Tracking 2 Flashcards

1
Q

The different features of word that can be use to improve a piece of work

A
  1. Bold
  2. Italics
  3. Underline
  4. Font style, size and colour
  5. Header and footer
  6. Insert images
  7. Page layout
  8. Bullet points
  9. Insert tables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing

A

Exciting and relatively new technologies allow computing to be a seamless part of our everyday lives.
● Cloud computing allows users to save their files to ‘the cloud’ rather than their own computer so they can access their files anywhere, even on the move.
● Cloud computing means using computer services on another organisation’s computers, which are known as hosts.
● The services are provided by organisations known as hosting companies. Some well- known hosting companies for cloud computing include Amazon, Microsoft and Google
● Cloud users can access software, data and storage on the host computers, which will be at a remote location.
● Users do this through a web browser or mobile app, without ever directly accessing the servers that the information is stored on.
● Cloud storage is related to cloud computing – it is where only the storage, access and retrieval facilities are provided by the host provider, often via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cloud computing advantages

A

Cost & Convenience
o You only pay for the storage that you have used. You don’t have to provide
and maintain the hardware locally.
● Availability
o Data and files may be available anywhere in the world where there is an
internet connection. o Allows for teleworking
● Reduction in Carbon Footprint
o Less technology required within the company, demand for electricity is
reduced
o Cooling systems on servers within the company
o Our carbon footprint is a measure of the impact of our activities on the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud computing disadvantages

A

Reliability of the network - You need to be able to get through to the host to access and process data.
● Software - The host might not be using the latest, fastest and most secure version
● Potentially lower performance The speed of retrieval of data may be slower than it
would be on a local database held in-house.
● Security of Data -As the files are being stored by the host, you have no control over
them. You need to be aware of their security terms and policies.
● Customer Support - Lots of phone calls/ being put on hold when calling tech support
● Very time consuming - Can incur additional fees to ensure support is covered for
different eventualities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ways to stay safe online

A

 Use security settings to protect your privacy and identity.
 Remember that not everyone is who they claim to be.
 Criminals access social networking sites trying to find out information about people.
This may put you at risk of identity theft and password theft if you have revealed
too much information about yourself.
 Be careful not to reveal information that you might use in a password, such as your

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Threats to data

A
  1. Worms
  2. Trojan horses
  3. Spam
  4. Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Keep data safe

A
  1. Use Strong Passwords. …
  2. Look for Encryption. …
  3. Install Security Suites. …
  4. Turn on Web Browser Blacklisting. …
  5. Avoid Phishing Scams. …
  6. Get Private Data Protection. …
  7. Password-Protect Your Wireless Router. …
  8. Hide Your Personal Information.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer Worms

A
Computer Worms (essentially a computer virus that does not need to attach
itself to a file or message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan horses

A

Trojan horses, which appear as some benign program allowing a hacker full
access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spam

A

Spam consists of: Email messages you did not ask for from senders you don’t know. Unsolicited commercial email messages sent in bulk, often using a purchased (or stolen) mailing list that includes your address

Examples:
Comment Spam.
Trackback Spam.
Negative SEO Attack.
Spiders, Bots and DDoS Attacks.
E-mail Spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spywar Examples of malware include:
o Computer Worms (essentially a computer virus that does not need to attach
itself to a file or message);
o Trojan horses, which appear as some benign program allowing a hacker full
access to a system
o Spyware o Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly