NOV EXAM 2024 Flashcards
What is a online identity?
You’re identity online. Everything we do online creates our online identity. Including the game you play.
What do people do to ‘be their selves’ online?
They create a second account that only a few people can join.
What is your digital footprint?
The traceable activities you did online.
What are three things we should do when posting online?
Think twice before you post.
Use social media privacy settings.
delete your image and whoever you sent it t, to delete it.
What should you not do online?
Overshare
Post when you are emotional
Be overly negative
Only think of yourself.
What should you do to keep your social media safe?
Stay up to date with the latest privacy settings.
What are some general tips to keep yourself safe on social media?
- make sure the account is private.
- set who can tag photos of yourself.
- Specify who can send you messages or communicate with you.
What is copyright?
Copyright is the law that gives you the right to have control over what you create.
What does the copyright law help with?
Protects anything that people create that can be copied or sold.
Can facts be copyrighted?
No they cannot .
What are somethings copyright applies to?
- Written content
- software
- music or sound recordings
- video recordings
- a wide variety of art forms
What is public domain?
Creative works that are no longer under copyright is public domain. that means anyone can use them as they please without getting into legal trouble.
What are the two reasons that creative work may be in the public domain?
- Authors knowingly gave up their copyright.
- The copyright duration has expired.
Does copyright last forever?
No
Why do many artists voluntarily give up their copyright?
They can become well known more quickly.
What do they assign it via?
Creative Commons Zero licence or Educational institutions.
How long do copyright durations last in America and South Africa?
70 years after their death in America and 50 years in South Africa.
What is fair use?
The right to use copyrighted material without the permission in some situations.
What is the name of South Africas fair use?
Fair Dealings
What is Plagiarism
Using someones work a your own or even using someones idea without giving them credit.
What forms can plagiarism take place?
Text, music, pictures, films, art and speeches.
What are the consequences of plagiarism?
in school it can be a warning to giving a zero. In university it can be from a warning to expulsion.
What is The Protection from harassment act?
A law that is designed to help people protect themselves against harassment.
What do you need to prove that you are being harassed?
You need to prove that someone is following, watching, bothering or communicating with you in an ongoing fashion.
What should do if you don’t know if someone is harassing you?
Still apply for a protection order at your local court.
What should you do I someone is harassing you?
apply for a protection order at your local court.
What happens after you apply for protection from harassment?
The court will grant a interim protection order while matter are still being investigated.
What does the harassment protection order do?
forbids the offending person from contacting or physically approaching you.
What is the POPI act?
Protection of Personal Information is a law which aims to protect the privacy of information.
What happens if the requirements of the POPI act are not met?
They can get a fine of up R10000000 and the guilty person can serve a term in prison.
What should you do if you think your personal information has been leaked?
You should report this to the regulator.
What is the RICA act?
A law that aims to control the monitoring of peoples communications.
What does the RICA act forbid you to do?
Forbids anyone from selling communications equipments.
What is the Cybercrimes Bill?
A law which tries to define what cybercrime and cyberterrorism are, and how these crimes can be fought, punished and ultimately prevented.
What are some examples of cybercrime in the bill?
- Unauthorised access to data or hardware.
- Unauthorised interception of communications.
3 cyber fraud.
What penalties are laid down in the cybercrimes bill?
A person can spend up to 15 years or the person may have to pay fine.
How do you create a secure password?
At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Not a word that can be found in a dictionary or the name of a person, character, product, or organization.
What is Variable?
Variable are used to store values.
What the names of the different variables?
- Integer
- Real
- Character
- Boolean
- String
What is an integer?
Whole numbers (0 - infinity) can do calculations
What is Real?
holds numbers with a decimal. code as double.
What are characters?
Symbol or single alphabet.
What is a boolean?
True or False
What is string?
Represents a sequence of characters and starts with a capital letter.
How do I declare each variable?
boolean isMarried = true;
char letter = ‘k’;
string name = “John”;
double = ‘0,3’;
int
What is an algorithm?
Algorithms describe the steps of that must be given to the calculator to perform the calculations.
What is IPO?
Input -> Processing -> Output is used in computer PROGRAMS ALL THE TIME.
What is an input?
Value needed from the user.
What is an Output?
the result that would be displayed.
How do you write an algorithm in a program?
What does a IPO do?
Helps break down the problem or task into smaller parts and the work with the separate parts.
What is the purpose of a flow chart when planning for a program?
A flow chart makes it easy to see exactly what must happen in a program, and un what sequence.