Operating online Flashcards

1
Q

What is the Internet?

A

The Internet is a huge network that links networks of computers all over the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do all computers use?

A

The same protocol (rule) TCP/ IP so that they can communicate and send data to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is One of the most widely used services on the Internet

A

The world wide web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the World wide web allow you to do?

A

It uses HTTP protocol to allow users to access the interlinked hypertext that we call webpages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To connect to the Internet, you need to sign up with what?

A

Internet service provider or network interface card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are ISPs?

A

ISP’s are companies that provide customers with a means to connect to the Internet; like BT, Sky and Virgin Media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do people need to consider when choosing a ISP.

A

Cost – how much is the monthly fee?
Bandwidth – how fast is the connection?
Download limits – some ISPS have download limits!
Security – ISPs might provide services like parental controls or virus protection.
Reliability – how reliable is the connection/service?
Support – does the ISP offer good customer support?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BB broadband offers ‘unlimited monthly usage. State what this means.

A

There is no cap so you can download as much data as you can each month.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is the internet used to communicate?

A
Email 
Instant message
Blogs 
Social networking
 VoIP
Online albums
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how having access to the Internet could enhance a family’s daily life.

A

Help learning/school work – (always explain why/how).
Shopping online – more convenient than going to the shops.
Paying bills online.
Compare prices online (explain the effects of this).
Research travel arrangements, holidays etc.
Socializing online, keeping in touch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you restrict your account to protect personal information?

A

use account settings on social networking sites to restrict who can see your personal details, photos and posts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identity two advantages of using social networking technology rather than SMS to communicate with friends.

A

1) Allows chat (real time conversation)

2) People can comment on picture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State 2 drawbacks of relying on the VLE.

A

1) Cannot access if you don’t have an internet connection

2) He will be unable to use it if he experiences any technical issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Passwords used for?

A

are used on the Internet as a security measure to protect personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do Security questions help do?

A

questions help further protect personal information and can be used if a user forgets their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify two features of a strong password.

A

1) Something not easily guessed

2) Use a mixture of letters, numbers and symbols.

17
Q

To prove you are Human what is sometimes used on websites.

A

To prove you are human, a captcha is sometimes used when signing up to some websites.

18
Q

Name 2 types of personal spaces.

A

1) Blogs

2) Personal websites

19
Q

Name 2 ways you can control who has access to your personal space.

A

1) Make online albums private

2) Don’t befriend anyone

20
Q

What 2 things do you check to see if the site is Secure?

A

A padlock

2) Https at the beginning of the address.

21
Q

Tricking people into filling in an online form is called what?

A

Overt data because people know the data is being collected.

22
Q

What can Hackers in store on your computer?

A

Trojans to spy on your computer, record all of your key strokes or take pictures of the screen, they find out information about you and commit fraud.

23
Q

What is A cookie?

A

Cookies are small text files sent to your computer by most websites when you visit them. They are stored on your computer and are used to track what you do on the website.

24
Q

Secretly installing software on a person’s computer is called what?

A

Covert information

25
Q

Give one benefit of cookies.

A

It saves you time having to put your password in again when you revisit the website.

26
Q

State 3 ways you can control a cookie.

A

1) People should set their preferences to only accept cookies from trusted websites.
2) People should also delete cookies regularly.

27
Q

What is Phising?

A

Phishing is a scam that tricks people into giving out personal details (overt data collection)

28
Q

State 2 ways you can prevent spyware.

A

1) Install Antispyware

2) Use a firewall to prevent spyware being remotely downloaded on to your computer.

29
Q

Name 2 acts which Protect privacy online.

A

The Data protection Act 1998

The computer misuse act

30
Q

What is the Data Protection Act 1998?

A

this law ensures companies that hold data are required to keep it secure, not keep it longer than needed, keep the data up to date and not use the data for any other purpose without our consent

31
Q

What is the Computer Misuse Act 1990?

A

this law makes it a criminal offence to:

1) Log into another person’s computer without permission
2) Steal someone’s documents or programs
3) Gain access to financial or administrative documents and using this information to commit further crime (like fraud)

32
Q

What does Copyright protect people from?

A

Copyright protects people’s original work from being used without their permission.

33
Q

Give 3 examples copy right works for.

A

Music
Films
Images

34
Q

Michael uses a search engine to choose image to go to on his blog. Explain Michael’s legal responsibilities when using images.

A

Michael should not use the image without the permission from the copyright owner because he would be breaching copyright, he should ask copyright owner permission.

35
Q

Name 2 consequences of illegal sharing

A

1) Your ISP may prevent you from using the internet.

2) If found guilty you could be sent to prison.