unit 3 Flashcards

1
Q

3 biggest impacts of the internet on employment

A

change in skill requirements, new job opportunities, job losses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what skills are now required in work

A

demand for tech skills and competence in ICT. The ability to work with and analyse data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why do employees now need to be adaptable

A

a shift in the need for particular skill sets due to more automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are new soft skills

A

effective communication, collaboration, lifelong learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cyber security description

A

protects systems from attacks, trained to work with computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

data science description

A

experts in analysing data, programming knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AI and machine learning (ML) description

A

developing AI in all industries working with machine learning algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

digital marketing description

A

content creation, search engine optimisation, social media marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

cloud computing description

A

cloud architects, security specialists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what happens to employees who don’t improve their skills

A

they dont have the skills required for their job, which can lead to job loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are working practices

A

the ways in which a person goes about completing a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 examples of working practices

A

collaborative working, flexible working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is collaborative working

A

employees can work on the same project or task at the same time, in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what did the internet enable (work)

A

enabled employees to work together remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does remote working do for employers

A

allows them to choose from a wider talent pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

collaborative working advantages

A

tasks can be completed quicker, shared skills, more creativity, team spirit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

disadvantages of collaborative working

A

organisation can be hard, personality clashes, people may not contribute equally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is flexible working

A

employees can work when suits them. They can decide the hours they work or work from home

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what else does the internet make an option for employees

A

working on the move

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

flexible working advantages

A

can schedule work around personal commitments, work when you feel the most productive, better work life leads to fewer absences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

flexible working disadvantages

A

lack of face to face can hinder collaboration, isolation, management can be hard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how has the internet helped access of information

A

provided people with a wealth of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TV and radio vs internet

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what new ways of learning has the internet provided

