operating online Flashcards

1
Q

Define internet?

A

A huge network that links networks of computers all over the world. All the computers use the same protocol. They communicate and send data to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

communicate and send data to each other.

What is the most widely use internet service?

A

The world wide web www which uses the HTTP protocol to allows users to access the interlinked hypertext documents we call a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you need to connect to the internet?

A

A network interface card NIC this allows you to get a cable or Wi-Fi connection. You also need to sign up with an internet service provider ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do you have to consider when selecting an ISP?

A

Cost, bandwidth, download limit, email/web space, security, reliability/support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What the cost of a isp?

A

It charges monthly and a set up cost too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the bandwidth of an ISP?

A

Varies, usually the higher then bandwidth the higher the cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the download limit on an ISP?

A

Some impose a limit per month and charge extra if you go over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the email and web space like on an ISP?

A

most will provide an email adress and prvide spce on their servers for your own websie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

whats the security like on an ISP?

A

broadband, always on, connections vunerable to hackers. the isp should provide you with a firewall, antivirus, antispam and parent controlls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whats the relability and supprt like with an ISP?

A

some never provide the bandwidth they promise and have poor customer care. you can chack this in magazines, forums and user goups online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how is email used for internet communication?

A

sending messages\can access usin glaptiops, phones and tablets ect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how is Im used for internet communication?

A

talking real time by typing messages

helps collaboration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how are blogs used for internet communication?

A

share online diaries, experiences

twitter is a microblog(post 140 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how are social netwroks used for internet communication?

A

websites allow chat, ,messaging, email and file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how might a student/teen use the internet?

A

keep in touch with frineds through email/social netwroks
download/stream music and films
keep up to dat with newn through rss feeds
access schools vle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

why do we need internet privacy? how do we achieve this?

A

you need to protect personal information. you can change settings on social networking sites to restric who can view personal detail, photos and posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are email, IM and voIP examples of?

A

ways of communicating over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are the pros and con of internet communication?

A

:) aids colaboration

:( possibility of over reliance or missuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

whats cloud computing?

A

storing software and data centrally so it can be accessed anywhere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what are the pros and cons of cloud computing/

A

:)dont need to but multiple software licences

:( possible security issues with data stored by a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

whats video confercing?

A

two way audio and video transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what are the pros and cons of video conferencing?

A

:) reduces need to travel

:( people dont communicate as well as face to face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what a vle/

A

virtual learning environemt, a web bsed system that allow studnets, parents and teacher to communicate in a virual school

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are the pros and cons of having a vle?

A

:) students can access tasts and resources updated by teacher and track progress
:( cannot acces if you dont have interne connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what are the pros and cons of news websites?

A

:) use rss feeds
:) can search archives to find old stories
:( possible over reliance rather than using a number of sources for research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what are the pros and cons of user genrated websites (WIKI)?

A

:) up to date info which draws on may people knowledge/expertise
:( any one can add info, inacurate/bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

how can you earn on the inetrnet?

A

vle
news websites
user generated websites

28
Q

what are passwords use for on te internet?

A

to authenicicate

29
Q

what makes a strong password?

A

6 charcters long
mixture of numbers letters and symbols
something not reasily recognisedupper and lower case

30
Q

how can you keep a password secure?

A

dont write it down
change it reguarly
dont tell anyone
dont allow other to watch when typing it in
dont allow browsers to remeber passwords on shared pc
use a variety for differnet sites
encrypt passwords

31
Q

what is a sercurity question?

A

challenge response test.

32
Q

why do we have security question?

A

banks require them aswell as passowrds for more security

identify yourself if you forget your password

33
Q

whats a captcha and why do we have them?

A

to test you are human and not a web robot, they protect systems vunerable to spam

34
Q

give example of personal spaces on the internet?

A
personal websites
online photo albums
blogs
social networking
vle
social media platforms
35
Q

in what ways can you personalise your space online?

A
photos
personal informtion
text and weblinks
likes and dislikes
news feeds
36
Q

in what ways can you control who has access to your personal spaces/

A

make online albums prvate
dont befriends anyone without checking the first
think before you share anything/ info

37
Q

in what ways can socia netwok sits share information about you?

A

strangers coud view images
sites share location via status udates
might give away personal info- date of birth

38
Q

what are the 5 rules of personal spaces and privacy?

A
  1. dont post anything you dont want public
  2. minimise details about your idnetity/whereabouts
  3. keeps usernames/account numbers and passwords secret
  4. only share screen names wth people you know
  5. dont use apps that use GPS to share your location with people you dont know
39
Q

how can you check your online repuation?

A

search your first and last name into a serch engine too see what has been posted about you

40
Q

what can you do if you find somethin online about you that you dont want there?

A

contact the user who posted it and request its taken down or corected

41
Q

what does overt data coection mean?

A

you know the information is being collected

42
Q

give an example of overt data collection

A

opening online accounts and paying online

43
Q

tocheck a website is secure for aying what should you check for?

A

HTTPS

a padlock

44
Q

what is meant by covert data collection?

A

information collected without you knowig or consent

45
Q

give an example of covert data collection?

A

spyware and trojans record key strokes and take pictures of yur screen, theytake personal inof and use it to commit fraud

46
Q

whats identity theft?

A

fraudsters take personal informatin ad use it to make only by pretending to be that perso. they open bank accounts, loans, credit card, passports ect in someone elses name

47
Q

why are cookies helpful?

A

saves you typing pasword in multiple times
website is personalise
cusomised recomendations

48
Q

why should cookies be deletes reguarly?

A

free up space
stop unsolicited personalised adverts
stops peple getting your info

49
Q

how can controlng cookies help prevet missuse of information?

A

cookies can track browsing activity and are a mojor privacy concrn

50
Q

how ca you actally controll cookies/

A

set borwsers to accept or reject cookies

set browser to prompt each time a cookie is offered

51
Q

what should a website that collects information have?

A

a privacy policie that describes the websites uses of cookies and trackers

52
Q

whats phishing?

A

emails sent to get information out of people. thier tone is urgent as they wat you to had over info.

53
Q

how can you distingush a phishing email?

A

impersonal greeting
threat
URL apprears forma bank but doesnt go there when clicked
requests persoanl info

54
Q

how can you prevent spyware

A
use a firewall
use antvirus software
be wary of downloading popular free music and fie sharing programs
be careful
use trusted websites
read security warnings
go off websites your unsure of
55
Q

tht two acts help prtect form data misue?

A

the data protection act 1998 and the computer misuse act

56
Q

what does the data protection act say companies holding data have to do?

A
keep it secure
not ask for unnescary data
not keep it longer than needed
kepp it acurate and up to date
not use it fo other purposs without consent
57
Q

what are your data protecion rights?

A

have the right to look at and check any info someone hold of yours, they can charge you to look at it
you can demand it be amened if incorrect
demand its not used in a way that could harm or diistres you
can demand its not used for direct marketing

58
Q

what is unauthorised access to computer material? yellow section of the computer missuse act

A

this includes logging into annother persons computer with their password without permissin. sealing documents and programs

59
Q

what is unauthorised modification of computer material? organge section of computer missuse act

A

destorying or corrupting annother users files, modigying system files or creating a virus

60
Q

what is unauthorised acces to a computer with intent? red section of computer missuse act

A

gaining acces to financial or admin records using the information to commit an crime or fraud

61
Q

what does copyright protect?

A

the copyright, designs and patents act protects orginal work form being used without permission

62
Q

what counts a orginal work for copyright?

A

literature, music, films, sound recordings, drama, software, images, art

63
Q

why do we have copyright?

A

peope spent time and moany writing and recording these materials they deserve to get paid for them
if profesional cannot make money form their work then they will not be able to create any more

64
Q

what are the cosequences of illegal file sharing?

A

prosecution
yous ISP may ban you form internet use
prison sentence
hugh impact on music and film industry

65
Q

what are some examples of copyright infringement?

A

sharing files over the internet
copying and distrubuting files
pretending soemone elses work is yours

66
Q

if you want to use someone elses picture onyour website what must you do first?

A

not use it without permission form the copyright owner as it would be breaching it. ask the owners permission first before you use it