Operating Online Flashcards
What is the Internet?
The Internet is a huge network that links networks of computers all over the world. All of the computers use the same protocols - TCP/IP - so that they can communicate and send data to each other.
What does ISP stand for?
Internet Service Provider and is the company that provides Internet access to its customers.
Identify two advantages of using social networking technology rather than SMS to communicate with friends.
- Only have to post one message / message is distributed more quickly
- Allows chat (real-time conversation)
- SMS requires payment for each person receiving message
- Can send message without mobile phone signal / with Internet connection
- Can add metadata (such as geodata)
- People can comment on / discuss the message
- Can add multimedia to the message
Describe how security questions can be used for authentication when users are logging into an online account.
If a person has forgotten their password they can prove their identity by repeating the answer they have given to a security question. The answer could also be asked for, in addition to a password, to increase the level of security.
State what a Captcha test is and why they are used.
A captcha test displays some letters and numbers in a font which is difficult to read. The user then has to read the letters and enter them using a keyboard. The test assumes that the letters and numbers cannot be read or interpreted by an automated computer program that then compete the form. They are testing that a human and not a computer program is trying to complete the form.
What do overt and covert mean?
Overt = you know the information is being collected Covert = you don't know the information is being collected
Give one benefit to you of a cookie.
- It saves you having to type your password in again when you revisit the site
- Your view of the website is personalised
- You can receive customised recommendations based on your shopping preferences
Give two reasons why you should consider deleting cookies from your computer.
- To free up storage space on your computer
- To stop unsolicited personalised adverts
- To stop organisations getting hold of your personal information / browsing habits
- To stop people finding out about your personal information / browsing habits on a shared computer
What precautions should you take to prevent the misuse of your personal information?
- Controlling cookies - They track your browsing activity and are a major privacy concern
- Phishing - Phishing emails are sent to get information out of people
- Preventing spyware - using a firewall will prevent spyware from being remotely downloaded to your computer.
What is the Data Protection Act?
This was put in place in 1998 to protect us as companies holding our data are required by law to:
- keep it secure
- not to ask for more data than necessary
- not to keep data any longer than necessary
- to keep data accurate and up to date
- not to sue data for any other purpose without our consent
What is the Computer Misuse Act?
This was introduced in 1990 to prevent:
- unauthorised access to computer material
- unauthorised modification of computer material
- unauthorised access to a computer with intent
What is the Computer Misuse Act?
This was introduced in 1990 to prevent:
- unauthorised access to computer material
- unauthorised modification of computer material
- unauthorised access to a computer with intent
What is copyright?
The Copyright, Designs and Patents Act protects people’s original work from being used without their permission
Michael uses search engine to choose an image to go on his blog. Explain Michael’s legal responsibilities when using images.
Michael should not use the image without the permission of the copyright owner because he would be breaching copyright. He should ask the copyright owner’s permission to use the image to protect intellectual property rights.