A

virtual learning environments, social media platforms can provide shared information, gamification making learning more fun, VR - immersive experiences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
what on demand services as the internet provided access to
movies, tv, music
26
what can users use online systems for
travel shopping banking
27
social communication definition
communication and reaction to others
28
new ways the internet has made it possible to socialise
online gaming, video, instant massaging, social networking, online space for work and learning
29
arguments for social interaction
connection and community, expression, social support and mental health, convenience, social change
30
arguments against social interaction
misinformation, privacy, distraction addiction, social comparisons
31
what is cyberbullying
using the internet to upset or embarrass people
32
online bullying forms
hurtful messages, distributing upsetting images, isolating people online
33
why has the internet causes reduced physical activity
more access to online goods and services
34
what things can reduced physical activity negatively affect
health, wellbeing
35
health issues with decreased physical activity
increased risk of chronic diseases, musculoskeletal problems, weakened immune system, metabolic issues, increased blood pressure
36
wellbeing problems with decreases physical activity
increases anxiety and depression, lower energy levels, poor sleep quality, lower self esteem, decreased social interaction
37
benefits of working from home to organisations
can attract talented motivated workforce, can employee from a wider location, no need to buy office space, no commuting for employees, workers may work more effectively from home
38
negatives of working from home to organisations
concerns about data security, harder to manage and support employees, employees might not work as hard, complications with payroll for employees in different countries
39
benefits of working from home to employees
no travel to work, more working, work at a suitable time, less distractions, comfortable environment, organise work around social commitments, no uniform
40
drawbacks of working from home on employees
distractions at home, lack of social interaction, feel disconnected from the company
41
impact of the internet of organisations
improved communication, access to global markets, access to global workforce, how information is managed and used
42
how has the internet changed how organizations communicate
made it easy and in real time
43
examples of how organisations can communicate with customers
websites, email, instant messaging, social media
44
what does access to global markets mean
organisations can advertise and sell to customers in countries all over the world. They have easier access to manufacture and can communicate more efficiently
45
what does access to global workforce mean
with the internet, organisations can find and hire the best talent, regardless of location
46
what else can organisations do because of access to global workforce
be more selective, select employees from different time zones and utilise different skills. They can reduce costs - wages in some countries might be lower
47
what do organisations use big data for
to find patterns of behavior
48
what is big data
data from smartphones, online applications, social media and payment systems
49
what does looking at patterns of behaviour allow organisations to do
improve customer experience and improve process efficiency
50
what are negative impacts of the internet on organisations
security issues, greater competition
51
traditionally how would data have been kept safe in an organisation
walls, locks, alarms, security guards
52
how is data accesses remotely by employees
using a VPN, transfer a copy of data to storage at home, using cloud
53
what are the threats of remote data access
employees accidently raveling logins, data being intercepted, systems being hacked
54
prevention of data being stolen that is stored online
policies to ensure employees are accountable for their actions, encryption, firewalls/authentication
55
why has the internet made more competition for organisations
consumers can buy globally
56
what is the risk to music/film rental because of the internet
online downloads and streaming
57
what is the risk to record labels because of the internet
independent artists can release their own music online
58
what is the risk to estate agents because of the internet
online advertising/virtual viewings
59
what is the risk to newspaper publishers because of the internet
online news
60
what is the risk to postal services because of the internet
send messages and digital media instantly
61
how has the internet impacted broadcasting a message
people can now share their own message to a global audiance
62
how has the internet impacted online content
it is controlled by moderators, service owners control what is published, algorithms decide what we see, paid promotion will be seen more
63
how has the internet impacted user generated reference sites
users can add things that may not be true
64
negative impact of the internet on law enforcement
use of social media and messaging services used to organise crime
65
positive impact of the internet on law enforcement
CCTV networks used to record illegal actions, social media used to identify suspects, social media used to organise events to help victims
66
what is the information gap
the divide between people who have access to online information, and those that do not
67
what is information rich
good access to information - improves education and helps enable them to make decisions
68
what is information poor
reduced access to information, this decreases education and reduced their ability to make decisions
69
since when was there an information gap
since television and radio were introduced
70
what has further widened the information gap
the internet
71
what is the digital divide
the gap between people who have access to digital devices and the internet and people who do not
72
factors that effect digital device and internet access
economy and infrastructure, location, politics, religion, disability, social
73
economic and infrastructure factors that affect digital access
countries with a strong economy can invest in infrastructure that provides access to the internet and networks. Countries with emerging and developing economies may prioritise other needs
74
how does location factors affect digital access
people in remote locations might not have access to signals or cables
75
how does political factors affect digital access
government control over access to information, not allowing access to content from other countries, blocked access to satellites to stop broadcasts
76
what religious factors affect digital access
some religions block access to technology
77
how does disability affect digital access
