operating online Flashcards
Define internet?
A huge network that links networks of computers all over the world. All the computers use the same protocol. They communicate and send data to each other.
communicate and send data to each other.
What is the most widely use internet service?
The world wide web www which uses the HTTP protocol to allows users to access the interlinked hypertext documents we call a web page.
What do you need to connect to the internet?
A network interface card NIC this allows you to get a cable or Wi-Fi connection. You also need to sign up with an internet service provider ISP
What do you have to consider when selecting an ISP?
Cost, bandwidth, download limit, email/web space, security, reliability/support
What the cost of a isp?
It charges monthly and a set up cost too
What is the bandwidth of an ISP?
Varies, usually the higher then bandwidth the higher the cost.
What is the download limit on an ISP?
Some impose a limit per month and charge extra if you go over.
what is the email and web space like on an ISP?
most will provide an email adress and prvide spce on their servers for your own websie
whats the security like on an ISP?
broadband, always on, connections vunerable to hackers. the isp should provide you with a firewall, antivirus, antispam and parent controlls
whats the relability and supprt like with an ISP?
some never provide the bandwidth they promise and have poor customer care. you can chack this in magazines, forums and user goups online
how is email used for internet communication?
sending messages\can access usin glaptiops, phones and tablets ect
how is Im used for internet communication?
talking real time by typing messages
helps collaboration
how are blogs used for internet communication?
share online diaries, experiences
twitter is a microblog(post 140 characters)
how are social netwroks used for internet communication?
websites allow chat, ,messaging, email and file sharing
how might a student/teen use the internet?
keep in touch with frineds through email/social netwroks
download/stream music and films
keep up to dat with newn through rss feeds
access schools vle
why do we need internet privacy? how do we achieve this?
you need to protect personal information. you can change settings on social networking sites to restric who can view personal detail, photos and posts
what are email, IM and voIP examples of?
ways of communicating over the internet
what are the pros and con of internet communication?
:) aids colaboration
:( possibility of over reliance or missuse
whats cloud computing?
storing software and data centrally so it can be accessed anywhere
what are the pros and cons of cloud computing/
:)dont need to but multiple software licences
:( possible security issues with data stored by a third party
whats video confercing?
two way audio and video transmissions
what are the pros and cons of video conferencing?
:) reduces need to travel
:( people dont communicate as well as face to face
what a vle/
virtual learning environemt, a web bsed system that allow studnets, parents and teacher to communicate in a virual school
what are the pros and cons of having a vle?
:) students can access tasts and resources updated by teacher and track progress
:( cannot acces if you dont have interne connection
what are the pros and cons of news websites?
:) use rss feeds
:) can search archives to find old stories
:( possible over reliance rather than using a number of sources for research
what are the pros and cons of user genrated websites (WIKI)?
:) up to date info which draws on may people knowledge/expertise
:( any one can add info, inacurate/bias
how can you earn on the inetrnet?
vle
news websites
user generated websites
what are passwords use for on te internet?
to authenicicate
what makes a strong password?
6 charcters long
mixture of numbers letters and symbols
something not reasily recognisedupper and lower case
how can you keep a password secure?
dont write it down
change it reguarly
dont tell anyone
dont allow other to watch when typing it in
dont allow browsers to remeber passwords on shared pc
use a variety for differnet sites
encrypt passwords
what is a sercurity question?
challenge response test.
why do we have security question?
banks require them aswell as passowrds for more security
identify yourself if you forget your password
whats a captcha and why do we have them?
to test you are human and not a web robot, they protect systems vunerable to spam
give example of personal spaces on the internet?
personal websites online photo albums blogs social networking vle social media platforms
in what ways can you personalise your space online?
photos personal informtion text and weblinks likes and dislikes news feeds
in what ways can you control who has access to your personal spaces/
make online albums prvate
dont befriends anyone without checking the first
think before you share anything/ info
in what ways can socia netwok sits share information about you?
strangers coud view images
sites share location via status udates
might give away personal info- date of birth
what are the 5 rules of personal spaces and privacy?
- dont post anything you dont want public
- minimise details about your idnetity/whereabouts
- keeps usernames/account numbers and passwords secret
- only share screen names wth people you know
- dont use apps that use GPS to share your location with people you dont know
how can you check your online repuation?
search your first and last name into a serch engine too see what has been posted about you
what can you do if you find somethin online about you that you dont want there?
contact the user who posted it and request its taken down or corected
what does overt data coection mean?
you know the information is being collected
give an example of overt data collection
opening online accounts and paying online
tocheck a website is secure for aying what should you check for?
HTTPS
a padlock
what is meant by covert data collection?
information collected without you knowig or consent
give an example of covert data collection?
spyware and trojans record key strokes and take pictures of yur screen, theytake personal inof and use it to commit fraud
whats identity theft?
fraudsters take personal informatin ad use it to make only by pretending to be that perso. they open bank accounts, loans, credit card, passports ect in someone elses name
why are cookies helpful?
saves you typing pasword in multiple times
website is personalise
cusomised recomendations
why should cookies be deletes reguarly?
free up space
stop unsolicited personalised adverts
stops peple getting your info
how can controlng cookies help prevet missuse of information?
cookies can track browsing activity and are a mojor privacy concrn
how ca you actally controll cookies/
set borwsers to accept or reject cookies
set browser to prompt each time a cookie is offered
what should a website that collects information have?
a privacy policie that describes the websites uses of cookies and trackers
whats phishing?
emails sent to get information out of people. thier tone is urgent as they wat you to had over info.
how can you distingush a phishing email?
impersonal greeting
threat
URL apprears forma bank but doesnt go there when clicked
requests persoanl info
how can you prevent spyware
use a firewall use antvirus software be wary of downloading popular free music and fie sharing programs be careful use trusted websites read security warnings go off websites your unsure of
tht two acts help prtect form data misue?
the data protection act 1998 and the computer misuse act
what does the data protection act say companies holding data have to do?
keep it secure not ask for unnescary data not keep it longer than needed kepp it acurate and up to date not use it fo other purposs without consent
what are your data protecion rights?
have the right to look at and check any info someone hold of yours, they can charge you to look at it
you can demand it be amened if incorrect
demand its not used in a way that could harm or diistres you
can demand its not used for direct marketing
what is unauthorised access to computer material? yellow section of the computer missuse act
this includes logging into annother persons computer with their password without permissin. sealing documents and programs
what is unauthorised modification of computer material? organge section of computer missuse act
destorying or corrupting annother users files, modigying system files or creating a virus
what is unauthorised acces to a computer with intent? red section of computer missuse act
gaining acces to financial or admin records using the information to commit an crime or fraud
what does copyright protect?
the copyright, designs and patents act protects orginal work form being used without permission
what counts a orginal work for copyright?
literature, music, films, sound recordings, drama, software, images, art
why do we have copyright?
peope spent time and moany writing and recording these materials they deserve to get paid for them
if profesional cannot make money form their work then they will not be able to create any more
what are the cosequences of illegal file sharing?
prosecution
yous ISP may ban you form internet use
prison sentence
hugh impact on music and film industry
what are some examples of copyright infringement?
sharing files over the internet
copying and distrubuting files
pretending soemone elses work is yours
if you want to use someone elses picture onyour website what must you do first?
not use it without permission form the copyright owner as it would be breaching it. ask the owners permission first before you use it