Operating Online Flashcards

1
Q

What is the Internet

A

A hug network that links networks of computers all over the world. All the computers use the same protocol so that they can communicate and send data to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When selecting an ISP name 3 things you should consider.

A

Cost - ISPs charge a monthly fee and there may be a set up cost.
Bandwidth - varies widely. Usually the higher the bandwidth the higher the fee.
Security - connections are vulnerable to hackers. ISP should provide you with a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 4 ways you can communicate over the Internet

A

Instant messaging
Blogs
Social networking
Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you protect your personal information on a social networking site

A

Restrict who can see your personal details, photos and posts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain how having access to the Internet can enhance a family’s daily life

A

Could use Internet to help learning and school work, could teach themselves on various sites. Could use Internet to shop online more convenient. Could use Internet to research travel arrangements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For business What are the pros and cons of:
Email/IM/VoIP,
Cloud computing,
Video conferencing.

A

Email - + aid collaboration
- possibility of over reliance or misuse.
Cloud computing: + don’t need to buy multiple software licences.
- possible security issues with data stored by third party.
Video conferencing: + reduces need for travel so lowers costs.
- people don’t communicate as well as when face to face.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 3 ways you can learn on the Internet and their pros and cons

A

VLE: + students can access tasks and resources uploaded by teachers.
-cant access if you don’t have Internet.
Wikis: + up to date info which draws on lots of propels knowledge. - anyone can add content so it could be biased.
Email, IM, VoIP: + improved quicker communication. - possible overuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 3 measures you can take in order to keep your password secure

A

Do not tell anyone your password.
Encrypt passwords.
Change it regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are security questions

A

A question which you will have selected an imputed an answer beforehand. It is used to insure that you are the person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a captcha

A

A challenge response test where you have to enter the letters and numbers shown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain why captcha tests are used

A

The test assumes that the letters and numbers cannot be read or interpreted by an automated computer program that could then complete the form. They are testing that a human and not a computer program is trying to complete the form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

name three types of personal space

A

Personal websites
Blogs
online photo albums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three ways you can personalise your personal space

A

You can add:
Photos
personal information
likes and dislikes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name three ways you can control who has access to your personal spaces

A

Making online albums Private
Making sure you only befriend the people you know
Check and use your privacy settings on all social networking sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the privacy concerns associated with social networks

A

An individual’s personal information could be made available to all in the social network.
Individuals may appear in media when they are not aware(search engines).
GPS tools now provide a means of publishing an individual’s location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is overt data collection

A

It’s when you know the information about you is being collected, for example opening an online account or paying online

17
Q

What is covert data collection

A

When you don’t know the information is being collected about you for example Trojans or cookies

18
Q

What are cookies and what do they do

A

Cookie is a small text files sent to your computer by most websites when you visit them. They are stored on your computer and are used to track what you do on that website.

19
Q

What do you Trojans do

A

They record all your keystrokes all take pictures of your screen this can help Hackers find out your personal and financial information as you enter it

20
Q

What is identity theft

A

A crime that involve someone pretending to be another person in order to steal money or obtain other benefits

21
Q

Give one benefit to you of a cookie

A

Your view of the website is personalised

22
Q

Give two reasons why you should consider deleting cookies from your computer

A

To free up storage space on your computer

To stop unsolicited personalised adverts

23
Q

Name three ways you can prevent misuse of your personal information

A

Controlling your cookies
Be wary of phishing
Preventing spyware

24
Q

How can you control your cookies

A

Set your browsers to accept or reject all or some cookies

Setting your browser to prompt them each time a cookie is offered

25
Q

Companies publish privacy policies on their websites. Explain the purpose of a privacy policy.

A

Reputable firms will have their privacy policy in a prominent place in line with the data protection act. It will tell you what information will be gathered and how it will be stored and used.

26
Q

What are phishing emails

A

Phishing emails are sent to get information out of people. Their tone is often urgent because They want you to hand over your information without thinking.

27
Q

What is phishing

A

A form of Internet fraud the aim is to still valuable information such as credit card details usernames and passwords

28
Q

Name two ways you can prevent spyware

A

Use a firewall to prevent spyware being remotely downloaded to your computer.
Install anti-spyware protection software.

29
Q

Describe how an online store is able to send personalised emails to their clients

A

The store has tracked her previous transactions. The store much that data with other items for sale.

30
Q

What does the data protection act make companies do when holding our data

A

They have to keep it secure
They can ask for more data than necessary
They have to keep data accurate and up-to-date

31
Q

Eisha likes to buy clothes online. The websites she uses hold her personal data. Describe the law that protects her data.

A

The data protection act protects Eisha personal data by ensuring that it is kept secure, accurate, up-to-date and private

32
Q

many companies Store customers personal details. Explain the rights of the customer with regards to this data

A

The customer has the right to look at and check the data held.
They can demand the correct information is amended.
They can demand that the data is not used in any way that could cause harm or distress.

33
Q

What is the copyright designs and patents act

A

An act that protects people’s original work from being used without their permission

34
Q

Why do people bother with copyright?

A

People spend a lot of time and money they deserve to be paid for them.

35
Q

Name two consequences of illegal file sharing

A

You can be prosecuted.

If found guilty you could be sent to prison.

36
Q

Give an example of copyright infringement

A

Sharing videos and music over the Internet

37
Q

Michael uses the search engine to choose an image to go on his blog. Explain Michael’s legal responsibilities when using images.

A

Michael should not use the image without the permission of the copyright owner because he would be breaching copyright. He should ask the copyright owners permission to use the image to protect intellectual property rights.

38
Q

Give 2 harmful effects to the music industry of the legal copying and sharing files

A

The creators of the music are losing the money they need to create and record the music.
It leads to unemployment because of loss of revenue