Operating Online Flashcards

1
Q

What is the Internet?

A

A huge network that links networks of computers all over the world
All computers use the same protocol to communicate and send data to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you need in order to connect to the internet?

A

You need a Network Interface Card (NIC) to get a cable or wifi connection
You need to sign up with an Internet Service Provider (ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should you consider when choosing an ISP?

A

Monthly payments as well as set-up cost
Bandwidth: Higher bandwidth usually means a higher price. Note that the maximum bandwidth stated in ads are never reached due to other network traffic
Download limits: You can be charged extra if you go over the cap
Email and Web space: Most ISPs can provide you email addresses and provide space on their servers for you to create your own website
Security: ISP may provide you a firewall, antivirus and antispam software, and parental controls
Reliability and support: ISPs may lie about bandwidth and may have poor customer care. Check for reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways of communicating over the internet

A

Email: Sending msgs. Can be accessed on most digital devices
Instant Messaging: Real time “talking” through typing messages. Helps collaboration
Blogs: Shared online diaries where you can post and share experiences.
Social Networking: Websites that allow chat, messaging, email, group and file sharing.
Voice over Internet Protocol (VoIP): Requires fast internet connection. Can add webcam to video chat
Online Albums: Photo albums hosted on a website. Allows the backing up and sharing of photos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name three different ways businesses use when communicating over the internet

A

Email, IM, VoIP
+Aid collaboration
-Possibility of over-reliance or misuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is cloud computing useful for businesses?

A

It allows software and data to be stored centrally so it can be accessed from anywhere.
+Don’t need to buy multiple software licenses
-Possible security issues with data stored by third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is video conferencing useful for businesses?

A

Two-way audio and video transmissions.
+Reduces need for travel so lowers costs
-People do not communicate as well as when face to face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VLE?

A

A web-based system allowing students, parents and teachers to communicate in a “virtual school”
+Students can access tasks and resources uploaded by teachers and track progress
-Cannot access if you don’t have an internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are user-generated websites?

A

Websites to which people can add their own content.
+up to date information which draws on lots of people’s knowledge and expertise
-Anyone can add content so it may be biased and inaccurate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are news websites useful for learning on the internet?

A

+Can use RSS feeds to see latest stories
+Can search archives to find old stories
-Possible over reliance on news websites than using a number of resources for research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List things you can do to keep your passwords secure

A

Do not write it down
Change it regularly
Do not tell anyone your password
Avoid allowing browsers to remember password on shared/public PCs
Encrypt passwords
Use different passwords for different sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State two challenge response tests you may encounter when setting up an account and explain how they work

A

Security questions: You are usually asked to select a security question and enter your secret answer when you first set up an account. Banks require you to answer security questions as well as entering your password. It can be used to identify you if you forget your password.

Captcha: Have to enter the letters and numbers shown in the box. Used to check the form is not being automatically completed by a bot. Used to protect systems vulnerable to email spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways in which you can personalise your online space

A
Add photos
Personal info
Text and weblinks
Likes and dislikes
News feeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you control who can access your personal space?

A

Make online albums private
Don’t befriend everyone who sends a friend request on social networking sites
Check and use your privacy settings on all social networking sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 5 things you should keep in mind when you have a personal presence on the internet

A

Don’t post anything you don’t want to be made public
Minimise details that identify you or your whereabouts
Keep your account numbers, usernames and passwords secret
Only share your screen names with people you know
Don’t use apps that use GPS on your phone to share your location with people you don’t know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is OVERT data collection?

A

You know that this information is being collected.
Reputable companies will keep your data secure, wont share it with other companies and will ask you to opt in to marketing emails than to opt out.

17
Q

What is COVERT data collection?

A

You don’t know that this information is being collected.

This usually refers to the way spyware works.

18
Q

What are Trojans?

A

Spyware that hackers can install to spy on your computer.
They record all your key strokes or take pictures of the screen
They can find out your personal and financial info as you enter it and use it to commit fraud.

19
Q

State what a cookie is and what it does

A

Cookies are small text files sent to your computer by most websites when you visit them.
Stored on your computer and used to track what you do on the website
They can monitor what you look at and suggest things you might like.
Some sites may allow third party cookies from marketing companies. They sell the information they find out about you.

20
Q

How can you check to make sure a site is secure?

A

https at beginning of address
Padlock symbol
Green web address bar

21
Q

What is identity theft?

A

When fraudsters find out peoples personal details and use them to make money by pretending to be that person.
They can open bank account and apply for loans, credit cards, passports and driving licenses under someone else’s name

22
Q

How can you control your cookies?

A

Set your browsers to accept or reject all or some cookies
Set your browser to prompt them each time a cookie is offered (hahaha would you reject a cookie? cx)
All browsers also have the option to delete all the cookies on your computer

23
Q

What is a privacy policy and what purpose does it serve?

A

Privacy policies in line with the Data Protection Act are used by websites in prominent places to describe the website’s use of cookies and other trackers. It tells you what info will be gathered and how it will be stored and used.

24
Q

How can you spot phishing emails?

A
Impersonal greeting
Threat
URL that appears to be from bank but does not take you to bank website when clicked
Request for your personal info
Bad grammar and spelling
Faraway location included in email
25
Q

How can you prevent spyware getting onto your computer?

A

Use a firewall to prevent spyware being remotely downloaded to your computer
Install antispyware protection software
Be careful when downloading free music and movie file sharing programmes
Only download programs from websites you trust
Read all security warnings, license agreements and privacy statements

26
Q

What is the Data Protection Act 1998?

A

A law put in place to protect web users and prevent the misuse of their data.
Companies holding our data are required by law to:
keep it secure
not ask for more data than necessary
not keep it longer than necessary
keep data accurate and up to date
not use data for any other purpose without our consent

27
Q

What rights do people who give their data to companies have?

A

They can look at and check any personal data an organisation holds about them
They can demand that incorrect information is amended
They can demand the data is not used in any way that could harm or distress them
They can demand their data is not used for direct marketing

28
Q

What is the Computer Misuse Act 1990?

A

There are three levels of crime (caused by the easier access to networks or other people’s computer to steal or corrupt data)

Unauthorised access to computer material: Includes logging into another person’s computer with their password without their permission, stealing their documents and programs.

Unauthorised modification of computer material: Includes destroying or corrupting another user’s files, modifying system files or the creation of a virus

Unauthorised access to a computer with intent: Includes gaining access to financial or administrative records and using the information to commit a futher crime, eg. fraud

29
Q

Why is the Copyright, Designs and Patents Act in place?

A

This is to protect people’s original work from being used without their permission.
People spend a lot of time and money writing and recording these materials and they deserve to be paid for them
If professional artists cannot make any money from their work, then they will not be able to afford to create anymore

30
Q

What is the Creative Commons license used for?

A

Copyright owners can use these to allow certain uses of their work eg. making an image free if used for educational purposes.

31
Q

What are the consequences of illegal file sharing?

A

You can be prosecuted
Your ISP may prevent you from using the internet
If found guilty, you could be sent to prison
It has a huge impact on the music and film industries

32
Q

State some examples of copyright infringement

A

Sharing videos and music over the internet
Copying and distributing copyright files, for example giving someone a copy of an album you’ve just bought
Pretending that someone else’s work is your own, eg. plagiarism

33
Q

What are your legal responsibilities when using images from a search engine?

A

Do not use the image without the permission of the copyright owner, as this would be breaching copyright.
You should get the copyright owner’s permission to use image to protect intellectual property rights