ICT Kw 6 Flashcards

1
Q

What is the internet?

A

The internet is the largest public and worldwide computer network that exists. It is a WAN=(Wide Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 application of the internet are:

A
  1. World wide web (WWW or web)
  2. E-mailing
  3. Communicating with other(chatting)
  4. Exchanging files (downloading and uploading)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WWW?

A

World Wide Web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 requirements to access the internet are:

A
  1. An internet connection, EA,AN,ADSL or cable link
  2. An account with an internet service provider (ISP)
  3. A browser,ea.Microsoft Edge, Mozilla, Firefox,Google Chrome and Safari
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The program with which we can reach the internet is called?

A

A browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With a website we mean

A

a collection of web pages which are connected to each other via hyperlinks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Surfing?

A

Surfing is the clicking on hyperlinks so as to go from one web page or web site to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The 7 parts of the Microsoft Edge screen are:

A
  1. Title bar
  2. Address bar
  3. Search bar
  4. Command bar (or button bar)
  5. Tab
  6. Webpage
  7. Status bar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

By start page we mean:

A

The first page that appears immediately after starting a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To add favorites:

A

~Navigate to the desired website
~Select the 3 dots (…) for Settings and more in the upper right corner of the Edge window
~Select favorites
~Either select add this page to favorites or manage favorites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a computer cookie?

A

A computer cookie is a small text file that contains information about the visited webpage but it may also contain personal information such as your name or email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are pop-ups?

A

Pop-ups are small windows that suddenly appear on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do search engines do?

A

Search engines provide a solution to quickly find the right websites, if you are looking for specific information.
You put search engines to work by specifying one or more keywords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are search engines?

A

The search engines is a huge database looking for Web pages meet the search criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 types of search engines are:

A

~General search engines
~Meta search engines
~Specialized search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The difference between Google and other search engines is that with Google

A

The database is much bigger/larger than other search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a portal?

A

A portal is a website where favorites are collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Wikipedia?

A

Wikipedia is the best known and most extensive online encyclopedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is downloading?

A

The copying of a file or program to the computer from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The benefits of downloading?

A

The benefits of downloading is that one can process the data or make use of the application locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which programs are used for compressed files?

A

The program WinZip and WinRAR are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Downloading often starts with?

A

With the clicking on a hyperlink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The 4 different ways that the downloaded process can continue are:

A
  1. A program will start that will take you through the process of downloading
  2. The file is stored on the computer
  3. The file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The 4 different ways that the downloaded process can continue are:

