7. Communications Flashcards

(47 cards)

1
Q

What is email?

A

a method of exchanging messages and files over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

main uses of email are:

A

Personal communication
Professional correspondence
Marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What guidelines do companies provide for the acceptable use of emails?

A

Purpose of the email
Using acceptable language
Email security, including anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some acceptable language guidelines for emails?

A

Use appropriate language based on recipient and purpose

Maintain a professional tone for work-related emails

Avoid offensive, obscene, racist, or violent content

Do not send illegal material

Emails may be monitored, and violations can lead to punishment

Include a clear subject line

Use a professional email address

Use professional salutations

Avoid using all capitals (implies shouting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is email security important, and how can it be maintained?

A
  • Protects sensitive information from being accessed or altered
  • Use strong passwords and change them frequently
  • Enable spam filters and antivirus software
  • Protect against both passive and active attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is netiquette?

A

means respecting others online

  1. Respect opinions in forums, messages, and emails
  2. Most posts are public and can be read by anyone
  3. Use clear, inoffensive, and concise language
  4. Maintain a good impression with proper tone, spelling, punctuation, and grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

adv of group emails?

A

mass communication with a defined set of recipients
It is easier to send out multiple emails
ensures no one misses out on an email containing key information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

dis of group emails

A

spammers can utilise them to target a large group of people with ease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the three key email operations

A

CC- Carbon Copy
BCC - Blind Carbon Copy
Forward
Attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a carbon copy (CC)

A

used when you want to include additional recipients to view the email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is blind carbon copy (BCC)

A

used when you want additional recipients to view the email without other recipients knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is forwarding an email?

A

This allows you to send an existing email to a new recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is attaching in an email?

A

these allow files to be sent along with the email message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spam, and why is it harmful?

A

Spam is unwanted or junk mail sent in large quantities

contains advertising, phishing attempts, or malware

Phishing emails impersonate reputable companies to steal personal details like usernames and passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can spam emails be detected?

A

multiple spelling or grammatical errors
use broken English, though this is now improving with the use of AI

Spam emails will not address you by name
Often spam emails will ask you to enter your details by clicking a link

Reputable companies have now stopped doing this to make identifying spam a lot easier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can spam emails be prevented?

A

anti-spam filters

Users can ensure they do not agree to marketing emails from companies they register with

Users can also ensure they do not reply to emails with sensitive data or complete online forms for websites by clicking links in an email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Internet?

A

a network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does the internet allow you to do?

A

allows users to share and distribute information outside of an organisation

Send and receive emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is a blog

A

are journals shared on the internet by a writer (blogger)

regularly updated
written in an informal or conversational style

managed by individuals or small groups

People can share their opinions on a variety of topics

presented in reverse chronological order

allow for reader comments,

Other internet users can’t change the content of the blogs, they can only read them

20
Q

what is a forum

A

an online discussion site where people can hold conversations in the form of posted messages

organised around specific interests, and divided into threads

primarily focused on peer-to-peer interaction

21
Q

what’s a moderated forum?

A

A moderated forum is under the control of an administrator who determines what can and can’t be posted, preventing inappropriate or hurtful content from being published

22
Q

whats an unmoderated forum?

A

An unmoderated forum means that no one is in charge and the moderation of the forum relies upon voluntary action between the users of the site

23
Q

What is a wiki?

A

a website or web application that allows users to add or edit content

designed to facilitate collaboration and knowledge sharing from many people

holds information on many topics which can be searched

Posts are not in chronological order

The structure is determined by the content or its users

Changes can be tracked and reverted if necessary

24
Q

what is social networking?

A

A social network website is a platform where users can connect with others and share content

25
examples of social networking platforms
Facebook TikTok (Twitter) Instagram LinkedIn
26
what's an Internet Service Providers (ISPs)
a company that provides access to the Internet to users and businesses
27
what are web browsers
is a software application used to locate, retrieve, and display content on the WWW display images, videos and other files
28
what is a hyperlink
s a word/phrase/image which references data that the reader can follow by clicking or tapping, usually taking you to another web page
29
Most web browsers have the following features:
Home page Ability to bookmark favourites Keep a history of visited websites Hyperlinks which allow users to navigate between pages
30
what's a URL
Uniform Resource Locator (URL) are the web address a user types into a web browser
31
What are search engines?
tools that locate and display web pages related to the search terms entered by the user uses algorithm.
32
what are the 3 stages search engines work in
Crawling Indexing Ranking
33
what is crawling?
web crawlers scour the internet daily to retrieve new websites
34
what is indexing
how websites are categorised based on the content of their web pages
35
what is ranking
how websites are ranked and listed on search engine pages
36
Arguments for policing the internet
The internet contains a large amount of inappropriate and criminal material The internet can expose users to harmful or illegal content More control would prevent younger users and vulnerable groups from being exposed to undesirable content
37
Arguments against policing the internet
Data restriction: Parental, educational, and ISP controls could limit access to certain information or websites It can be argued that it would go against freedom of speech It is not up to one person to define what people find offensive
38
what is a protocol?
a set of rules that govern communication on a network
39
types of protocols
HTTP & HTTPS FTP SSL & TLS VoIP SMTP
40
what is Hypertext Transfer Protocol (HTTP)
allows communication between clients and servers for website viewing allows clients to receive data from the sever and send data to the server
41
what is HTTPS
same as HTTP, but added layer of security (encrypted) used to protect sensitive information such as passwords
42
What is FTP?
File Transfer Protocol (FTP) allows sending and receiving files between computers Uploading and downloading files to/from a web server offers greater efficiency and support for bulk transfers and large files such as resuming interrupted transfers FTP clients are software applications that use the FTP protocol to make the process easier for users
43
what is SSL?
Secure socket layer (SSL) is a security protocol developed to provide secure communication over the internet
44
what is TLS
TLS is a successor to SSL and is also a security protocol used to provide secure communication over the internet
45
How does SSL operate
SSL operates by encrypting a user's data using a public key This is done by sending a digital certificate to the user’s browser This contains the public key which can be used for authentication
46
whats common in SSL and TLS?
both use encryption
47
where is SSL used?
Online banking Online shopping Using cloud storage Messaging Social networking websites Intranets/extranets