some digital services are not inclusive
78
what social factors affect digital access
age, gender, education, income
79
how has socialising changed because of the internet
meeting in person replaces with online, internet allows people to connect from around the world, can lead to isolation and anxiety about meeting people in real life
80
what is a direct entry of anauthorised access
a user tries to gain access themselves or but using software that tries user name and password combinations repeatedly
81
what are botnets
groups of computers that are used without an owners knowledge to carry out harmful activities or spread malware
82
when can accidental deletion occur
when a user presses the wrong key, formats media on the wrong device, loses power unexpectedly
83
what is malware
any software that has been created with malicious intent
84
examples of issues caused by malware
files be deleted, corrupted or encrypted, internet connection becoming slow or unusable, computer crashing or shutting down
85
what does a virus do
It can replicate itself on a users computer. It will cause unwanted and unexpected events to occur. e.g corrupt files, delete data, prevent application from running correctly
86
what do worms do
similar to viruses but they will spread to other drives and computers on the network. They can infect computers from : infected websites, instant messaging services, email, network connection
87
what does a trojan do
disguise themselves as legitimate software but contain malicious code in the background.
88
what does spyware do
allows someone to spy on the users activities. This form of software will be embedded into other software such as games or programs that can been downloaded from illegitimate sources. It can record your screen, log you key strokes to get passwords and more
89
what does ransomware do
locks your device and encrypts documents, a demand is made for money to decrypt files. There is so guarantee paying will get your money back
90
what is phishing
sending fraudulent, legitimate looking emails, claiming to be a reputable company to gain access to your details
91
effects of phishing
the creator of the email gains unauthorised access to personal data, can lead to identity theft or fraudulent activity on bank accounts
92
how can phishing be prevented
ani-spam filters - avoids fraudulent emails arriving, training staff to recognise emails, prevent staff from being able to open certain files
93
what is pharming
when typing a website address into a browser and it is redirected to a fake website.
94
effects of pharming
creator of the content gets anauthorised access to personal data, identity theft or fraudulent acitivity on bank accounts
95
how can pharming be prevented
keeping anti malware software up to date, checking URLs regularly, make sure the padlock icon is visible
96
what does a strong password contain
more than 8 characters, mixture of letters numbers and symbols, mixture of lower and uppercase, uncommon words/phrases
97
how often should passwords be changed
regularly
98
what are biometrics
a way of authenticating a user by their unique human characteristics
99
ways biometrics can be used
fingerprint scans, retina scans, facial recognition
100
advantages of biometrics
unique to the person meaning the data is always with them, passwords can easily be copied or guessed, hard to copy or forge biometric data, eliminated attacks such as shoulder surfing and key logging software, high degree of accuracy
101
disadvantage of biometrics
can be intrusive, scans could not be recognised (dirty hands), expensive to install, low light can be an issue for facial recognition, people uncomfortable with characteristics being sotred in a database
102
what is a CAPCHA
method of testing if a website request is from a human or a bot
103
examples of a CAPCHA test
text, image, checkbox
104
how does a text CAPCHA test work
asking users to enter characters from a distorted text box
105
how does a image CAPCHA test work
a gird of images, the user is asked to select all of those that contain a specific object
106
how does a checkbox CAPCHA test work
a checkbox asking the user to confirm they aren't a robot
107
what does a CAPCHA test achieve
prevent spam and protect logins
108
anti malware software definition
combination of different software to prevent computer from being susceptible to viruses and malicious software
109
different types of anti-malware
anti virus, anti spam, anti spyware
110
how does anti malware work
scans through email attachments, websites and downloaded files to search for issues. It has a list of known malware signatures to block immediately if they try to access your device. It also updates so that database is up to date
111
what are access rights
they ensure users of a network can access what they need to access and do not have access to information they shouldn't. Users can have designated roles on a network.
112
what would access rights be set based on
users role, responsibility
113
3 access rights
full access, read only, no access
114
what does HTTP allow
communication between clients and servers for website viewing. It allows clients to receive data from the server and send data to the server
115
what is HTTPS
same as HTTP but with a layer of security. All data sent and received in encrypted
116
what is HTTPS used for
to protect sensitive information e.g passwords, financial information
117
what should users be aware of when using email
attachments and web links
118
when should email users be cautious
email if from an unknown sender, contains grammar mistakes, files are executable files (.exe), urgency is the tone, dont recognise the URL
119
what is backup software
creates copies of personal data to keep it safe in the event of accidental loss or data theft
120
what can backups be
automated and scheduled to happen as less busy periods of the day, to not take up system resources
121
2 ways backups can be made
full - all files are backed up - safest, slow. incremental- only files that have been edited since the last backup are backed up - faster, less secure
122
where can backups be stored
locally (secondary storage) or remotely (cloud)
123
how do users get backup software
buy it or it comes with the operating system
124
what do online payment systems eliminate
need for physical cash by facilitating the payment of goods and services online
125
what do online payment systems offer
convenience, security (encryption protects information), increased reach, transparency ( digital records kept)
126
most common types of online payment systems
third party payment processors, bank cards, contactless (NFC)
127
what are third party payment processors
facilitate online payments using an email address as identification. They can be linked to online shopping applications
128
advantages of third party payment processors
easy and fast
129
how does a bank card do