A
  1. A program will start that will take you through the process of downloading
  2. The file is stored on the computer
  3. The file is opened in a seperate program, but is not yet stored on the computer
  4. Right-click the file and choose ‘save as’ from the Menu that appears
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
To store a web page:
1. Open the edge browser and go to the page you want to save 2. Open the menu in the top right corner and select Print 3. In the printer window, set the printer to Microsoft print to PDF. you might want to adjust the margins and scale 4. Click Print and you are prompted for a filename. The web page is saved to disk as a PDF file
26
It is a good custom to mention to origin of a text that one is using (source mentioning)
~One can use the URL for that | ~On the other hand can copy/paste an URL from a document to the address bar in Microsoft Edge
27
RSS is shorthand for?
Really Simple Syndication
28
RSS-feeds are also called?
Web feeds
29
The name podcast is a concatenation of?
Ipod and broadcast
30
With podcasting one can download an MP3 audio file like a radio program, for free when it is available after that you can?
Copy the file to an MP3 player
31
To access to a secured website one must enter a?
Username and password
32
With online banking you frequently must also enter?
Specified codes
33
Digital certificates entail that:
1. A secured websites uses digital certificates, that is an official statement which establishes (authenticates) identity The certificate guarantees the trustworthiness of a website 2. Certificates are also used for digital signatures under an e-mail message. You can also seal files with a digital certificate, so they cannot be changed inadvertently
34
what is SSL?
Secure Socket Layer
35
With a secure connection what is used for protocol
SSL protocol is used
36
If a website secured with SSL the web address starts with?
https (instead of the usual http)
37
When using https, the data is also?
Encrypted
38
What is encryption?
It ensures that the data is unreadable during transmission
39
With encryption, there are two keys:
A private(secret) key and a public key
40
So three security measures to protect your data on the internet are:
1. Digital certificates 2. SSL (Secure Socket Layer) 3. Encryption
41
What is malware?
Malware is the collective name of malicious software that ends upon the computer via the internet
42
5 ways in which malware can end upon the computer:
1. Downloading a file 2. Opening an attachment to an e-mail message 3. Allowing a cookie 4. Opening a pop-up window 5. A visit to a unreliable or fake website
43
5 ways in which malware can end upon the computer:
1. Downloading a file 2. Opening an attachment to an e-mail message 3. Allowing a cookie 4. Opening a pop-up window 5. A visit to an unreliable or fake website
44
What is a computer virus?
A computer virus is a piece of software that breaks into your computer
45
3 types of viruses and their functioning are:
1. A boot sector virus nestles into the memory when the computer starts up and is continuously active 2. `
46
3 types of viruses and their functioning are:
1. A boot sector virus nestles into the memory when the computer starts up and is continuously active 2. A time bomb virus becomes active at a present time 3. A worm spreads completely independently over a network and directs damage
47
What is a hacker?
a hacker is someone who tries to break into someone else's computer
48
2 examples of hacker tools are?:
rootkit, which is a set of programs to access another computer and a trojan horse this gives the hacker access to the personal data on the computer
49
What is a e-mail?
E-mail is sending digital message over a network
50
The 5 most important benefits of email compared to regular mail are:
1. It is fast and efficient; it takes a few seconds or at most a few minutes before a message is on the other side of the world
51
The 5 most important benefits of email compared to regular mail are:
1. It is fast and efficient; it takes a few seconds or at most a few minutes before a message is on the other side of the world 2. Saving on shipping costs 3. You can combine text with images or sound 4. You can send files as an attachment, such as documents or photos 5. You can simultaneously send a message to several people at the touch of a button
52
The disadvantage of e-mail?
Is that computer viruses can be spread via e-mail that can cause damage to files
53
5 other e-mail applications in addition to the normal use of e-mail are:
1. E-zine: An electronic magazine on which you can subscribe and which is sent by e-mail 2. Newsletter: Information about a specific subject for which you can subscribe and unsubscribe 3. Junk mail: E-mail to which no real value is assigned by the recipient 4. Hoax: Nonsense email message, often with a warning against a threat or an unknown virus 5. Spam: Unwanted e-mail with often dubious content that is sent unsolicited to a large number of recipients
54
Webmail?
Webmail you can handle your email anytime and anywhere in the world
55
What is IM?
IM is the abbreviation for | instant Messaging
56
What is chatting?
A special program you communicate via the internet from the keyboard (real time) with others, anywhere in the world
57
What does SMS stand for?
SMS stands for Short Message Service via this service you can send or receive short messages with a mobile phone
58
Weblog? or just simply a blog
its an online diary in which the author (the blogger) shared information, experiences and opinions with the visitors of the blog
59
Virtual communities?
Are also called online communities are a kind of discussion groups on the internet
60
4 types of virtual communities are:
1. Social networks 2. Forums 3. Chat rooms 4. Online games
61
What is Netiquette?
Is meant the unwritten rules of conduct that are expected from someone in communication via internet van email ~This word is a combination of the words network and etiquette
62
The rules of netiquette include:
1. Use decent language, do not scold 2. Do not make racist, sexual intimidating, discriminating or offensive remarks 3. Do not assume an identity that is misleading to others (do not mislead) 4. Do not infringe on intellectual property of others (respect copyright) 5. Do not enter without permission in other computers (do not hack)
63
The following rules have been added specifically for emailing:
1. Provide a good description in the subject line of your email message 2. Be concise in your reply to a message 3. Avoid side tracks and stories that are irrelevant 4. Prevent you from responding in anger to a message, in anger you easily write things that you later regret(stay calm) 5. Check the spelling of your email message before you send it 6. Do not send unsolicited large quantities of email with the same content (do not send spam) 7. Do not se CAPITAL LETTERS in a reaction, this is understood as scolding
64
The options when making an internet connection via the telephone line are:
1. Public Switched Telephone Network (PSTN) is the old fashioned telephone line 2. ISDN (Integrated Service Digital Network) is the digital version of the telephone connection 3. ADSL (Asymmetric Digital Subscriber Line) is a digital internet connection that uses the normal telephone line (PSTN or ISDN)
65
What is the similarity between the cable network and one of the telephone line options?
is that via the cable you can access the internet just as fast as via ADSL
66
The term broadband indicates what?
It indicates the speed with which data is transported | ~That is why ADSL and cable are called broadband connections
67
What are protocols?
Protocols are clear agreement and rules that are required to allow computers in a network to communicate with each other
68
The 3 most important internet protocols are:
1. TCP/IP: Transmission Control Protocol/ Internet Protocol 2. HTTP: Hyper Text Transfer Protocol 3. FTP: File Transfer Protocol
69
What is a e-mail?
E-mail is a text message that you send electronically to another computer
70
What does CC stand for?
CC stands for Carbon Copy
71
What does BCC stand for?
BCC stands for Blank Carbon Copy
72
E-mail protocols:
1. SMPT (Simple Mail Transfer Protocol) For sending a message 2. POP3 (Post Office Protocol, Version3) For retrieving messages 3. Internet Message Access Protocol (IMAP) For retrieving e-mail instead of POP3
73
To view your email at another location
You can use webmail. that is an email program on your providers server
74
A well known example of webmails are:
Outlook,Gmail,Yahoo
75
A file added to an email is called an?
An attachment
76
An attachment is opened by?
Double clicking n the attachment