Operating Online Flashcards
What is the Internet
A hug network that links networks of computers all over the world. All the computers use the same protocol so that they can communicate and send data to each other.
When selecting an ISP name 3 things you should consider.
Cost - ISPs charge a monthly fee and there may be a set up cost.
Bandwidth - varies widely. Usually the higher the bandwidth the higher the fee.
Security - connections are vulnerable to hackers. ISP should provide you with a firewall.
Name 4 ways you can communicate over the Internet
Instant messaging
Blogs
Social networking
Email
How can you protect your personal information on a social networking site
Restrict who can see your personal details, photos and posts
Explain how having access to the Internet can enhance a family’s daily life
Could use Internet to help learning and school work, could teach themselves on various sites. Could use Internet to shop online more convenient. Could use Internet to research travel arrangements.
For business What are the pros and cons of:
Email/IM/VoIP,
Cloud computing,
Video conferencing.
Email - + aid collaboration
- possibility of over reliance or misuse.
Cloud computing: + don’t need to buy multiple software licences.
- possible security issues with data stored by third party.
Video conferencing: + reduces need for travel so lowers costs.
- people don’t communicate as well as when face to face.
Name 3 ways you can learn on the Internet and their pros and cons
VLE: + students can access tasks and resources uploaded by teachers.
-cant access if you don’t have Internet.
Wikis: + up to date info which draws on lots of propels knowledge. - anyone can add content so it could be biased.
Email, IM, VoIP: + improved quicker communication. - possible overuse.
Name 3 measures you can take in order to keep your password secure
Do not tell anyone your password.
Encrypt passwords.
Change it regularly.
What are security questions
A question which you will have selected an imputed an answer beforehand. It is used to insure that you are the person.
What is a captcha
A challenge response test where you have to enter the letters and numbers shown.
Explain why captcha tests are used
The test assumes that the letters and numbers cannot be read or interpreted by an automated computer program that could then complete the form. They are testing that a human and not a computer program is trying to complete the form
name three types of personal space
Personal websites
Blogs
online photo albums
Name three ways you can personalise your personal space
You can add:
Photos
personal information
likes and dislikes
Name three ways you can control who has access to your personal spaces
Making online albums Private
Making sure you only befriend the people you know
Check and use your privacy settings on all social networking sites
Explain the privacy concerns associated with social networks
An individual’s personal information could be made available to all in the social network.
Individuals may appear in media when they are not aware(search engines).
GPS tools now provide a means of publishing an individual’s location
What is overt data collection
It’s when you know the information about you is being collected, for example opening an online account or paying online
What is covert data collection
When you don’t know the information is being collected about you for example Trojans or cookies
What are cookies and what do they do
Cookie is a small text files sent to your computer by most websites when you visit them. They are stored on your computer and are used to track what you do on that website.
What do you Trojans do
They record all your keystrokes all take pictures of your screen this can help Hackers find out your personal and financial information as you enter it
What is identity theft
A crime that involve someone pretending to be another person in order to steal money or obtain other benefits
Give one benefit to you of a cookie
Your view of the website is personalised
Give two reasons why you should consider deleting cookies from your computer
To free up storage space on your computer
To stop unsolicited personalised adverts
Name three ways you can prevent misuse of your personal information
Controlling your cookies
Be wary of phishing
Preventing spyware
How can you control your cookies
Set your browsers to accept or reject all or some cookies
Setting your browser to prompt them each time a cookie is offered
Companies publish privacy policies on their websites. Explain the purpose of a privacy policy.
Reputable firms will have their privacy policy in a prominent place in line with the data protection act. It will tell you what information will be gathered and how it will be stored and used.
What are phishing emails
Phishing emails are sent to get information out of people. Their tone is often urgent because They want you to hand over your information without thinking.
What is phishing
A form of Internet fraud the aim is to still valuable information such as credit card details usernames and passwords
Name two ways you can prevent spyware
Use a firewall to prevent spyware being remotely downloaded to your computer.
Install anti-spyware protection software.
Describe how an online store is able to send personalised emails to their clients
The store has tracked her previous transactions. The store much that data with other items for sale.
What does the data protection act make companies do when holding our data
They have to keep it secure
They can ask for more data than necessary
They have to keep data accurate and up-to-date
Eisha likes to buy clothes online. The websites she uses hold her personal data. Describe the law that protects her data.
The data protection act protects Eisha personal data by ensuring that it is kept secure, accurate, up-to-date and private
many companies Store customers personal details. Explain the rights of the customer with regards to this data
The customer has the right to look at and check the data held.
They can demand the correct information is amended.
They can demand that the data is not used in any way that could cause harm or distress.
What is the copyright designs and patents act
An act that protects people’s original work from being used without their permission
Why do people bother with copyright?
People spend a lot of time and money they deserve to be paid for them.
Name two consequences of illegal file sharing
You can be prosecuted.
If found guilty you could be sent to prison.
Give an example of copyright infringement
Sharing videos and music over the Internet
Michael uses the search engine to choose an image to go on his blog. Explain Michael’s legal responsibilities when using images.
Michael should not use the image without the permission of the copyright owner because he would be breaching copyright. He should ask the copyright owners permission to use the image to protect intellectual property rights.
Give 2 harmful effects to the music industry of the legal copying and sharing files
The creators of the music are losing the money they need to create and record the music.
It leads to unemployment because of loss of revenue