pays for goods and services online using information found on the card
130
what information in required when making an online purchase with a bank card
16 digit card number, expiry date, security number (CVC)
131
what do contactless payments use to work
NFC - near field communication
132
what is the proximity of contactless
very close
133
contactless authentication and limits?
card has to be close to the reader, amount is limited
134
why does contactless have limits
to deter criminals as only small amounts can be stolen
135
how are online payments protected
banks - monitoring payments and spending payments, encryption for online payments, 2FA, using secure websites - HTTPS
136
what in an online community
group of people with a shared common interest who communicate online
137
what does every online community have
a function - what it does for people who use it. features- what enables it to function
138
social networking definition
practice of forming groups in society. Internet has made it possible for people to do this online.
139
function of social networking communities
allow users to connect through shared interest or relationship
140
what are the 2 types of online communities
professional and personal
141
profile feature on social networking
a collection of information about a person
142
friends follow and connect feature on social networking
ability to add friends to your network, can be followed to keep up to date with friends
143
stream, wall and timeline feature on social networking
messages appear here, chronologically ordered, usually the first thing a user sees when they log in
144
status updates and posts feature on social networking
users can write messages to people, messages can appear on their stream, messages can be directed at groups,
145
groups lists and circles feature on social networking
users can belong to specific groups, members can be added/removed
146
tags feature on social networking
allows content to be categorised, users can search for tags to find content
147
user suggestions feature on social networking
users with similar interests/professions can be suggested to connect with
148
reactions,ratings,likes,up/down votes feature on social networking
users can rate content, letting users know what they liked or find funny, feedback can feed into target advertising
149
share feature on social networking
users can share other peoples posts
150
comments and quotes feature on social networking
users can mention specific posts in messages, can start dialogue between users
151
third party integration feature on social networking
allows users to easily share content across other platforms
152
notifications feature on social networking
tells users about new activities, keeps users up to date
153
private or direct messages feature on social networking
allows users to be able to send private messages without posting publicly
154
online gaming definition
when video games are played over the internet on a computer network
155
online gaming features
links to social media, user profiles, how to's, experience points/trophies, notifications
156
online work space definition
virtual platforms that bring remote teams and projects together
157
function of online workspace
to give users a platform to be able to collaborate together for the purpose of work
158
features of online work spaces
cloud storage, commenting, messaging system, shared calendars, contacts lost, chat rooms, virtual meeting spaces
159
what is a VLE
platform for education and training
160
function of a VLE
to give teachers and students a shared platform to use learning and assessment features
161
VLE features
timeline, notice boards, multimedia sharing, quizzes/tests, communcaition tools, log in system, grades
162
user generated reference site definition
information website created and maintained by communities of users
163
wiki function
allow users to contribute to a community website or database. Wiki users collaborate in order to build and edit webpages
164
wiki features
user accounts (track who has made edits), editor feature, search tools
165
function of a forum
provide users with an online space for structured discussions
166
features of a forum
moderator, administrators, posts, threads, ratings, censoring, repots and flags
167
function of video and photo sharing sites
allows users to access and share content created by each other. Creates a sense of community
168
features of video and photo sharing sites
user accounts, content management system, tags, ratings, comments, third party integration
169
what do social bookmarking sites do
give users a platform to categorise and share web documents and URLs
170
features of social bookmarking sites
user accounts, third party integration, tags, social networking features
171
what is the data protection act
law that protects protects personal data from being misused
172
examples of personal data
name, address, date of birth, race, religion
173
when is the data protection act not followed
domestic purposes - writing to friends. law enforcement, intelligence services processing
174
6 data protection principles
fairly and lawfully processed, collected for specified and lawful purposes, must be adequate relevant and not excessive, must be kept accurate and up to date, must not be kept for longer than is necessary, must be processes inline with the peoples rights
175
how would organisations make sure employees follow the data protection act
training that is refreshed, policies, restrict access, report breeches, passwords and user names
176
what does copyright protect
the intellectual property of an individual or company
177
what does copy right make illegal
to copy, modify or distribute software or other intellectual property without the relevant permission
178
what happens to copyright after the creator dies
it stays for 25-70 years
179
what is a primary breach of copyright
copying working
180
primary vs secondary breach of copyright
Primary copyright infringement involves directly violating a copyright holder's rights, such as copying or distributing a work, while secondary infringement deals with facilitating or contributing to that infringement, such as selling or importing infringing copies
181
what is software piracy
the illegal copying and distribution of software
182
how do companies prevent software piracy
product key/license, terms and conditions, holograms
183
copyright exemptions
uses for the benefit of disabled people, non commercial research or private study, recording broadcasts for archiving, copies of books for education, when used in a parody
184
how can individuals be monitored
CCTV, ANPR, IP/MAC, GPS
185
what allowed the police access to data to track people
investigatory powers act
186
benefits of monitoring individuals
finding lost people, identify people on a network, locate friends, identify criminals, keeping travelers safe by monitoring events, verifying people
187
