Issues Flashcards
How can you stop hackers, phishing and viruses
You can keep your Bluetooth switched off when not in use to stop viruses.
To stop packages you can use firewalls, passwords and can encrypt the information travelling across networks.
You need to be able to identify phishing
Hannah switches off Bluetooth on her phone when not using it. Explain how this improve security
Other uses with Bluetooth devices her within range cannot connect with her device and send unwanted messages to her
John is worried about data security state two ways you can protect his data when using a smart phone
Set a pin/password,
Encrypt data
In the UK what protects our privacy online
The data protection act
Name two threats to our privacy online
Identity theft involve someone pretending to be another person I collecting information about their identity.
Cookies can help advertising relativement products but may be seen as a privacy issue.
How can you stop identity theft and cookies from violating your privacy
You can keep all your personal information safe to stop identity theft. You need to know how to delete a manager cookies
How was privacy achieved
Keeping your personal information safe,
Organisations you give your personal information to giving your information safe
Explain one way of preventing unauthorised users from reading data in a database
It can be encrypted so that it could only be read by people with the encryption key
Some criminals steal personal information from Internet users. List two methods that criminals could use to collect personal information online
Spyware, hacking
Name three security issues for digital devices
Hackers trying to get access to data without permission.
Viruses I designed to be harmful to destroy devices and to spread easily over networks.
Phishing cons people into believing that an email/text is from a valid organisation so they give away their username and password leading to identify theft.
Name three ways of monitoring people using ICT
Geo location information from GPS enabled devices which can track your position.
Your computers IP address provides clues to search engines about your geological location.
Explain how the irresponsible use of GPS data could play social network users at risk
GPS data gives away the users location. This could be dangerous if someone wanted to cause harm to that person as I could go and find them
State two ways in which people may track your communications
Emails,
Social networking
State three positive effects that ICT can have another physical and mental health
Friendships can be built online using social networking.
We can learn new things as information can be accessed easily.
Exercises at home using games such as the wii can improve physical fitness
Name three negative effects ICT can have an office are cool and mental health
Can contribute to obesity due to inactivity.
Eye strains come because by staring at the screen for a long time.
Accident him because by people using mobile phones whilst driving
Repetitive strain injury is associated with playing video games. Speak to you is Mark can prevent the repetitive strain injury and playing games.
Take regular breaks.
Use ergonomically designed equipment.
describe how networks have affected the way people work
People can now work from home using teleworking. People can work easily with people all around the world. The location of an office is now less important.
Describe how networks have affected communication
You can socialise with people all around the world 24/7.
There is no rapid spread of news.
People over using social networking sites.
Describe how networks have affected creativity
People can become content generators for websites e.g. YouTube
Describe how networks have affected shopping
We have rapid access,
Round-the-clock availability,
No need to leave the house
Describe two ways in which networks have an impact on society
Allow people to work from home but communicate easily with other people in offices and all over the world using email and VoIP.
The impact how we buy things we no longer need to leave our home is to go shopping we can buy things on the Internet.
What is the data protection act
It is an act that protects us against misuse of a personal data that may be held by a range of organisations.
What is the computer misuse act
It is on at that covers the misuse of computer equipment and the legal access to files. This makes the following a legal: software piracy, hacking and Fraud
What is the copyright, designs and patents act
It is an act that makes it a criminal fence to copy all still media or other peoples work or ideas
What is the digital economy act
It is on at that starts people illegally downloading media. Internet service providers to collect data about repeat offenders.
Sally buys a music CD from an online store. Raj tell Sally that she can legally copy the CD because Sally has paid for it. Explain why raj is incorrect
Sally’s CD is for her own use. She cannot cope it without the copyright holders permission. It is illegal to copy CDs in this way as stated in the Copyright, designs and patents act
Which act requires ISPs to take action against people who illegally download media
Digital economy act
Causes of unequal access to ICT within the UK
Affordability – those are no income to be not have access to digital technology.
Lack of knowledge and skills – prevents people using ICT.
People living in remote areas may not have access to Internet or mobile phone coverage.
Causes of unequal access to ICT worldwide
Affordability– More wealthy countries have better access to digital technology.
Censorship – some covenants restricting sensor access to digital technology
State two causes of the digital divide in the UK
Lack of knowledge and skills,
Living in remote areas
Helena uses her laptop over extended periods of time. Give to health and safety risks to her ineffective because by this extended use
Bad posture,
Eyestrain free staring at a screen for long periods of time
Debbie’s computer is running slowly and she wants to replace it with a new one. Explain why Debbie should not just from the old computer in the bin.
She throws it in the dustbin it will end up in landfill, which can result in toxic chemicals leaking into nearby soil and water.
Give two ways in which Debbie could dispose of her computer sustainably
Debbie could recycle the parts,
She could donate it to charity
Sally wants to buy a PC. She is worried about the amount of electricity it will use. State two ways in which sally could minimise the use of electricity
She could choose a device of the sleep mode when is not in use.
She could switch it off when not in use.