on devices anywhere in your house within range
- Allows portable devices such as tablets and laptops to connect to the Internet
Wi-Fi disadvantages
- Slower than plugging in a device to a router with a cable
- Blackspots mean you may not be able to connect to the Internet
Bluetooth advantages
- No wires needed to exchange data
- Allows you to use devices hands-free
Bluetooth disadvantages
- Only works over short distances
- Transfer speeds are lower than WiFi
Satellite advantages
- Available worldwide
- Allows Internet access to remote, rural areas
Satellite disadvantages
-Very expensive for a fast connection
-Slow compared to fibre or 5G
Mobile communications advantages
- No cables needed
- Fast connection
Mobile communications disadvantages
-Not all devices can use 5G
-5G doesn’t travel as far, so more mobile towers are needed (which is expensive)
Social impacts of autonomous vehicles
- Loss of jobs to bus/lorry/taxi drivers
- Less accidents on the road and lives are saved
- the driver is able to complete other tasks
- Car sales will go down and the need for car salesmen and mechanics will reduce leading to a loss of employment.
Economic impacts on autonomous vehicles
-Haulage companies saving money as they won’t have to pay drivers.
-Less cars on the road and less accidents will mean more efficient journey
-More jobs created for programmers and people developing the technology.
Legal impacts on autonomous vehicles
Who would be at fault if the autonomous vehicle crashed.
Would drivers need insurance.
Data security issues
New laws needed
Moral impacts on autonomous vehicles
- Should autonomous vehicles be programmed to consider age, health, human, animal, when making decisions.
- Should autonomous vehicles be programmed to consider whether a person crossing the road unlawfully should be put at more risk that the occupants of a car.
What is encryption?
ENCRYPTION is the process of changing data so that it is a non-readable format
What is an Operating System?
Software that controls the main operations of the computer
Examples of operating systems
Windows
Linux
Android
Mac
5 main functions of operating systems
Multitasks
User Interfaces
Managing Input and Output
Print Spooling
Security
What is Batch Processing?
A type of processing that automatically processes the same thing over and over again
What is Real Time Processing?
A type of processing that needs to happen automatically otherwise there will be life changing consequences
Examples of batch processing
Payroll
Mail Handling
Examples of real time processing
Air traffic control
Heart rate monitors
What is Transaction processing?
A type of processing that needs to happen quickly and in order
5 non-physical methods of securing data
Passwords
Anti virus software
Access controls
Encryption
Firewalls
5 physical methods of securing data
Locking doors to the ICT room
Preventing flooding to an ICT room
Securing computers to desks so they can’t be stolen
Using security guards to block access to ICT rooms
4 acts that protect data
Electronic Communications Act
Data Protection Act
Regulation of Investigatory Powers Act
Computer Misuse Act