Issues Flashcards

1
Q

How can you stop hackers, phishing and viruses

A

You can keep your Bluetooth switched off when not in use to stop viruses.
To stop packages you can use firewalls, passwords and can encrypt the information travelling across networks.
You need to be able to identify phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hannah switches off Bluetooth on her phone when not using it. Explain how this improve security

A

Other uses with Bluetooth devices her within range cannot connect with her device and send unwanted messages to her

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

John is worried about data security state two ways you can protect his data when using a smart phone

A

Set a pin/password,

Encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the UK what protects our privacy online

A

The data protection act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name two threats to our privacy online

A

Identity theft involve someone pretending to be another person I collecting information about their identity.
Cookies can help advertising relativement products but may be seen as a privacy issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you stop identity theft and cookies from violating your privacy

A

You can keep all your personal information safe to stop identity theft. You need to know how to delete a manager cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How was privacy achieved

A

Keeping your personal information safe,

Organisations you give your personal information to giving your information safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain one way of preventing unauthorised users from reading data in a database

A

It can be encrypted so that it could only be read by people with the encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Some criminals steal personal information from Internet users. List two methods that criminals could use to collect personal information online

A

Spyware, hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name three security issues for digital devices

A

Hackers trying to get access to data without permission.
Viruses I designed to be harmful to destroy devices and to spread easily over networks.
Phishing cons people into believing that an email/text is from a valid organisation so they give away their username and password leading to identify theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name three ways of monitoring people using ICT

A

Geo location information from GPS enabled devices which can track your position.
Your computers IP address provides clues to search engines about your geological location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain how the irresponsible use of GPS data could play social network users at risk

A

GPS data gives away the users location. This could be dangerous if someone wanted to cause harm to that person as I could go and find them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State two ways in which people may track your communications

A

Emails,

Social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

State three positive effects that ICT can have another physical and mental health

A

Friendships can be built online using social networking.
We can learn new things as information can be accessed easily.
Exercises at home using games such as the wii can improve physical fitness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name three negative effects ICT can have an office are cool and mental health

A

Can contribute to obesity due to inactivity.
Eye strains come because by staring at the screen for a long time.
Accident him because by people using mobile phones whilst driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Repetitive strain injury is associated with playing video games. Speak to you is Mark can prevent the repetitive strain injury and playing games.

A

Take regular breaks.

Use ergonomically designed equipment.

17
Q

describe how networks have affected the way people work

A

People can now work from home using teleworking. People can work easily with people all around the world. The location of an office is now less important.

18
Q

Describe how networks have affected communication

A

You can socialise with people all around the world 24/7.
There is no rapid spread of news.
People over using social networking sites.

19
Q

Describe how networks have affected creativity

A

People can become content generators for websites e.g. YouTube

20
Q

Describe how networks have affected shopping

A

We have rapid access,
Round-the-clock availability,
No need to leave the house

21
Q

Describe two ways in which networks have an impact on society

A

Allow people to work from home but communicate easily with other people in offices and all over the world using email and VoIP.
The impact how we buy things we no longer need to leave our home is to go shopping we can buy things on the Internet.

22
Q

What is the data protection act

A

It is an act that protects us against misuse of a personal data that may be held by a range of organisations.

23
Q

What is the computer misuse act

A

It is on at that covers the misuse of computer equipment and the legal access to files. This makes the following a legal: software piracy, hacking and Fraud

24
Q

What is the copyright, designs and patents act

A

It is an act that makes it a criminal fence to copy all still media or other peoples work or ideas

25
Q

What is the digital economy act

A

It is on at that starts people illegally downloading media. Internet service providers to collect data about repeat offenders.

26
Q

Sally buys a music CD from an online store. Raj tell Sally that she can legally copy the CD because Sally has paid for it. Explain why raj is incorrect

A

Sally’s CD is for her own use. She cannot cope it without the copyright holders permission. It is illegal to copy CDs in this way as stated in the Copyright, designs and patents act

27
Q

Which act requires ISPs to take action against people who illegally download media

A

Digital economy act

28
Q

Causes of unequal access to ICT within the UK

A

Affordability – those are no income to be not have access to digital technology.
Lack of knowledge and skills – prevents people using ICT.
People living in remote areas may not have access to Internet or mobile phone coverage.

29
Q

Causes of unequal access to ICT worldwide

A

Affordability– More wealthy countries have better access to digital technology.
Censorship – some covenants restricting sensor access to digital technology

30
Q

State two causes of the digital divide in the UK

A

Lack of knowledge and skills,

Living in remote areas

31
Q

Helena uses her laptop over extended periods of time. Give to health and safety risks to her ineffective because by this extended use

A

Bad posture,

Eyestrain free staring at a screen for long periods of time

32
Q

Debbie’s computer is running slowly and she wants to replace it with a new one. Explain why Debbie should not just from the old computer in the bin.

A

She throws it in the dustbin it will end up in landfill, which can result in toxic chemicals leaking into nearby soil and water.

33
Q

Give two ways in which Debbie could dispose of her computer sustainably

A

Debbie could recycle the parts,

She could donate it to charity

34
Q

Sally wants to buy a PC. She is worried about the amount of electricity it will use. State two ways in which sally could minimise the use of electricity

A

She could choose a device of the sleep mode when is not in use.
She could switch it off when not in use.