Operating online Flashcards
What is the Internet?
The Internet is a huge network that links networks of computers all over the world.
What do all computers use?
The same protocol (rule) TCP/ IP so that they can communicate and send data to each other.
What is One of the most widely used services on the Internet
The world wide web
What does the World wide web allow you to do?
It uses HTTP protocol to allow users to access the interlinked hypertext that we call webpages
To connect to the Internet, you need to sign up with what?
Internet service provider or network interface card (NIC)
What are ISPs?
ISP’s are companies that provide customers with a means to connect to the Internet; like BT, Sky and Virgin Media.
What do people need to consider when choosing a ISP.
Cost – how much is the monthly fee?
Bandwidth – how fast is the connection?
Download limits – some ISPS have download limits!
Security – ISPs might provide services like parental controls or virus protection.
Reliability – how reliable is the connection/service?
Support – does the ISP offer good customer support?
BB broadband offers ‘unlimited monthly usage. State what this means.
There is no cap so you can download as much data as you can each month.
How is the internet used to communicate?
Email Instant message Blogs Social networking VoIP Online albums
Explain how having access to the Internet could enhance a family’s daily life.
Help learning/school work – (always explain why/how).
Shopping online – more convenient than going to the shops.
Paying bills online.
Compare prices online (explain the effects of this).
Research travel arrangements, holidays etc.
Socializing online, keeping in touch.
How can you restrict your account to protect personal information?
use account settings on social networking sites to restrict who can see your personal details, photos and posts.
Identity two advantages of using social networking technology rather than SMS to communicate with friends.
1) Allows chat (real time conversation)
2) People can comment on picture.
State 2 drawbacks of relying on the VLE.
1) Cannot access if you don’t have an internet connection
2) He will be unable to use it if he experiences any technical issues
What are Passwords used for?
are used on the Internet as a security measure to protect personal details
What do Security questions help do?
questions help further protect personal information and can be used if a user forgets their password.
Identify two features of a strong password.
1) Something not easily guessed
2) Use a mixture of letters, numbers and symbols.
To prove you are Human what is sometimes used on websites.
To prove you are human, a captcha is sometimes used when signing up to some websites.
Name 2 types of personal spaces.
1) Blogs
2) Personal websites
Name 2 ways you can control who has access to your personal space.
1) Make online albums private
2) Don’t befriend anyone
What 2 things do you check to see if the site is Secure?
A padlock
2) Https at the beginning of the address.
Tricking people into filling in an online form is called what?
Overt data because people know the data is being collected.
What can Hackers in store on your computer?
Trojans to spy on your computer, record all of your key strokes or take pictures of the screen, they find out information about you and commit fraud.
What is A cookie?
Cookies are small text files sent to your computer by most websites when you visit them. They are stored on your computer and are used to track what you do on the website.
Secretly installing software on a person’s computer is called what?
Covert information
Give one benefit of cookies.
It saves you time having to put your password in again when you revisit the website.
State 3 ways you can control a cookie.
1) People should set their preferences to only accept cookies from trusted websites.
2) People should also delete cookies regularly.
What is Phising?
Phishing is a scam that tricks people into giving out personal details (overt data collection)
State 2 ways you can prevent spyware.
1) Install Antispyware
2) Use a firewall to prevent spyware being remotely downloaded on to your computer.
Name 2 acts which Protect privacy online.
The Data protection Act 1998
The computer misuse act
What is the Data Protection Act 1998?
this law ensures companies that hold data are required to keep it secure, not keep it longer than needed, keep the data up to date and not use the data for any other purpose without our consent
What is the Computer Misuse Act 1990?
this law makes it a criminal offence to:
1) Log into another person’s computer without permission
2) Steal someone’s documents or programs
3) Gain access to financial or administrative documents and using this information to commit further crime (like fraud)
What does Copyright protect people from?
Copyright protects people’s original work from being used without their permission.
Give 3 examples copy right works for.
Music
Films
Images
Michael uses a search engine to choose image to go to on his blog. Explain Michael’s legal responsibilities when using images.
Michael should not use the image without the permission from the copyright owner because he would be breaching copyright, he should ask copyright owner permission.
Name 2 consequences of illegal sharing
1) Your ISP may prevent you from using the internet.
2) If found guilty you could be sent to prison.