disadvantages of monitoring individuals
compromises privacy, expensive, high energy, making public not feel trusted
188
what are health issues a side effect of
prolonged use of IT
189
what issues are caused by prolonged use of IT
repetitive strain injury, back/neck problems, eye strain, headaches
190
how is RSI caused and prevented
caused by a prolonged use of keyboard and mouse. Use correct posture, take breaks, use ergonomic keyboards
191
how are back/neck problems caused and prevented
sitting Infront of a computer for prolonged amounts of time. Use adjustable chairs, take regular breaks, use a foot rest
192
how is eye strain causes and prevented
staring at a computer screen for prolonged amounts of time. Take regular breaks
193
what are safety risks around using tech
electrocution, fire hazards, overheating, trailing cables, heavy equipment falling
194
how is electrocution caused and prevented
spilling drinks near electrical equipment, touching live cables. Keep liquids away from equipment. Ensure cables are properly protected, use non conductive materials, use circuit breakers and fuses to prevent overload
195
how are fire hazards causes and prevented
sockets being overloaded and overheating. Ensure equipment is ventilated, dont plug too mant devices in the same socket
196
how to remove cable trip hazards
use cable ties, secure cables, use wireless devices
197
how to stay safe when using the internet
use trusted websites, dont reveal personal information
198
what are safety needs on the internet
protect personal information, prevent cyberbullying, prevent online scams, ensures digital reputation, promoted privacy and control, prevents exposure to inappropriate content, secures online gaming experience, guards against malware/viruses, promotes responsible digital citizenship, supports well being
199
how to protect personal information
dont share it freely
200
how to prevent cyberbullying
awareness of how to act online and avoid falling victim
201
how to prevent online scams
identify scams
202
how to ensure digital reputation
be mindful of behavior an d interactions
203
how to ensure privacy and control
have control of privacy settings - limit to who can access information
204
how to reduce exposure to inappropriate content
avoid going on explicit content
205
hoe to secure online gaming experience
be respectful to other players and don't share personal information
206
how to prevent malware
protect devices
207
how to promote responsible digital citizenship
develop responsible online behaviors
208
how to maintain well being
balance online and offline time
209
how to stay safe using internet
use trusted websites, filter age appropriate on search engines, never reveal personal information
210
how to stay safe sending/receiving emails
be aware of potential dangers or opening or replying to emails from unknown users. Make sure you know who the email if for if sending personal data
211
how to stay safe using social media
know how to block and report people, privacy settings, do not meet with anyone you do not know, do not distribute inappropriate content, respect personal data belonging to other people, only accept requests from people you know, dont post things that could be used to locate you
212
how to stay safe when online gaming
do not use real names, dont share personal or financial details, know how to block and report
213
what is an acceptable behavior policy
set of rules that outline how people are expected to conduct themselves online
214
where are acceptable behavior policies used
schools, email, jobs etc
215
what do acceptable behavior policies cover
desires behaviors, unacceptable behaviors, reporting procedures, consequences
216
what are the 4 key areas of environmental impact of digital technology
carbon footprint, E-waste, resource consumption, energy use
217
carbon footprint definition
the measure of how much carbon dioxide is released as a result of activity per person or organization
218
e-waste definition
digital devices that are no longer in use and are hard to dispose of
219
resource consumption definition
rare materials and resources being consumed during the manufacture of digital devices
220
energy use description
increased use of data centers and digital devices adds to strain on power grids
221
how to help power consumption
use renewable energies, use more energy efficient devices
222
how is power consumption increased
increase use of digital devices
223
what is the problem with data centers
require extensive cooling which is generated by non renewable energies
224
how can the problem of data centers be helped
locate them in cooler areas, near rivers to use of natural hydro electric power
225
what is the problem with natural resources being used in digital devices
they are poisonous
226
how can the issues of poisonous substances in digital resources be fixed
recycling, education, laws, harmless alternatives
227
what is a primary source
a source you have created yourself
228
what is a secondary source
a source that has been created by someone else
229
primary source examples
sound recordings, photographs, emails, social media posts
230
examples of secondary sources
newspapers, books, TV, websites, CDs,DVDs
231
what must you consider when selecting the most appropriate source of information
fitness for purpose, fitness for the intended audience
232
difference between search engine and web browser
web browsers = software that navigate web pages to return relevant results based of key words. We use a search engine when not typing in the full URL of site
233
how to get a search engine to give more specific results
use syntax rules
234
what does adding + + between words in a search engine
returns results that only contain these words
235
what does adding "" around a phrase in a search engine do
provide results that only contain that phrase
236
what is fitness for purpose
when you check if data from a source is suitable for the purpose you are planning to use it on
237
what do you need to check to see if a source if fit for purpose
accuracy, age, relevance, reliability, bias
238
how to check for accuracy
check if it is a trustworthy source, comparing it against other trustworthy sources, seeing if evidence is used
239
how to check for a sources age
publication data
240
how to check a source is relevant
checking the topic matches your topic
241
how to check a source for bias
check to see if it provides a range of view points, could you use the same information to tell the story from a different perspective, checking missing information, checking use of statistics
242
what is plagiarism
when someone presents information or ideas from another source as their own, without giving credit to the original author
243
common example of digital plagurism
copying and pasting from the internet
244
how to avoid plagiarism
rewrite or rephrase information. Always state where information came from
245